ABSTRACT The Border Gateway Protocol (BGP) is essential for the Internet to function, but remains in itself susceptible to certain types of attacks, such as a BGP hijack. In case of a …
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
J Li, J Stein, M Zhang, O Maennel - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
The inter-domain routing protocol of the Internet, ie, Border Gateway Protocol (BGP), is vulnerable to malicious attacks. Although many security solutions for BGP have been …
A Malhotra, S Goldberg - ACM SIGCOMM Computer Communication …, 2014 - dl.acm.org
BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that result from unintentional misconfigurations or deliberate attacks. To defend against these …
P Spadaccino, S Bruzzese, F Cuomo… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the standard protocol used for inter-domain routing in the Internet. Since it was designed without built-in security mechanisms, nowadays it results in …
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …
HB Patel, DR Patel - International Journal of Recent Trends in …, 2009 - Citeseer
Border Gateway Protocol (BGP), the only standard for interdomain routing in the Internet, is used to exchange information between Autonomous Systems (ASes). BGP possesses many …
Abstract The Border Gateway Protocol (BGP) is the de-facto standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of types …
P Reynolds, O Kennedy, EG Sirer… - Transactions on …, 2006 - cs.cornell.edu
External security monitors (ESMs) are a new network component for securing legacy protocols without requiring modifications to existing hardware, software, or the protocol. An …