Limiting the power of RPKI authorities

K Shrishak, H Shulman - … of the Applied Networking Research Workshop, 2020 - dl.acm.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing the inter-domain
routing, one of the arguments hindering its adoption is the significant power that it provides …

Keychain-based signatures for securing BGP

H Yin, B Sheng, H Wang, J Pan - IEEE Journal on Selected …, 2010 - ieeexplore.ieee.org
As a major component of Internet routing infrastructure, the Border Gateway Protocol (BGP)
is vulnerable to malicious attacks. While Secure BGP (S-BGP) provides a comprehensive …

An SDN-based approach to enhance BGP security

R Costa, F Ramos - arXiv preprint arXiv:1602.06924, 2016 - arxiv.org
BGP is vulnerable to a series of attacks. Many solutions have been proposed in the past two
decades, but the most effective remain largely undeployed. This is due to three fundamental …

Design and analysis of the secure border gateway protocol (S-BGP)

S Kent, C Lynn, K Seo - Proceedings DARPA Information …, 2000 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP), which is used to distribute routing information between
autonomous systems (ASes), is a critical component of the Internet's routing infrastructure. It …

Listen and Whisper: Security Mechanisms for {BGP}

V Roth, RH Katz - First Symposium on Networked Systems Design and …, 2004 - usenix.org
BGP, the current inter-domain routing protocol, assumes that the routing information
propagated by authenticated routers is correct. This assumption renders the current …

[引用][C] Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems

BO Stephen, BHA James - … of Computer and …, 2014 - Scientific Research Publishing

[HTML][HTML] Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems

SB Oti, JB Hayfron-Acquah - Journal of Computer and Communications, 2014 - scirp.org
The border gateway protocol (BGP) is the default inter domain routing protocol used on the
internet for exchanging information between autonomous systems. Available literature …

To make trust relationship between BGP speakers with help of secure private key

DG Raimagia, S Singh, S Zafar - 2012 Nirma University …, 2012 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the path vector routing protocol that connects
different autonomous systems. The traditional BGP protocol is weak to provide security for …

[图书][B] ROVER: A DNS-based method to detect and prevent IP hijacks

JE Gersch - 2013 - search.proquest.com
Abstract The Border Gateway Protocol (BGP) is critical to the global internet infrastructure.
Unfortunately BGP routing was designed with limited regard for security. As a result, IP route …

BGP security in partial deployment: Is the juice worth the squeeze?

R Lychev, S Goldberg, M Schapira - Proceedings of the ACM SIGCOMM …, 2013 - dl.acm.org
As the rollout of secure route origin authentication with the RPKI slowly gains traction among
network operators, there is a push to standardize secure path validation for BGP (ie, S* BGP …