Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Craig A. Shue is active.

Publication


Featured researches published by Craig A. Shue.


internet measurement conference | 2008

Understanding implications of DNS zone provisioning

Andrew J. Kalafut; Craig A. Shue; Minaxi Gupta

DNS is a critical component of the Internet. This paper takes a comprehensive look at the provisioning of Internet domains and its impact on the availability of various services. To gather data, we sweep 60% of the Internets domains for zone transfers. 6.6% of them allow us to transfer their complete information. We find that carelessness in handling DNS records can lead to reduced availability of name servers, email, and Web servers. It also undermines anti-spam efforts and the efforts to shut down phishing sites or to contain malware infections.


IEEE ACM Transactions on Networking | 2012

Abnormally malicious autonomous systems and their internet connectivity

Craig A. Shue; Andrew J. Kalafut; Minaxi Gupta

While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) depeerings and network shutdowns. In this paper, we explore whether some ASs indeed are safe havens for malicious activity. We look for ISPs and ASs that exhibit disproportionately high malicious behavior using 10 popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASs have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASs regularly peer with ASs associated with significant malicious activity. We also find that malicious ASs as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.


international conference on communications | 2007

IPSec: Performance Analysis and Enhancements

Craig A. Shue; Minaxi Gupta; Steven Myers

Internet protocol security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). In previous work, we examined the overheads incurred by an IPSec server in a single client setting. In this paper, we extend that work by examining the scaling of a VPN server in a multiple client environment and by evaluating the effectiveness of connection credential caching. Motivated by the potential benefits of caching, we also propose a cryptographically secure cache resumption protocol for IPSec connections to reduce the connection establishment overheads.


Proceedings of the Second ACM Workshop on Moving Target Defense | 2015

The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking

Douglas C. MacFarland; Craig A. Shue

Moving target systems can help defenders limit the utility of reconnaissance for adversaries, hindering the effectiveness of attacks. While moving target systems are a topic of robust research, we find that prior work in network-based moving target defenses has limitations in either scalability or the ability to protect public servers accessible to unmodified clients. In this work, we present a new moving target defense using software-defined networking (SDN) that can service unmodified clients while avoiding scalability limitations. We then evaluate this approach according to seven moving-target properties and evaluate its performance. We find that the approach achieves its security goals while introducing low overheads.


international conference on network protocols | 2005

Analysis of IPSec overheads for VPN servers

Craig A. Shue; Youngsang Shin; Minaxi Gupta; Jong Youl Choi

Internet protocol security (IPSec) is a widely deployed mechanism for implementing virtual private networks (VPNs). This paper evaluates the performance overheads associated with IPSec. We use Openswan, an open source implementation of IPSec, and measure the running times of individual security operations and also the speedup gained by replacing various IPSec components with no-ops. The main findings of this study include: VPN connection establishment and maintenance overheads for short sessions could be significantly higher than those incurred while transferring data, and cryptographic operations contribute 32 - 60% of the total IPSec overheads.


international conference on computer communications | 2010

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

Andrew J. Kalafut; Craig A. Shue; Minaxi Gupta

While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80\% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.


acm special interest group on data communication | 2012

On building inexpensive network capabilities

Craig A. Shue; Andrew J. Kalafut; Mark Allman; Curtis R. Taylor

There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipients network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a network and/or end host. However, leveraging capabilities results in added complexity and additional steps in the communication process: Before communication starts a remote host must be vetted and given a capability to use in the subsequent communication. In this paper, we propose a lightweight mechanism that turns the answers provided by DNS name resolution - which Internet communication broadly depends on anyway - into capabilities. While not achieving an ideal capability system, we show the mechanism can be built from commodity technology and is therefore a pragmatic way to gain some of the key benefits of capabilities without requiring new infrastructure.


internet measurement conference | 2007

The web is smaller than it seems

Craig A. Shue; Andrew J. Kalafut; Minaxi Gupta

The Web has grown beyond anybodys imagination. While significant research has been devoted to understanding aspects of the Web from the perspective of the documents that comprise it, we have little data on the relationship among servers that comprise the Web. In this paper, we explore the extent to which Web servers are co-located with other Web servers in the Internet. In terms of the location of servers, we find that the Web is surprisingly smaller than it seems. Our work has important implications for the availability of Web servers in case of DoS attacks and blocklisting.


Computer Networks | 2008

Packet forwarding with source verification

Craig A. Shue; Minaxi Gupta; Matthew Davy

Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such verification opens the door for a variety of vulnerabilities, including denial-of-service (DoS) and man-in-the-middle attacks. Currently proposed spoofing prevention approaches either focus on protecting only the target of such attacks and not the routing fabric used to forward spoofed packets, or fail under commonly occurring situations like path asymmetry. With incremental deployability in mind, this paper presents two complementary hop-wise packet tagging approaches that equip the routers to drop spoofed packets close to their point of origin. Our simulations show that these approaches dramatically reduce the amount of spoofing possible even under partial deployment.


ACM Transactions on Internet Technology | 2013

Resolvers Revealed: Characterizing DNS Resolvers and their Clients

Craig A. Shue; Andrew J. Kalafut

The Domain Name System (DNS) allows clients to use resolvers, sometimes called caches, to query a set of authoritative servers to translate host names into IP addresses. Prior work has proposed using the interaction between these DNS resolvers and the authoritative servers as an access control mechanism. However, while prior work has examined the DNS from many angles, the resolver component has received little scrutiny. Essential factors for using a resolver in an access control system, such as whether a resolver is part of an ISP’s infrastructure or running on an end-user’s system, have not been examined. In this study, we examine DNS resolver behavior and usage, from query patterns and reactions to nonstandard responses to passive association techniques to pair resolvers with their client hosts. In doing so, we discover evidence of security protocol support, misconfigured resolvers, techniques to fingerprint resolvers, and features for detecting automated clients. These measurements can influence the implementation and design of these resolvers and DNS-based access control systems.

Collaboration


Dive into the Craig A. Shue's collaboration.

Top Co-Authors

Avatar

Minaxi Gupta

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Curtis R. Taylor

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Kalafut

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Douglas C. MacFarland

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Brent Lagesse

University of Washington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed E. Najd

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Doran R. Smestad

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Erik M. Ferragut

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Nathanael Paul

Oak Ridge National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge