Skip to main content

Implications of Vulnerable Internet Infrastructure

  • Chapter
  • First Online:
Digital Marketplaces Unleashed

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Stewart, DNS cache poisoning, the next generation, 2003.

    Google Scholar 

  2. D. Kaminsky, “It’s the End of the Cache As We Know It,” Black Hat conference, 08 2008.

    Google Scholar 

  3. A. Herzberg und H. Shulman, “Security of patched DNS,” Computer Security – ESORICS 2012 – 17th European Symposium on Research in Computer Security, Pisa, Italy, 10–12 09 2012.

    Google Scholar 

  4. A. Herzberg und H. Shulman, “Vulnerable delegation of DNS resolution,” ESORICS 2013 – 18th European Symposium on Research in Computer Security, Egham, UK, 9–13 09 2013.

    Google Scholar 

  5. A. Herzberg und H. Shulman, “Fragmentation Considered Poisonous: or onedomain-to-rule-them-all.org,” IEEE CNS 2013. The Conference on Communications and Network Security, Washington, D.C.,US, 2013.

    Google Scholar 

  6. D. Anderson, Splinternet behind the great firewall of china, 11 Hrsg., Bd. 10, 2012.

    Google Scholar 

  7. M. Hu, Taxonomy of the snowden disclosures, Bd. 72, Wash & Lee L. Rev., 2015, pp. 1679–1989.

    Google Scholar 

  8. P. Levis, “The collateral damage of internet censorship by DNS injection,” ACM SIGCOMM Computer Communication Review, Nr. 3, 2012.

    Google Scholar 

  9. K. Schomp, T. Callahan, M. Rabinovich und M. Allman, “Assessing DNS vulnerability to record injection,” in Passive and Active Measurement, Springer, 2014, pp. 214–223.

    Chapter  Google Scholar 

  10. M. Wander, C. Boelmann, L. Schwittmann und T. Weis, Measurement of globally visible DNS injection, Bd. 2, IEEE, 2014.

    Google Scholar 

  11. A. Borgwart, S. Boukoros, H. Shulman, C. van Rooyen und M. Waidner, “Detection and forensics of domains hijacking”.2015 IEEE Global Communications Conference (GLOBECOM).

    Book  Google Scholar 

  12. H. Shulman und M. Waidner, “Fragmentation Considered Leaking: Port Inference for DNS Poisoning,” Applied Cryptography and Network Security (ACNS), Lausanne, Switzerland, 2014.

    MATH  Google Scholar 

  13. A. Herzberg und H. Shulman, “Socket Overloading for Fun and Cache Poisoning,” ACM Annual Computer Security Applications Conference (ACM ACSAC), New Orleans, Louisiana, US, 12 2013.

    Book  Google Scholar 

  14. W. Lian, E. Rescorla, H. Shacham und S. Savage, “Measuring the Practical Impact of DNSSEC Deployment,” Proceedings of USENIX Security, 2013.

    Google Scholar 

  15. T. Dai, H. Shulman und M. Waidner, “Measuring DNSSEC Pitfalls in Signed Domains,” International Conference on Cryptology and Network Security, 2015.

    Google Scholar 

  16. L. Valenta, S. Cohney, A. Liao, J. Fried, S. Bodduluri und N. Heniger, Factoring as a service.

    Google Scholar 

  17. BGPMon, BGP Routing Incidents in 2014, 2015.

    Google Scholar 

  18. renesys.com, “The New Threat: Targeted Internet Traffic Misdirection,” 11 2013. [Online]. Available: http://www.renesys.com/2013/11/mitm-internet-hijacking/.

  19. A. Toonk, BGP Hijack Incident by Syrian Telecommunications Establishment, BGPMon Blog, 2015.

    Google Scholar 

  20. A. Toonk, “Hijack Event Today by Indosat,” [Online]. Available: http://www.bgpmon.net/hijack-event-today-by-indosat/.

  21. P.-A. Vervier, O. Thonnard und M. Dacier, “Mind Your Blocks: On the Sealthiness of Malicious BGO Hijacks,” NDSS – The Internet Society, 2015. [Online]. Available: http://www.internetsociety.org/events/ndss-symposium-2015.

  22. NIST, “NIST RPKI Monitor,” 2015. [Online]. Available: http://rpki-monitor.antd.nist.gov/.

  23. A. Cohen, Y. Gilad, A. Herzberg, M. Schapira und H. Shulman, Are We There Yet? On RPKI’s Deployment and Security, NDSS, 2017.

    Google Scholar 

  24. Cisco, BGP Origin AS Validation, Cisco IOS guide, 2013.

    Google Scholar 

  25. S. Goldberg, Why is it Taking so Long to Secure Internet Routing?, 10 Hrsg., Bd. 57, Commun. ACM, 2014, pp. 56–63.

    Article  Google Scholar 

Further Reading

  1. A. Pastor, BT Home Flub: Pwnin the BT Home Hub, 2007.

    Google Scholar 

  2. Embedded Device Hacking. Reverse Engineering a D-Link Backdoor, 2013.

    Google Scholar 

  3. D. Longenecker, SURFboard modem unauthenticated reboot aw, ARRIS (Motorola), 2016.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haya Shulman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer-Verlag GmbH Germany

About this chapter

Cite this chapter

Shulman, H. (2018). Implications of Vulnerable Internet Infrastructure. In: Linnhoff-Popien, C., Schneider, R., Zaddach, M. (eds) Digital Marketplaces Unleashed. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49275-8_81

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49275-8_81

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49274-1

  • Online ISBN: 978-3-662-49275-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics