Beware of BGP attacks

O Nordström, C Dovrolis - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
… proposed countermeasures for BGP security, namely route filtering and S-BGP, together …
Unfortunately, neither filtering nor S-BGP can prevent all the attacks that we consider. S-BGP is …

Reviewing a Historical Internet Vulnerability: Why Isn't BGP More Secure and What Can We Do About it?

C Testart - 2018 - papers.ssrn.com
… Although the first version of BGP was published in 1989 and its lack of security mechanisms
has been known since then, BGP remains vulnerable to attacks that can cause large scale …

Identifying and Addressing Reachability and Policy Attacks in “Secure” BGP

Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two
serious attacks on two of the most fundamental goals of BGP… ASes have to be aware of the …

Securing BGP—A literature survey

G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
… forms of attack. This paper examines the Internet’s routing architecture and the design of BGP
in … In such a case the parties my not be aware that an eavesdropping attack is taking place. …

[PDF][PDF] A survey of BGP security

K Butler, T Farley, P McDaniel, J Rexford - ACM, draft version, 2004 - Citeseer
… Consider that a well-planned, targeted, malicious attack on BGP could do very serious harm
attacks on BGP sessions. A popular and inexpensive countermeasure against attacks on …

ARTEMIS: Neutralizing BGP hijacking within a minute

P Sermpezis, V Kotronis, P Gigis… - … ACM transactions on …, 2018 - ieeexplore.ieee.org
… in BGP hijacking defense approaches. In this work, we first define our threat model and propose
a novel attack … -0/1 events, since the operator might not be aware of all its 2nd, 3rd,... hop …

[PDF][PDF] Stealthy Attacks to the BGP Routing System

J Henke - 2014 - inet.haw-hamburg.de
… This paper describes an attack pattern created by new combinations of known and exploitation
strategies of the BGP. It is called "stealthy BGP-level attacks", because the most important …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
… In this work, we conduct an up-to-date review of fundamental BGP vulnerabilities and possible
attacks. We also bring together various requirements for BGP security solutions based on …

Identifying and addressing protocol manipulation attacks in" secure" BGP

Y Song, A Venkataramani, L Gao - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
attacks based on manipulating the complex BGP protocol itself. … BGP mechanism is used
to commit the attacks, we name the topologies that are vulnerable to the corresponding attacks

BGP hijacking classification

S Cho, R Fontugne, K Cho, A Dainotti… - 2019 Network Traffic …, 2019 - ieeexplore.ieee.org
… Finally, in this paper, we focus on only BGP hijack attacks, but we plan to extend our datasets
to include the data of all anomalies and utilize our features to characterize the anomalies. …