Bgp with bgpsec: Attacks and countermeasures

Q Li, J Liu, YC Hu, M Xu, J Wu - IEEE Network, 2018 - ieeexplore.ieee.org
The BGP suffers from numerous security vulnerabilities, for example, fake routing updates
incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these …

SPV: Secure path vector routing for securing BGP

YC Hu, A Perrig, M Sirbu - Proceedings of the 2004 conference on …, 2004 - dl.acm.org
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of
the underlying border gateway routing protocol (BGP) stands out as the Achilles heel …

[PDF][PDF] TASRS: Towards a Secure Routing System Through Internet Number Resource Certification

E Osterweil, S Amante, D McPherson - 2013 - cs.gmu.edu
Abstract The Border Gateway Protocol (BGP) is the Internet's core routing protocol. Today,
any BGP speaker can attest to be the origin for any IP prefix, and this results in the implicit …

Are BGP routers open to attack? an experiment

L Cavedon, C Kruegel, G Vigna - … Problems in Network Security: IFIP WG …, 2011 - Springer
The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP
has proved to be very stable for its purpose. However, there have been some catastrophic …

Technical perspective safeguarding online information against failures and attacks

B Liskov - Communications of the ACM, 2008 - dl.acm.org
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 51, Number 11 (2008), Pages 85-85 Research highlights: Technical perspective …

Does scale, size, and locality matter? evaluation of collaborative bgp security mechanisms

R Hiran, N Carlsson… - 2016 IFIP Networking …, 2016 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) was not designed with security in mind and is
vulnerable to many attacks, including prefix/subprefix hijacks, interception attacks, and …

How secure are secure interdomain routing protocols?

S Goldberg, M Schapira, P Hummon, J Rexford - Computer Networks, 2014 - Elsevier
In response to high-profile Internet outages, BGP security variants have been proposed to
prevent the propagation of bogus routing information. The objective of this paper is to inform …

Border gateway protocol graph: detecting and visualising internet routing anomalies

S Papadopoulos, K Moustakas, A Drosou… - IET Information …, 2016 - Wiley Online Library
Border gateway protocol (BGP) is the main protocol used on the Internet today, for the
exchange of routing information between different networks. The lack of authentication …

[引用][C] Understanding BGP Anomalies: Detection, Analysis, and Prevention

P Manadhata, V Sekar - 15-744 Class Project, CMU

RFC 6810: The Resource Public Key Infrastructure (RPKI) to Router Protocol

R Bush, R Austein - 2013 - dl.acm.org
In order to verifiably validate the origin Autonomous Systems of BGP announcements,
routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure …