YC Hu, A Perrig, M Sirbu - Proceedings of the 2004 conference on …, 2004 - dl.acm.org
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles heel …
Abstract The Border Gateway Protocol (BGP) is the Internet's core routing protocol. Today, any BGP speaker can attest to be the origin for any IP prefix, and this results in the implicit …
The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been some catastrophic …
B Liskov - Communications of the ACM, 2008 - dl.acm.org
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the ACM Volume 51, Number 11 (2008), Pages 85-85 Research highlights: Technical perspective …
R Hiran, N Carlsson… - 2016 IFIP Networking …, 2016 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) was not designed with security in mind and is vulnerable to many attacks, including prefix/subprefix hijacks, interception attacks, and …
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. The objective of this paper is to inform …
S Papadopoulos, K Moustakas, A Drosou… - IET Information …, 2016 - Wiley Online Library
Border gateway protocol (BGP) is the main protocol used on the Internet today, for the exchange of routing information between different networks. The lack of authentication …
In order to verifiably validate the origin Autonomous Systems of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure …