Securing BGP communities: design of a new RPKI object to mitigate BGP community attacks

R Huisman - 2022 - repository.tudelft.nl
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack
that exploits the community attribute. These community attacks can influence BGP routing in …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

Using resource public key infrastructure for secure border gateway protocol

G Chang, M Arianezhad… - 2016 IEEE Canadian …, 2016 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is a widely used Internet routing protocol. While several
security features have been introduced and implemented to prevent attacks and address …

[PDF][PDF] A reproduction of “jumpstarting BGP security with path-end validation”

W Brand, J Posen - 2020 - reproducingnetworkresearch …
The Border Gateway Protocol (BGP) responsible for interdomain routing on the internet is
subject to frequent attacks that threaten the privacy and availability of traffic between …

Poster: Taking the low road: How RPKI invalids propagate

B Du, C Testart, R Fontugne, AC Snoeren… - Proceedings of the ACM …, 2023 - dl.acm.org
The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of
routing information exchanged between networks. To defend against unauthorized use of …

[PDF][PDF] Evaluating the performance impact of PKI on BGP security

M Zhao, SW Smith, DM Nicol - Multiple Paths to Trust, 2005 - tsapps.nist.gov
Abstract The Border Gateway Protocol is central to making the In ternet work. However,
because it relies on routers from many organizations believing and passing along informa …

An infrastructure supporting secure internet routing

S Kent - European Public Key Infrastructure Workshop, 2006 - Springer
Abstract The Border Gateway Protocol (BGP)[1] is the foundation of inter-domain Internet
routing. A number of papers have described how BGP is highly vulnerable to a wide range …

Bgpy: The bgp python security simulator

J Furuness, C Morris, R Morillo, A Herzberg… - Proceedings of the 16th …, 2023 - dl.acm.org
The security of Border Gateway Protocol (BGP), and inter-domain routing in general,
remains a challenge, in spite of its well-known importance, repeated attacks and incidents …

Symmetric key approaches to securing BGP—a little bit trust is enough

B Bruhadeshwar, SS Kulkarni… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol that
connects autonomous systems (ASes). Despite its importance for the Internet infrastructure …

Perfect is the enemy of good: Setting realistic goals for BGP security

Y Gilad, T Hlavacek, A Herzberg, M Schapira… - Proceedings of the 17th …, 2018 - dl.acm.org
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of
today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …