Abstract
A tunnel-based solution is presented in this paper to provide a resilient Internet access in face of a malicious act of denial of Internet access by higher-tier Internet service providers (ISPs). The proposed solution describes the different types of tunneling protocols that can be used, and the needed configurations to establish the tunnels. The validity of the proposed solution is demonstrated by means of network simulations using OPNET. Furthermore, the proposed solution is evaluated using different types of traffic generated by well known applications such as file transfer protocol (FTP) and video conferencing. We also considered different tunneling protocols such as IP-in-IP, generic routing encapsulation (GRE), and GRE with checksum under high traffic load. Based on the simulation results, the IP-in-IP tunneling protocol performs the best among all protocols considered in this work.
| Original language | English |
|---|---|
| Title of host publication | 2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011 |
| Pages | 85-89 |
| Number of pages | 5 |
| DOIs | |
| State | Published - 2011 |
Publication series
| Name | 2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011 |
|---|
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Keywords
- OPNET
- intentional Internet access denial
- malicious ISP
- resilient Internet
- tunneling protocol
ASJC Scopus subject areas
- Computer Networks and Communications
- Software
Fingerprint
Dive into the research topics of 'Resilient Internet access using tunnel-based solution for malicious ISP blocking'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver