Perfect is the enemy of good: Setting realistic goals for BGP security

Y Gilad, T Hlavacek, A Herzberg, M Schapira… - Proceedings of the 17th …, 2018 - dl.acm.org
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of
today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …

[PDF][PDF] Vulnerability of dns name servers against bgp hijacking

R Linssen - 2020 - utwente.nl
ABSTRACT The Border Gateway Protocol (BGP) is essential for the Internet to function, but
remains in itself susceptible to certain types of attacks, such as a BGP hijack. In case of a …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

An expectation-based approach to policy-based security of the Border Gateway Protocol

J Li, J Stein, M Zhang, O Maennel - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
The inter-domain routing protocol of the Internet, ie, Border Gateway Protocol (BGP), is
vulnerable to malicious attacks. Although many security solutions for BGP have been …

RPKI vs ROVER: comparing the risks of BGP security solutions

A Malhotra, S Goldberg - ACM SIGCOMM Computer Communication …, 2014 - dl.acm.org
BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that
result from unintentional misconfigurations or deliberate attacks. To defend against these …

Analysis and emulation of BGP hijacking events

P Spadaccino, S Bruzzese, F Cuomo… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the standard protocol used for inter-domain routing in the
Internet. Since it was designed without built-in security mechanisms, nowadays it results in …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

[PDF][PDF] Performance analysis of BGP security proposals

HB Patel, DR Patel - International Journal of Recent Trends in …, 2009 - Citeseer
Border Gateway Protocol (BGP), the only standard for interdomain routing in the Internet, is
used to exchange information between Autonomous Systems (ASes). BGP possesses many …

[PDF][PDF] Pretty Secure BGP, psBGP.

T Wan, E Kranakis, PC van Oorschot - NDSS, 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP) is the de-facto standard inter-domain routing
protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of types …

[PDF][PDF] Using External Security Monitors to Secure BGP

P Reynolds, O Kennedy, EG Sirer… - Transactions on …, 2006 - cs.cornell.edu
External security monitors (ESMs) are a new network component for securing legacy
protocols without requiring modifications to existing hardware, software, or the protocol. An …