<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Year-2020</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/822" rel="alternate"/>
<subtitle/>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/822</id>
<updated>2026-04-04T07:20:23Z</updated>
<dc:date>2026-04-04T07:20:23Z</dc:date>
<entry>
<title>Maginot lines and tourniquets : on the defendability of national cyberspace</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/843" rel="alternate"/>
<author>
<name>Gosain, Devashish</name>
</author>
<author>
<name>Rawat, Madhur</name>
</author>
<author>
<name>Sharma, Piyush Kumar</name>
</author>
<author>
<name>Acharya, Hrishikesh Bhatt</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/843</id>
<updated>2021-08-04T10:15:26Z</updated>
<published>2020-01-01T00:00:00Z</published>
<summary type="text">Maginot lines and tourniquets : on the defendability of national cyberspace
Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt
National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable to scans (Shodan), attacks (DDoS from botnets like Mirai), etc., when made accessible on the Internet. How hard is it for a national government to effectively secure its entire cyberspace? We approach this problem from the view that a coordinated defense involves monitors and access control (firewalls etc.) to inspect traffic entering or leaving the country, as well as internal traffic. In several case studies, we consistently find a natural Line of Defense — a small number of Autonomous Systems (ASes) that intercept most (&gt; 95%) network paths in the country. We conclude that in many countries, the structure of the Internet actually makes it practical to build a nation-scale cordon, to detect and filter cyber attacks.
</summary>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</entry>
</feed>
