Opendata, web and dolomites

RAVEN SIGNED

Routing Attack Vulnerability Evaluation for Networks

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "RAVEN" data sheet

The following table provides information about the project.

Coordinator
IDRYMA TECHNOLOGIAS KAI EREVNAS 

Organization address
address: N PLASTIRA STR 100
city: IRAKLEIO
postcode: 70013
website: www.forth.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Total cost 0 €
 EC max contribution 150˙000 € (0%)
 Programme 1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
 Code Call ERC-2019-PoC
 Funding Scheme ERC-POC-LS
 Starting year 2020
 Duration (year-month-day) from 2020-07-01   to  2021-12-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    IDRYMA TECHNOLOGIAS KAI EREVNAS EL (IRAKLEIO) coordinator 150˙000.00

Map

 Project objective

The Internet is a critical infrastructure that is composed of The Internet is a critical infrastructure that is composed of tens of thousands of networks and is required to work reliably 24/7. An integral functionality to achieve this is stable, efficient and secure routing of data traffic across several network domains. The current inter-domain routing protocol, BGP, facilitates the exchange of control-plane information (i.e., reachability of Internet resources over network paths) in a scalable and expressive manner; however, the lack of inherent security (e.g., authentication) mechanisms in its design frequently results in routing attacks. We focus on BGP prefix hijacking attacks, where a network, either due to malicious intent or because of a misconfiguration, advertises fraudulent/invalid information to the BGP routers of other networks; this information is propagated to the entire Internet, eventually leading to traffic being directed to invalid destinations (ending up dropped or intercepted and manipulated). Available proactive defenses are typically limited and inefficient. In our previous work, we have developed an advanced production-grade detection and mitigation tool that works reactively to counter these attacks. However, in practice, network operators cannot even measure how exposed their networks are to hijacking attempts, as well as their potential impact. In this project, we address exactly this need and aim to build a Proof of Concept (PoC) of a BGP hijacking vulnerability assessment service employing real-world experimentation, accurate simulations and realistic emulations. We aim to evaluate this PoC on at least two real networks, and refine its design using feedback from its future users, i.e., the network operators. We further plan to investigate key challenges towards the commercialization of such a service, namely estimating the costs for rolling out a global peering infrastructure that is needed, and defining the associated product offering.

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "RAVEN" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "RAVEN" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.1.)

AllergenDetect (2019)

Comprehensive allergen detection using synthetic DNA libraries

Read More  

RESOURCE Q (2019)

Efficient Conversion of Quantum Information Resources

Read More  

U-HEART (2018)

Unbreakable HEART: a reconfigurable and self-healing isolated dc/dc converter (U-HEART)

Read More