41 Scopus citations


IP routing is notoriously vulnerable to accidental misconfiguration and malicious attack. Although secure routing protocols are an important defense, the data plane must be part of any complete solution. Existing proposals for secure (link-level) forwarding are heavy-weight, requiring cryptographic operations at each hop in a path. Instead, we propose a light-weight data-plane mechanism (called stealth probing) that monitors the availability of paths in a secure fashion, while enabling the management plane to home in on the location of adversaries by combining the results of probes from different vantage points (called Byzantine tomography). We illustrate how stealth probing and Byzantine tomography can be applied in today’s routing architecture, without requiring support from end hosts or internal routers.

Original languageEnglish (US)
Number of pages6
StatePublished - 2006
Event2006 USENIX Annual Technical Conference - Boston, United States
Duration: May 30 2006Jun 3 2006


Conference2006 USENIX Annual Technical Conference
Country/TerritoryUnited States

All Science Journal Classification (ASJC) codes

  • General Computer Science


Dive into the research topics of 'Stealth probing: Efficient data-plane security for IP routing'. Together they form a unique fingerprint.

Cite this