Towards Data-Driven Internet Routing Security

CA Testart Pacheco - 2021 - dspace.mit.edu
The Internet infrastructure is critical for the security and reliability of online daily life. The
Border Gateway Protocol (BGP), the defacto global routing protocol, was not designed to …

[PDF][PDF] Detection and recovery from the obvious engineer attack

JJ Mulligan - 2002 - dspace.mit.edu
The weak security of the Border Gateway Protocol (BGP) has been a known issue and has
had several solutions proposed. The leading solution of the Secure BGP protocol has been …

Comparing ingress and egress detection to secure interdomain routing: An experimental analysis

C Goebel, D Neumann, R Krishnan - ACM Transactions on Internet …, 2011 - dl.acm.org
The global economy and society increasingly depends on computer networks linked
together by the Internet. The importance of computer networks reaches far beyond the …

[引用][C] Characterizing BGP community irregularities toward an anomaly detection engine

A Hardt - 2019 - Monterey, CA; Naval Postgraduate …

ROAchain: Securing route origin authorization with blockchain for inter-domain routing

G He, W Su, S Gao, J Yue… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The inter-domain routing with BGP is highly vulnerable to malicious attacks, due to the lack
of a secure means of verifying authenticity and legitimacy of inter-domain routes. Resource …

The CURE to vulnerabilities in RPKI validation

D Mirdita, H Schulmann, N Vogel… - arXiv preprint arXiv …, 2023 - arxiv.org
Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing
adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact …

[PDF][PDF] dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository

Y Su, D Li, L Chen, Q Li, S Ling - ndss-symposium.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing inter-domain
routing, we find that its key component, the RPKI Repository, is under studied. We conduct …

Are BGP routers open to attack? an experiment

L Cavedon, C Kruegel, G Vigna - … Problems in Network Security: IFIP WG …, 2011 - Springer
The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP
has proved to be very stable for its purpose. However, there have been some catastrophic …

Does scale, size, and locality matter? evaluation of collaborative bgp security mechanisms

R Hiran, N Carlsson… - 2016 IFIP Networking …, 2016 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) was not designed with security in mind and is
vulnerable to many attacks, including prefix/subprefix hijacks, interception attacks, and …

Bgp with bgpsec: Attacks and countermeasures

Q Li, J Liu, YC Hu, M Xu, J Wu - IEEE Network, 2018 - ieeexplore.ieee.org
The BGP suffers from numerous security vulnerabilities, for example, fake routing updates
incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these …