Skip to main navigation Skip to search Skip to main content

Resilient Internet access using tunnel-based solution for malicious ISP blocking

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

A tunnel-based solution is presented in this paper to provide a resilient Internet access in face of a malicious act of denial of Internet access by higher-tier Internet service providers (ISPs). The proposed solution describes the different types of tunneling protocols that can be used, and the needed configurations to establish the tunnels. The validity of the proposed solution is demonstrated by means of network simulations using OPNET. Furthermore, the proposed solution is evaluated using different types of traffic generated by well known applications such as file transfer protocol (FTP) and video conferencing. We also considered different tunneling protocols such as IP-in-IP, generic routing encapsulation (GRE), and GRE with checksum under high traffic load. Based on the simulation results, the IP-in-IP tunneling protocol performs the best among all protocols considered in this work.

Original languageEnglish
Title of host publication2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011
Pages85-89
Number of pages5
DOIs
StatePublished - 2011

Publication series

Name2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

Keywords

  • OPNET
  • intentional Internet access denial
  • malicious ISP
  • resilient Internet
  • tunneling protocol

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Resilient Internet access using tunnel-based solution for malicious ISP blocking'. Together they form a unique fingerprint.

Cite this