K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …
G Chang, M Arianezhad… - 2016 IEEE Canadian …, 2016 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is a widely used Internet routing protocol. While several security features have been introduced and implemented to prevent attacks and address …
W Brand, J Posen - 2020 - reproducingnetworkresearch …
The Border Gateway Protocol (BGP) responsible for interdomain routing on the internet is subject to frequent attacks that threaten the privacy and availability of traffic between …
The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of routing information exchanged between networks. To defend against unauthorized use of …
M Zhao, SW Smith, DM Nicol - Multiple Paths to Trust, 2005 - tsapps.nist.gov
Abstract The Border Gateway Protocol is central to making the In ternet work. However, because it relies on routers from many organizations believing and passing along informa …
S Kent - European Public Key Infrastructure Workshop, 2006 - Springer
Abstract The Border Gateway Protocol (BGP)[1] is the foundation of inter-domain Internet routing. A number of papers have described how BGP is highly vulnerable to a wide range …
The security of Border Gateway Protocol (BGP), and inter-domain routing in general, remains a challenge, in spite of its well-known importance, repeated attacks and incidents …
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure …
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …