Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gabi Nakibly is active.

Publication


Featured researches published by Gabi Nakibly.


privacy enhancing technologies | 2013

OSS: Using Online Scanning Services for Censorship Circumvention

David Fifield; Gabi Nakibly; Dan Boneh

We introduce the concept of a web-based online scanning service, or OSS for short, and show that these OSSes can be covertly used as proxies in a censorship circumvention system. Such proxies are suitable both for short one-time rendezvous messages and bulk bidirectional data transport. We show that OSSes are widely available on the Internet and blocking all of them can be difficult and harmful. We measure the number of round trips and the amount of data that can be pushed through various OSSes and show that we can achieve throughputs of about 100 KB/sec. To demonstrate the effectiveness of our approach we built a system for censored users to communicate with blocked Tor relays using available OSS providers. We report on its design and performance.


computer aided verification | 2013

Finding security vulnerabilities in a network protocol using parameterized systems

Adi Sosnovich; Orna Grumberg; Gabi Nakibly

This paper presents a novel approach to automatically finding security vulnerabilities in the routing protocol OSPF --- the most widely used protocol for Internet routing. We start by modeling OSPF on (concrete) networks with a fixed number of routers in a specific topology. By using the model checking tool CBMC, we found several simple, previously unpublished attacks on OSPF. In order to search for attacks in a family of networks with varied sizes and topologies, we define the concept of an abstract network which represents such a family. The abstract network


IEEE ACM Transactions on Networking | 2015

Optimizing data plane resources for multipath flows

Gabi Nakibly; Reuven Cohen; Liran Katzir

{\cal A}


computer and communications security | 2012

Network-based intrusion detection systems go active!

Eitan Menahem; Gabi Nakibly; Yuval Elovici

has the property that if there is an attack on


arXiv: Cryptography and Security | 2013

ACTIDS: an active strategy for detecting and localizing network attacks

Eitan Menahem; Yuval Elovici; Nir Amar; Gabi Nakibly

{\cal A}


international conference on logic programming | 2015

Analyzing Internet Routing Security Using Model Checking

Adi Sosnovich; Orna Grumberg; Gabi Nakibly

then there is a corresponding attack on each of the (concrete) networks represented by


usenix security symposium | 2014

Gyrophone: recognizing speech from gyroscope signals

Yan Michalevsky; Dan Boneh; Gabi Nakibly

{\cal A}


arXiv: Cryptography and Security | 2014

Mobile Device Identification via Sensor Fingerprinting

Hristo Bojinov; Yan Michalevsky; Gabi Nakibly; Dan Boneh

. The attacks we have found on abstract networks reveal security vulnerabilities in the OSPF protocol, which can harm routing in huge networks with complex topologies. Finding such attacks directly on the huge networks is practically impossible. Abstraction is therefore essential. Further, abstraction enables showing that the attacks are general. That is, they are applicable in a large (even infinite) number of networks. This indicates that the attacks exploit fundamental vulnerabilities, which are applicable to many configurations of the network.


network and distributed system security symposium | 2012

Persistent OSPF Attacks.

Gabi Nakibly; Alex Kirshon; Dima Gonikman; Dan Boneh

In many modern networks, such as datacenters, optical networks, and multiprotocol label switching (MPLS), the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the networks bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes, such as TCAM entries of Ethernet/MPLS switches and wavelengths/lightpaths of optical switches. In this paper, we define several problems related to splitting a traffic flow over multiple paths while minimizing the consumption of forwarding resources, and present efficient algorithms for solving these problems.


arXiv: Cryptography and Security | 2015

Hardware Fingerprinting Using HTML5

Gabi Nakibly; Gilad Shelef; Shiran Yudilevich

In this work we investigate a new approach for detecting network-wide attacks that aim to degrade the networks Quality of Service (QoS). To this end, a new network-based intrusion detection system (NIDS) is proposed. In contrast to the passive approach which most contemporary NIDS follow and which relies solely on production traffic monitoring, the propose NIDS takes the active approach where special crafted probes are sent according to a known probability distribution in order to monitor the network for anomalous behavior. The proposed approach takes away much of the variability of network traffic that makes it so difficult to classify, and therefore can detect subtle attacks which would not be detected passively. Furthermore, the active probing approach allows the NIDS to be effectively trained using only examples of the networks normal states, hence enabling an effective detection of zero-day attacks. Preliminary results on a real-life ISP network topology demonstrate the advantages of the proposed NIDS.

Collaboration


Dive into the Gabi Nakibly's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adi Sosnovich

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eitan Menahem

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Orna Grumberg

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yuval Elovici

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jonathan Kalechstein

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Liran Katzir

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Michael Arov

Rafael Advanced Defense Systems

View shared research outputs
Top Co-Authors

Avatar

Nir Amar

Ben-Gurion University of the Negev

View shared research outputs
Researchain Logo
Decentralizing Knowledge