November 2024
·
5 Reads
·
1 Citation
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
November 2024
·
5 Reads
·
1 Citation
July 2024
·
3 Reads
October 2023
·
15 Reads
·
7 Citations
September 2023
·
105 Reads
p>Reliance on commercial virtual private networks has increased manifold in the recent past. This paradigm shift of global internet users is primarily driven by their need of online privacy, censorship circumvention, and accessing geo-filtered content among other motivations. Variety of VPN services underscored by their opaque nature captures huge user base which is technically unsophisticated, and has very limited means to verify claims of a given VPN service. Capitalizing on extensive literature and online review, we have selected a sample of 60 x VPNs (from categories of free as well as paid services) which adequately represents the commercial VPN market from cost-quality perspective. An elaborate eco-system analysis reveals significant variations against the claims of service providers. Our crystallized infrastructure testing methodology executed over selected VPNs reveals: (1) Anonymity index of free versus paid VPNs differs widely at all levels i.e., IP, subnet, country and ISP; (2) 54% of selected VPN’s server locations in attractive geographic locations are virtual instead of physical; (3) 4/10 VPN tested services have been found to share their vantage points at subnet level; and (4) Selective co-location of 22% vantage points have also been observed. </p
September 2023
·
66 Reads
p>Reliance on commercial virtual private networks has increased manifold in the recent past. This paradigm shift of global internet users is primarily driven by their need of online privacy, censorship circumvention, and accessing geo-filtered content among other motivations. Variety of VPN services underscored by their opaque nature captures huge user base which is technically unsophisticated, and has very limited means to verify claims of a given VPN service. Capitalizing on extensive literature and online review, we have selected a sample of 60 x VPNs (from categories of free as well as paid services) which adequately represents the commercial VPN market from cost-quality perspective. An elaborate eco-system analysis reveals significant variations against the claims of service providers. Our crystallized infrastructure testing methodology executed over selected VPNs reveals: (1) Anonymity index of free versus paid VPNs differs widely at all levels i.e., IP, subnet, country and ISP; (2) 54% of selected VPN’s server locations in attractive geographic locations are virtual instead of physical; (3) 4/10 VPN tested services have been found to share their vantage points at subnet level; and (4) Selective co-location of 22% vantage points have also been observed. </p
January 2023
·
94 Reads
·
2 Citations
IEEE Access
This study identifies a method to create fine-grained multilayer maps of the Internet’s structure, which are currently lacking. We begin with an investigation of current techniques for geolocating hosts using passive, active, and hybrid methods. This is followed by a survey of the fundamental problems that IP geolocation techniques must address. The survey points to the obvious difficulties in using Delay-Distance models and suggests that the use of Return Trip Times can lead to highly misleading results. We therefore develop a new procedure that combines state-of-the-art methods to avoid many of the fundamental problems in Internet topology mapping, whilst creating finer-grained internet maps than those currently available. This procedure is tested on the UK infrastructure by conducting a series of tests using distributed measurement points provided by the RIPE Atlas platform. Our results show that we can accurately geolocate routers between two endpoints to create a fine-grained map of the internet infrastructure involved in our measurements. Researchers have long recognized the scarcity of ground truth datasets where IP geolocation is a concern. As a byproduct of our new method reported in this paper, we create a validation dataset that maps hundreds of IP addresses to geo-coordinate landmarks or vantage points, which is highly desirable for IP geolocation research. Finally, we discuss some limitations of this method, and we summarise the next steps toward accurate and complete Internet infrastructure maps.
October 2022
·
6 Reads
·
6 Citations
May 2022
·
110 Reads
·
11 Citations
IEEE Transactions on Network and Service Management
BGP-Multipath (BGP-M) is a multipath routing technique for load balancing. Distinct from other techniques deployed at a router inside an Autonomous System (AS), BGP-M is deployed at a border router that has installed multiple inter-domain border links to a neighbour AS. It uses the equal-cost multi-path (ECMP) function of a border router to share traffic to a destination prefix on different border links. Despite recent research interests in multipath routing, there is little study on BGP-M. Here we provide the first measurement and a comprehensive analysis of BGP-M routing in the Internet. We extracted information on BGP-M from query data collected from Looking Glass (LG) servers. We revealed that BGP-M has already been extensively deployed and used in the Internet. A particular example is Hurricane Electric (AS6939), a Tier-1 network operator, which has implemented >1,000 cases of BGP-M at 69 of its border routers to prefixes in 611 of its neighbour ASes, including many hyper-giant ASes and large content providers, on both IPv4 and IPv6 Internet. We examined the distribution and operation of BGP-M. We also ran traceroute using RIPE Atlas to infer the routing paths, the schemes of traffic allocation, and the delay on border links. This study provided the state-of-the-art knowledge on BGP-M with novel insights into the unique features and the distinct advantages of BGP-M as an effective and readily available technique for load balancing.
March 2022
·
359 Reads
·
40 Citations
Computers & Security
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditional manufacturing and production technologies with IP communications. Legacy Industrial Control System (ICS) devices now interconnected via public networks, are exposed to a wide range of previously unconsidered threats, threats which must be considered to ensure the continued safe operation of industrial processes. This paper surveys the ICS honeypot deployments in the literature to date and provides an overview of ICS focused threat vectors, and studies how honeypots can be integrated within an organisations defensive strategy. We discuss relevant legislation, such as the UK Cyber Assessment Framework, the US NIST Framework for Improving Critical Infrastructure Cybersecurity, and associated industry-based standards and guidelines supporting operator compliance. This is used to frame a discussion on our survey of existing ICS honeypot implementations in the literature, and their role in supporting regulatory objectives. We observe that many low-interaction honeypots are limited in their use. This is largely due to the increased knowledge attackers have on how real-world ICS devices are configured and operate, vs. the configurability of simulated honeypot systems. Furthermore, we find that environments with increased interaction provide more extensive capabilities and value, due to their inherent obfuscation delivered through the use of real-world systems. Based on these insights, we propose a novel framework towards the classification and implementation of ICS honeypots.
November 2021
·
28 Reads
... First, a source AS (e.g., a CI's AS) does not know all the available paths to a particular destination (e.g., Microsoft mail) because ASes might filter Border Gateway Protocol (BGP) route advertisement messages by forwarding routes to a selection of their BGP peers rather than to all of them. This is known as "selective announcement" and is based on an individual AS' traffic engineering policies [15,35]. Second, a source AS does not know if paths are fully secure or not because there is no mechanism to measure the security status of the overall path based on the security of the ASes on the path. ...
October 2023
... IPinfo.io: https://ipinfo.io.8 CIDR Report AS list: https://www.cidr-report.org/as2.0/autnums.html. ...
January 2023
IEEE Access
... The Interdomain Routing System has been extensively studied over the last two decades, in order to understand, evolve and capture the behavior of the ASes that constitute it but also develop accurate policy models and path prediction capabilities (Dhamdhere and Dovrolis, 2008;Dimitropoulos et al., 2005;Ballani and Francis, 2005; R. V. Oliveira et al., 2008;Mühlbauer, Uhlig, et al., 2007;Gill, Schapira, and Goldberg, 2013;Huston, 1999;Luckie et al., 2013;Mao, Rexford, et al., 2003;Labovitz et al., 2010;Gao, 2001;Gao and Rexford, 2001;Quoitin and Uhlig, 2005;Mühlbauer, Feldmann, et al., 2006;Gill, Schapira, and Goldberg, 2012;Cunha et al., 2016;Tian et al., 2019;Wu et al., 2022;Singh et al., 2021;Sermpezis and Kotronis, 2019;Kastanakis, Giotsas, and Suri, 2022;Kastanakis, Giotsas, Livadariu, et al., 2023c;Kastanakis, Giotsas, Livadariu, et al., 2024). ...
October 2022
... Multimedia techniques such as video conferencing, VoD, and real-time material dissemination are presently the most common ways of communication. According to research in [7,8,9,10], traffic from Multipath Routing will be highly effective for real-time use cases like satellite communications.Video surveillance becoming a more crucial use for WMSNs, it is anticipated that in comparison to [11,12,13,14], Internet traffic would grow by a factor of seven. We'll put this growth into action between 2017 and 2025. ...
May 2022
IEEE Transactions on Network and Service Management
... Furthermore, Honeypots [73], systems that simulate the ICS to attract attacks towards themselves instead of the real ICS, could be deployed alongside the UPF in the MEC servers. This not only serves to divert and analyze potential threats but also provides an additional layer of protection for the legitimate ICS. ...
March 2022
Computers & Security
... Finally, the closed-world size could be increased by co-hosting multiple websites on one server, making a larger number of websites available behind load balancers, or even decoupling the bindings between IP addresses and hostnames [31]; or even moved to open world if all web traffic would be downloaded via anonymous communication networks (e.g., Tor [28]) or VPNs. ...
August 2021
... If the route failure is beyond the first two techniques, then it is known as a handover link failure. It is very crucial to determine the Round Trip Time (RTT) [19][20][21] to further improve the efficiency of routing protocols in mobile-based wired and wireless networks. ...
July 2021
... Large-scale network topology discovery is mainly based on Traceroute active probing technology, which constructs IP packets with specific time-to-live (TTL) field values to obtain the time-out response packets of hop-by-hop router IPs in the network [15][16][17]. The traditional network path measurement approach based on Traceroute mainly uses a synchronous transceiving mechanism, which spends much more time waiting for response packets than the actual transceiving packets, thus severely limiting detection efficiency. ...
October 2020
... Internet players (Google, Facebook, Amazon) deployed their own private Wide Area Networks (WANs) close to the end users (i.e., in the periphery of the AS graph), to have more control over their end-to-end application performance (Wohlfart et al., 2018;Yap et al., 2017;Schlinker et al., 2017;Giotsas, Nomikos, et al., 2020;Gigis et al., 2021). In this flattening topology era, Internet Exchange Points (IXPs) emerged and played a key role in enabling large CDNs to bypass Tier-1 ISPs space is in the exhaustion phase (Huston, 2023). ...
October 2020
IEEE/ACM Transactions on Networking
... Since the launch of public cloud platforms, Some measurement studies have established TCP flows to perform bulk data transfers between virtual machines to measure inter-region [1][2][3][4], inter-cloud [5], and network performance. The rise of Internet Exchange Points [6,7] and cloud-owned private Wide Area Networks (WANs) [8,9] has led to the "flattening "of traditional cloud computing to hierarchical Internet topologies [10] and the provision of multi-cloud interconnectivity [5]. Efforts to reduce transmission overhead on Internet backbone are driven by intense competition among new and existing cloud providers, all vying to control the multi-billion dollar cloud services market [11]. ...
October 2020