{"title":"原型和评估基于隧道的解决方案,以绕过恶意IISP封锁","authors":"Amer Al-Ghadhban, M. Abu-Amara","doi":"10.1109/ICCITECHNOL.2012.6285810","DOIUrl":null,"url":null,"abstract":"Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking\",\"authors\":\"Amer Al-Ghadhban, M. Abu-Amara\",\"doi\":\"10.1109/ICCITECHNOL.2012.6285810\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.\",\"PeriodicalId\":435718,\"journal\":{\"name\":\"2012 International Conference on Communications and Information Technology (ICCIT)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Communications and Information Technology (ICCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCITECHNOL.2012.6285810\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Communications and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCITECHNOL.2012.6285810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking
Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.