… Although the first version of BGP was published in 1989 and its lack of security mechanisms has been known since then, BGP remains vulnerable to attacks that can cause large scale …
Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
… attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious attacks on two of the most fundamental goals of BGP… ASes have to beaware of the …
G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
… forms of attack. This paper examines the Internet’s routing architecture and the design of BGP in … In such a case the parties my not beaware that an eavesdropping attack is taking place. …
… Consider that a well-planned, targeted, malicious attack on BGP could do very serious harm … attacks on BGP sessions. A popular and inexpensive countermeasure against attacks on …
… in BGP hijacking defense approaches. In this work, we first define our threat model and propose a novel attack … -0/1 events, since the operator might not beaware of all its 2nd, 3rd,... hop …
… This paper describes an attack pattern created by new combinations of known and exploitation strategies of the BGP. It is called "stealthy BGP-level attacks", because the most important …
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
… In this work, we conduct an up-to-date review of fundamental BGP vulnerabilities and possible attacks. We also bring together various requirements for BGP security solutions based on …
… attacks based on manipulating the complex BGP protocol itself. … BGP mechanism is used to commit the attacks, we name the topologies that are vulnerable to the corresponding attacks …
… Finally, in this paper, we focus on only BGP hijack attacks, but we plan to extend our datasets to include the data of all anomalies and utilize our features to characterize the anomalies. …