@misc{17972, author = {Ioana Livadariu and Romain Fontugne and Amreesh Phokeer and Massimo Candela and Massimiliano Stucchi}, title = {A tale of two synergies: Uncovering RPKI practices for RTBH at IXPs}, abstract = {Denial of Service (DoS) attacks and route hijacking have become the most predominant network attacks. To address these threats, network operators currently rely on mitigation services like Remotely Triggered Black Hole (RTBH) and Resource Public Key Infrastructure (RPKI). In this paper, we seek to understand how operators leverage both of these mechanisms. Using data collected at multiple IXPs we infer network operators that use RTBH services. We collect RPKI data for the same set of organizations and determine which of those rely on both RTBH and RPKI. One-third of the selected operators do not use any of these services, while most of the ASes that trigger blackholes also deploy RPKI. Some of these operators employ poor RPKI practices that make their prefixes vulnerable to attacks. However, most operators rely on an RTBH-agnostic approach indicating the need to devise an approach that effectively combines these two mechanisms.}, year = {2024}, journal = {International Conference on Passive and Active Network Measurement}, pages = {88-103}, month = {03/2024}, publisher = {Springer Nature Switzerland}, isbn = {978-3-031-56251-8}, doi = {https://doi.org/10.1007/978-3-031-56252-5_5}, }