Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table

C Testart, P Richter, A King, A Dainotti… - Proceedings of the …, 2019 - dl.acm.org
BGP hijacks remain an acute problem in today's Internet, with widespread consequences.
While hijack detection systems are readily available, they typically rely on a priori prefix …

Impacting IP prefix reachability via RPKI manipulations

K Brogle, D Cooper, S Goldberg, L Reyzin - 2013 - open.bu.edu
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical
allocation and suballocation of IP addresses. Its goal is to improve security of interdomain …

[PDF][PDF] Pretty Secure BGP, psBGP.

T Wan, E Kranakis, PC van Oorschot - NDSS, 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP) is the de-facto standard inter-domain routing
protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of types …

BGP security in partial deployment: Is the juice worth the squeeze?

R Lychev, S Goldberg, M Schapira - Proceedings of the ACM SIGCOMM …, 2013 - dl.acm.org
As the rollout of secure route origin authentication with the RPKI slowly gains traction among
network operators, there is a push to standardize secure path validation for BGP (ie, S* BGP …

Listen and Whisper: Security Mechanisms for {BGP}

V Roth, RH Katz - First Symposium on Networked Systems Design and …, 2004 - usenix.org
BGP, the current inter-domain routing protocol, assumes that the routing information
propagated by authenticated routers is correct. This assumption renders the current …

Creating a secure underlay for the internet

H Birge-Lee, J Wanner, GH Cimaszewski… - 31st USENIX Security …, 2022 - usenix.org
Adversaries can exploit inter-domain routing vulnerabilities to intercept communication and
compromise the security of critical Internet applications. Meanwhile the deployment of …

How secure are secure interdomain routing protocols

S Goldberg, M Schapira, P Hummon… - ACM SIGCOMM Computer …, 2010 - dl.acm.org
In response to high-profile Internet outages, BGP security variants have been proposed to
prevent the propagation of bogus routing information. To inform discussions of which variant …

InBlock4: Blockchain-based route origin validation

S Angieri, M Bagnulo, A García-Martínez… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
In this paper, we present InBlock4, a blockchain-based alternative to RPKI for the provision
of Route Origin validation for BGP. InBlock4 embeds an alternative trust model to protect …

AS-TRUST: A trust quantification scheme for autonomous systems in BGP

J Chang, KK Venkatasubramanian, AG West… - Trust and Trustworthy …, 2011 - Springer
Abstract The Border Gateway Protocol (BGP) works by frequently exchanging updates that
disseminate reachability information about IP prefixes (ie, IP address blocks) between …

An infrastructure supporting secure internet routing

S Kent - European Public Key Infrastructure Workshop, 2006 - Springer
Abstract The Border Gateway Protocol (BGP)[1] is the foundation of inter-domain Internet
routing. A number of papers have described how BGP is highly vulnerable to a wide range …