[PDF][PDF] A quantitative analysis of the Resource Public Key Infrastructure adoption of authoritative Domain Name System servers

P Sander - 2022 - nlnetlabs.nl
The Domain Name System (DNS) and the Border Gateway Protocol (BGP) are two
fundamental building blocks of the Internet. These protocols were not designed with security …

ROAchain: Securing route origin authorization with blockchain for inter-domain routing

G He, W Su, S Gao, J Yue… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The inter-domain routing with BGP is highly vulnerable to malicious attacks, due to the lack
of a secure means of verifying authenticity and legitimacy of inter-domain routes. Resource …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

Exploring the benefit of path plausibility algorithms in BGP

N Rodday, GD Rodosek, A Pras… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is known to have several security weaknesses. Two
major threats are BGP prefix hijacking and BGP route leaks. A hijack refers to the illegitimate …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

See How ISPs Care: An RPKI Validation Extension for Web Browsers

M Wählisch, TC Schmidt - Proceedings of the 2015 ACM Conference on …, 2015 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) allows BGP routers to verify the origin AS of
an IP prefix. In this demo, we present a software extension which performs prefix origin …

Perfect is the enemy of good: Setting realistic goals for BGP security

Y Gilad, T Hlavacek, A Herzberg, M Schapira… - Proceedings of the 17th …, 2018 - dl.acm.org
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of
today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …

RFC 9455: Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes

Z Yan, R Bush, G Geng, T de Kock, J Yao - 2023 - dl.acm.org
When using the Resource Public Key Infrastructure (RPKI), address space holders need to
issue Route Origin Authorization (ROA) object (s) to authorize one or more Autonomous …

To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today

C Testart, P Richter, A King, A Dainotti… - Passive and Active …, 2020 - Springer
Securing the Internet's inter-domain routing system against illicit prefix advertisements by
third-party networks remains a great concern for the research, standardization, and operator …