DRAGO: Detecting, Quantifying and Locating Hidden Routers in Traceroute IP Paths

被引:0
|
作者
Marchetta, Pietro [1 ]
Pescape, Antonio [1 ]
机构
[1] Univ Naples Federico II, Naples, Italy
关键词
LEVEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traceroute is probably the most famous networking tool widely adopted in both industry and research. Despite its long life, however, measurements based on Traceroute are potentially inaccurate, misleading or incomplete due to several unresolved issues. In this paper, we face the limitation represented by hidden routers - devices that do not decrement the TTL, being thus totally invisible to Traceroute. We present, evaluate and release DRAGO, a novel active probing technique composed of three main steps. First, a novel Traceroute enhanced by the IP Timestamp option is launched toward a destination. Second, a procedure is applied to quantify the hidden routers contained in the path, if any. Third, a last procedure is performed to identify the exact position in the path of the detected hidden routers. Experimental results demonstrate that the phenomenon is not uncommon: DRAGO detects the presence of hidden routers in at least 6% of the considered Traceroute IP paths and limits the affected area to one fifth of the trace containing these devices.
引用
收藏
页码:3237 / 3242
页数:6
相关论文
共 13 条
  • [1] DRAGO: Detecting, Quantifying and Locating Hidden Routers in Traceroute IP Paths
    Marchetta, Pietro
    Pescape, Antonio
    [J]. 2013 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2013, : 109 - 114
  • [2] Detecting Third-party Addresses in Traceroute IP Paths
    Marchetta, Pietro
    de Donato, Walter
    Pescape, Antonio
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 109 - 110
  • [3] Distributed traceroute approach to geographically locating IP devices
    Connolly, G
    Sachenko, A
    Markowsky, G
    [J]. IDAACS'2003: PROCEEDINGS OF THE SECOND IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2003, : 128 - 131
  • [4] Traceroute based IP channel for sending hidden short messages
    Trabelsi, Zouheir
    El-Sayed, Hesham
    Frikha, Lilia
    Rabie, Tamer
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 421 - 436
  • [5] Detecting Hidden Enemy Lines in IP Address Space
    Mathur, Suhas
    Coskun, Baris
    Balakrishnan, Suhrid
    [J]. PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), 2013, : 19 - 29
  • [6] Detecting and locating configuration errors in IP VPNs with Graph Neural Networks
    Mohammedi, El-Heithem
    Lavinal, Emmanuel
    Fleury, Guillaume
    [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [7] A structural decomposition approach for detecting, locating, and quantifying nonlinearities in chain-like systems
    Hernandez-Garcia, Miguel R.
    Masri, Sami F.
    Ghanem, Roger
    Figueiredo, Eloi
    Farrar, Charles R.
    [J]. STRUCTURAL CONTROL & HEALTH MONITORING, 2010, 17 (07): : 761 - 777
  • [8] Synchrosqueezed wavelet transform-fractality model for locating, detecting, and quantifying damage in smart highrise building structures
    Amezquita-Sanchez, Juan P.
    Adeli, Hojjat
    [J]. SMART MATERIALS AND STRUCTURES, 2015, 24 (06)
  • [9] Detecting, Locating, & Quantifying False Data Injections Utilizing Grid Topology through Optimized D-FACTS Device Placement
    Kuntz, Kaci
    Smith, Michael
    Wedeward, Kevin
    Collins, Michael
    [J]. 2014 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2014,
  • [10] A technique for real-time detecting, locating, and quantifying damage in large polymer composite structures made of carbon fibers and carbon nanotube networks
    Naghashpour, Ali
    Suong Van Hoa
    [J]. STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL, 2015, 14 (01): : 35 - 45