Understanding BGP misconfiguration

R Mahajan, D Wetherall, T Anderson - ACM SIGCOMM Computer …, 2002 - dl.acm.org
It is well-known that simple, accidental BGP configuration errors can disrupt Internet
connectivity. Yet little is known about the frequency of misconfiguration or its causes, except …

Locating Internet routing instabilities

A Feldmann, O Maennel, ZM Mao, A Berger… - ACM SIGCOMM …, 2004 - dl.acm.org
This paper presents a methodology for identifying the autonomous system (or systems)
responsible when a routing change is observed and propagated by BGP. The origin of such …

An analysis of BGP multiple origin AS (MOAS) conflicts

X Zhao, D Pei, L Wang, D Massey, A Mankin… - Proceedings of the 1st …, 2001 - dl.acm.org
This paper presents a detailed study of BGP Multiple Origin AS (MOAS) conflicts observed in
the Internet. A MOAS conflict occurs when a particular prefix appears to originate from more …

[PDF][PDF] Detecting BGP configuration faults with static analysis

N Feamster, H Balakrishnan - Proceedings of the 2nd conference on …, 2005 - usenix.org
The Internet is composed of many independent autonomous systems (ASes) that exchange
reachability information to destinations using the Border Gateway Protocol (BGP). Network …

Detecting prefix hijackings in the internet with argus

X Shi, Y Xiang, Z Wang, X Yin, J Wu - Proceedings of the 2012 Internet …, 2012 - dl.acm.org
Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing
reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may …

Towards detecting BGP route hijacking using the RPKI

M Wählisch, O Maennel, TC Schmidt - ACM SIGCOMM Computer …, 2012 - dl.acm.org
Prefix hijacking has always been a big concern in the Internet. Some events made it into the
international world-news, but most of them remain unreported or even unnoticed. The scale …

[PDF][PDF] Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network

J Wu, ZM Mao, J Rexford, J Wang - Proceedings of the 2nd conference …, 2005 - usenix.org
The performance of a backbone network is vulnerable to interdomain routing changes that
affect how traffic travels to destinations in other Autonomous Systems (ASes). Despite …

Pretty good BGP: Improving BGP by cautiously adopting routes

J Karlin, S Forrest, J Rexford - Proceedings of the 2006 IEEE …, 2006 - ieeexplore.ieee.org
The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging
attacks, which often arise from operator misconfiguration. Proposed solutions with strong …

BGP churn evolution: A perspective from the core

A Elmokashfi, A Kvalbein… - IEEE/ACM Transactions …, 2011 - ieeexplore.ieee.org
The scalability limitations of BGP have been a major concern lately. An important aspect of
this issue is the rate of routing updates (churn) that BGP routers must process. This paper …

A survey among network operators on BGP prefix hijacking

P Sermpezis, V Kotronis, A Dainotti… - ACM SIGCOMM …, 2018 - dl.acm.org
BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or
modifications to BGP that protect the Internet against it have been proposed. However, the …