Beating BGP is Harder than we Thought

T Arnold, M Calder, I Cunha, A Gupta… - Proceedings of the 18th …, 2019 - dl.acm.org
… The shortcomings of BGP are many and well documented, but in this paper we ask the
community to take a step back and rethink what we know about BGP. We examine three separate …

[PDF][PDF] Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.

PA Vervier, O Thonnard, M Dacier - NDSS, 2015 - eurecom.fr
… The identification of what we believe to be more than 2,000 … counter-measures to defeat the
attacks we have found. … design more complex decision modeling schemes, in which we can …

It bends but would it break? topological analysis of BGP infrastructures in europe

S Frey, Y Elkhatib, A Rashid, K Follis… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
BGP variants [1], [18], [51]–[53] and new attacks defeating … The coverage that our vantage
points provide is difficult to … We decided to simplify the dataset and limit our analysis to the …

[图书][B] Troubleshooting BGP: A practical guide to understanding and troubleshooting BGP

V Jain, B Edgeworth - 2016 - books.google.com
BGP can be thought of as a control plane routing protocol or as an application, because it …
IOS and NX-OS devices initiate a hard reset with the command clear ip bgp ip-address [soft]…

Fixing BGP might be difficult-or not so tough

G Goth - IEEE internet computing, 2003 - ieeexplore.ieee.org
… to do, in the sense that you want people to have an agreed… “I think we achieved further
refinement of people’s thinking of … , and by that I mean somebody’s going to have to beat up on it …

[PDF][PDF] Listen and whisper: Security mechanisms for BGP

L Subramanian, V Roth, I Stoica, S Shenker, R Katz - Proc. NSDI, 2004 - researchgate.net
… It is particularly difficult to secure against colluding attackers. … defeat Listen’s attempts to
detect problems on the data path. … We believe that this modification to BGP policies should have …

Down the black hole: dismantling operational practices of BGP blackholing at IXPs

M Nawrocki, J Blendin, C Dietzel, TC Schmidt… - Proceedings of the …, 2019 - dl.acm.org
… Permission to make digital or hard copies of all or part of this work for personal or classroom
use is … We deliberately decided not to quantify collateral damage as a relative traffic share. …

[PDF][PDF] Pretty Secure BGP, psBGP.

T Wan, E Kranakis, PC van Oorschot - NDSS, 2005 - Citeseer
… For a large organization like UUNET (in this case), we believe that this worst case3 of 5 465
… appear to be quite difficult to build such an infrastructure, we suggest that the decentralized …

Detecting Traffic Engineering from public BGP data

O Darwich, C Pelsser, K Vermeulen - 2024 - hal.science
We find that on average, a BGP vantage point sees 35% of … Quantifying the impact of TE on
BGP stability, we find that TE … Beating bgp is harder than we thought. In: Proceedings of the …

Are BGP routers open to attack? an experiment

L Cavedon, C Kruegel, G Vigna - … Problems in Network Security: IFIP WG …, 2011 - Springer
… connection between two BGP routers (which is very hard to carry out). … We decided not to
attempt to send such an update, as that … BGP probes hitting some rate-limiting firewalls of these …