Credible BGP–extensions to BGP for secure networking

J Israr, M Guennoun, HT Mouftah - 2009 Fourth International …, 2009 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the de-facto routing protocol in the Internet. Unfortunately,
it is not a secure protocol, and as a result, several attacks have been successfully mounted …

Detecting bogus BGP route information: Going beyond prefix hijacking

J Qiu, L Gao, S Ranjan, A Nucci - 2007 Third International …, 2007 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of the Internet.
However, the BGP system has been built based on the implicit trust among individual …

AT: an origin verification mechanism based on assignment track for securing BGP

N Wang, Y Zhi, B Wang - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
Due to the lack of the mechanism within BGP to verify the authority of an Autonomous
System (AS) to announce Network Layer Reachable Information (NLRI), a specific IP prefix …

The Relation on Prefix Hijacking and the Internet Hierarchy

J Zhao, Y Wen, X Li, W Peng… - 2012 Sixth International …, 2012 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have
been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack …

HC-BGP: A light-weight and flexible scheme for securing prefix ownership

Y Zhang, Z Zhang, ZM Mao… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
The border gateway protocol (BGP) is a fundamental building block of the Internet
infrastructure. However, due to the implicit trust assumption among networks, Internet routing …

Sign what you really care about–Secure BGP AS-paths efficiently

Y Xiang, X Shi, J Wu, Z Wang, X Yin - Computer Networks, 2013 - Elsevier
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical
role in the reliability of the Internet routing system. However, the system may also be …

Analysis of impact of trust on Secure Border Gateway Protocol

J Israr, M Guennoun, HT Mouftah - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE
message, an S-BGP speaker must verify nested signatures of all nodes in the traversed …

[PDF][PDF] Pretty Good BGP: Protecting BGP by cautiously selecting routes

J Karlin, S Forrest, J Rexford - 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP), the Internet's interdomain routing protocol, is
vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public …

Argus: An accurate and agile system to detecting IP prefix hijacking

Y Xiang, Z Wang, X Yin, J Wu - 2011 19th IEEE International …, 2011 - ieeexplore.ieee.org
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical
role in the Internet routing reliability. Invalid routes generated by mis-configurations or …

[PDF][PDF] BGP behavior monitoring and analysis

Y Liao, K Zhang - ECS 289M (Advanced Topics in Computer Security) …, 2002 - Citeseer
Abstract Border Gateway Protocol, an important inter-domain routing protocol, has a number
of vulnerabilities. Little is known about how BGP actually performs in today's Internet. We …