[PDF][PDF] Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed

L Qin, L Chen, D Li, H Ye, Y Wang - ndss-symposium.org
BGP hijacking is one of the most important threats to routing security. To improve the
reliability and availability of inter-domain routing, a lot of work has been done to defend …

Poster: RPKI kill switch

D Mirdita, H Shulman, M Waidner - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Relying party implementations are an important component of RPKI: they fetch and validate
the signed authorizations mapping prefixes to their owners. Border routers use this …

SD-BROV: An enhanced BGP hijacking protection with route validation in software-defined exchange

PW Tsai, AC Risdianto, MH Choi, SK Permal, TC Ling - Future Internet, 2021 - mdpi.com
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing
information. While the original design of BGP did not focus on security protection against …

On the risk of misbehaving RPKI authorities

D Cooper, E Heilman, K Brogle, L Reyzin… - Proceedings of the …, 2013 - dl.acm.org
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of
the most devastating attacks on interdomain routing. The threat model for the RPKI …

Design and implementation of inblock—a distributed ip address registration system

A García-Martínez, S Angieri, B Liu, F Yang… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The current mechanism to secure Border Gateway Protocol relies on the resource public key
infrastructure (RPKI) for route origin authorization. The RPKI implements a hierarchical …

Protecting the integrity of internet routing: Border gateway protocol (BGP) route origin validation

W Haag, D Montgomery, A Tan, W Barker - 2019 - csrc.nist.gov
Abstract The Border Gateway Protocol (BGP) is the default routing protocol to route traffic
among internet domains. While BGP performs adequately in identifying viable paths that …

Evaluating Trustworthiness of Prefix Announcements in Internet Routing

WP Deng, PD Zhu, XC Lu - 網際網路技術學刊, 2011 - airitilibrary.com
In Internet routing, an Autonomous System (AS) is a legitimate origin AS of an IP prefix only if
it is authorized by the prefix owner to originate this prefix. However, on the one hand, the …

A security framework for routing protocols

N Prajapati - 2014 - spectrum.library.concordia.ca
With the rise in internet traffic surveillance and monitoring activities, the routing infrastructure
has become an obvious target of attack as compromised routers can be used to stage large …

RFC 9582: A Profile for Route Origin Authorizations (ROAs)

J Snijders, B Maddison, M Lepinski, D Kong, S Kent - 2024 - dl.acm.org
This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a
digitally signed object that provides a means of verifying that an IP address block holder has …

GesBGP: A good-enough-security BGP

Q Li, JP Wu, MW Xu, K Xu, XW Zhang - Chinese Journal of Computers, 2009 - cjc.ict.ac.cn
Inter-domain routing (BGP) directly influences availability of Internet routing which may be
disrupted by misconfigured or malicious BGP updates. Although several secure solutions …