By Topic

Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Amer Al-Ghadhban ; Computer Engineering Department, King Fahd University of Petroleum & Minerals, Saudi Arabia ; Marwan H. Abu-Amara

Recently, the Internet is essential in providing numerous services to different types of users. Preventing the users from accessing these services has a serious impact on the daily life of the user. In this paper we considered a scenario wherein a specific region is maliciously denied from accessing the Internet by a single upstream International Internet Service Provider (IISP). Assuming the availability of a cooperative AS, we prototype and evaluate a tunnel-based solution proposed by M. Abu-Amara [1]. The prototyping is conducted in a real laboratory designed and configured to be close to the Internet's ASes connectivity structure. Different tunneling protocols are examined with different Internet applications and background traffic loads. The prototyping proves the ability of the tunneling techniques in circumventing the Internet access denial performed by the malicious IISP. In addition, the IP-in-IP tunneling technique has shown the lowest end-to-end delay and traffic overhead.

Published in:

Communications and Information Technology (ICCIT), 2012 International Conference on

Date of Conference:

26-28 June 2012