{"id":"https://openalex.org/W4400689339","doi":"https://doi.org/10.1145/3673422.3674899","title":"Assessing the security of Internet paths: A case study of Dutch critical infrastructures","display_name":"Assessing the security of Internet paths: A case study of Dutch critical infrastructures","publication_year":2024,"publication_date":"2024-07-16","ids":{"openalex":"https://openalex.org/W4400689339","doi":"https://doi.org/10.1145/3673422.3674899"},"language":"en","primary_location":{"id":"doi:10.1145/3673422.3674899","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3673422.3674899","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop on zzz","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3673422.3674899","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018589115","display_name":"Shyam Krishna Khadka","orcid":"https://orcid.org/0000-0003-3660-6226"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Shyam Krishna Khadka","raw_affiliation_strings":["University of Twente"],"raw_orcid":"https://orcid.org/0000-0003-3660-6226","affiliations":[{"raw_affiliation_string":"University of Twente","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041994291","display_name":"Suzan Bayhan","orcid":"https://orcid.org/0000-0001-6662-704X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Suzan Bayhan","raw_affiliation_strings":["University of Twente"],"raw_orcid":"https://orcid.org/0000-0001-6662-704X","affiliations":[{"raw_affiliation_string":"University of Twente","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005480813","display_name":"Ralph Holz","orcid":"https://orcid.org/0000-0001-9614-2377"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["DE","NL"],"is_corresponding":false,"raw_author_name":"Ralph Holz","raw_affiliation_strings":["University of Twente and University of M\u00fcnster"],"raw_orcid":"https://orcid.org/0000-0001-9614-2377","affiliations":[{"raw_affiliation_string":"University of Twente and University of M\u00fcnster","institution_ids":["https://openalex.org/I94624287","https://openalex.org/I22465464"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018666006","display_name":"Cristian Hesselman","orcid":"https://orcid.org/0000-0002-7052-9300"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cristian Hesselman","raw_affiliation_strings":["SIDN Labs and University of Twente"],"raw_orcid":"https://orcid.org/0000-0002-7052-9300","affiliations":[{"raw_affiliation_string":"SIDN Labs and University of Twente","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018589115"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10955428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6335342526435852},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6159409880638123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5413939356803894},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33490055799484253},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2062700390815735}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6335342526435852},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6159409880638123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5413939356803894},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33490055799484253},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2062700390815735}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3673422.3674899","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3673422.3674899","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop on zzz","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire/f26fcba8-2631-46e4-9d5a-a74ecd3471c3","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/f26fcba8-2631-46e4-9d5a-a74ecd3471c3","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Khadka, S K, Bayhan, S, Holz, R & Hesselman, C E W 2024, Assessing the security of Internet paths: A case study of Dutch critical infrastructures. in ANRW 2024 : Proceedings of the 2024 Applied Networking Research Workshop. Association for Computing Machinery, pp. 67-73, Applied Networking Research Workshop, ANRW 2024, Vancouver, Canada, 20/07/24. https://doi.org/10.1145/3673422.3674899","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3673422.3674899","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3673422.3674899","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Applied Networking Research Workshop on zzz","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W95608104","https://openalex.org/W2015550779","https://openalex.org/W2062573769","https://openalex.org/W2085963983","https://openalex.org/W2123491545","https://openalex.org/W2151972741","https://openalex.org/W2914040074","https://openalex.org/W3030428357","https://openalex.org/W3036161615","https://openalex.org/W3172124585","https://openalex.org/W3208493393","https://openalex.org/W4310614701","https://openalex.org/W4385624941","https://openalex.org/W4387880869","https://openalex.org/W4387881018","https://openalex.org/W4389934600","https://openalex.org/W6907480416"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Many":[0],"critical":[1],"infrastructures":[2],"(CIs)":[3],"rely":[4],"on":[5,120,228],"cloud":[6,39,79],"services":[7],"(e.g.,":[8],"email)":[9],"for":[10,129],"their":[11,29,38,50],"daily":[12],"operations.":[13],"However,":[14],"these":[15],"CIs":[16,139,148,187,213],"typically":[17],"have":[18],"limited":[19],"insight":[20],"into":[21],"the":[22,26,34,68,78,83,87,92,118,121,141,163,168,172,177,185,208,220],"security":[23],"status":[24],"of":[25,91,171,179,194,212,222],"paths":[27,107,136,183,225],"that":[28,49,57,104,203],"traffic":[30,51],"might":[31,46],"follow":[32],"across":[33],"Internet":[35],"to":[36,72,82,111,115,133,143,188],"reach":[37],"provider's":[40],"infrastructures.":[41],"For":[42],"example,":[43],"a":[44,66,101,130,191],"CI":[45,69,84],"not":[47,59],"know":[48],"passes":[52],"through":[53],"Autonomous":[54],"Systems":[55],"(ASes)":[56],"do":[58],"implement":[60],"Route":[61],"Origin":[62],"Validation":[63],"(ROV).":[64],"As":[65],"result,":[67],"is":[70],"vulnerable":[71],"prefix":[73],"hijacks,":[74],"which":[75,146],"can":[76],"render":[77],"operator":[80],"unavailable":[81],"or":[85],"breach":[86],"confidentiality":[88],"and":[89,113],"integrity":[90],"CI's":[93],"data.":[94],"To":[95],"provide":[96],"such":[97],"insights,":[98],"we":[99],"develop":[100],"generic":[102],"method":[103,128],"finds":[105],"plausible":[106],"from":[108,137,158,184],"one":[109],"AS":[110],"another":[112],"identifies":[114],"what":[116],"extent":[117],"ASes":[119],"path":[122],"support":[123],"ROV.":[124],"We":[125,150],"use":[126,151],"our":[127],"case":[131,199],"study":[132,200],"find":[134],"secure":[135],"four":[138,159,186],"in":[140,162,165,216,219],"Netherlands":[142,164],"Microsoft":[144,189],"mail,":[145],"many":[147],"use.":[149],"Border":[152],"Gateway":[153],"Protocol":[154],"(BGP)":[155],"routing":[156],"data":[157],"route":[160],"collectors":[161],"combination":[166],"with":[167],"ROV":[169,205],"scores":[170],"ASes.":[173],"Our":[174,198],"analysis":[175],"shows":[176,202],"existence":[178],"multiple":[180],"fully":[181,206,223],"ROV-protected":[182,196,224],"among":[190],"larger":[192],"set":[193],"partially":[195],"paths.":[197],"also":[201],"implementing":[204],"by":[207,226],"immediate":[209],"upstream":[210],"providers":[211],"would":[214],"result":[215],"an":[217],"increase":[218],"number":[221],"72.5%":[227],"average.":[229]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
