Rfc 4272: Bgp security vulnerabilities analysis

S Murphy - 2006 - dl.acm.org
Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols
designed before the Internet environment became perilous, was originally designed with …

[PDF][PDF] BGP Origin Validation (RPKI)

R de Boer, J de Koning - … and network engineering group, Tech. Rep, 2013 - caldav.os3.nl
Abstract Border Gateway Protocol (BGP) is the routing protocol that is used in the core of the
Internet. In the past years it has been shown over and over again that configuration errors …

[PDF][PDF] Securing bgp with bgpsec

G Huston, R Bush - The Internet Protocol Forum, 2011 - dotnxdomain.net
For many years the Internet's fundamental elements–names and addresses–were the
source of basic structural vulnerabilities in the network. With the increasing momentum …

Efficient security mechanisms for the border gateway routing protocol

BR Smith, JJ Garcia-Luna-Aceves - Computer Communications, 1998 - Elsevier
We analyze the security of the BGP routing protocol and identify a number of vulnerabilities
in its design and the corresponding threats. We then present modifications to the protocol …

A Fraud Prevention BGP Protocol: CP-BGP

Y Wu, R Yu, R Wang - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the glue of the Internet and the only routing protocol to
route between different Autonomous Systems (ASes). Recently the attacks targeting BGP …

A Certificate Pin BGP Protocol: CP-BGP

Y Wu, R Wang, X Xu - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is always the target of the attacks since it is the only routing
protocol connecting different Autonomous Systems (ASes) in Internet. BGP fraud is one of …

[图书][B] Instability, security and anomaly detection in Border Gateway Protocol

K Zhang - 2007 - search.proquest.com
BGP, the de facto inter-domain routing protocol, is the core component of Internet
infrastructure. As the size, complexity, and connectivity of the Internet increase, the stability …

How to prevent AS hijacking attacks

J Schlamp, G Carle, EW Biersack - … of the 2012 ACM conference on …, 2012 - dl.acm.org
The Border Gateway Protocol (BGP) was designed without security aspects in mind. This
fact makes the Internet vulnerable to attacks: complete networks can be hijacked to …

SD-BROV: An enhanced BGP hijacking protection with route validation in software-defined exchange

PW Tsai, AC Risdianto, MH Choi, SK Permal, TC Ling - Future Internet, 2021 - mdpi.com
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing
information. While the original design of BGP did not focus on security protection against …

Comparing ingress and egress detection to secure interdomain routing: An experimental analysis

C Goebel, D Neumann, R Krishnan - ACM Transactions on Internet …, 2011 - dl.acm.org
The global economy and society increasingly depends on computer networks linked
together by the Internet. The importance of computer networks reaches far beyond the …