The Internet consists of over 50 thousand smaller networks, called Autonomous Systems (ASes)(eg, AT&T, Sprint, Google), that use the Border Gateway Protocol (BGP) to figure out …
Q Li, X Zhang, X Zhang, P Su - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is vulnerable to routing attacks because of the lack of inherent verification mechanism. Several secure BGP schemes have been proposed to …
Y Liu, S Zhang, H Zhu, PJ Wan, L Gao… - Security and Privacy in …, 2019 - Springer
Promise-violating attack to inter-domain routing protocol is becoming common in recent years, which always causes serious consequences, such as malicious attraction traffic …
J Qiu, L Gao - University of Massachusetts Amherst TR, 2006 - Citeseer
BGP is the cornerstone of the Internet. However, the implicit trust assumption in BGP's design destines its inherited vulnerability. Prefix hijacking is one of the large-scale BGP …
M Gómez, P Bazán, N Río, M Morandi - … on Cloud Computing, Big Data & …, 2021 - Springer
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol …
J Yue, Y Qin, S Gao, W Su, G He… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Route Leak Protection (RLP) is proposed to prevent route leaks in Border Gateway Protocol (BGP). However, the Autonomous System (AS) cannot detect the RLP information that may …
Abstract The Border Gateway Protocol (BGP) plays a crucial role in today's communications as it is the inter-domain routing protocol that holds together the Internet, providing the path …
The BGP suffers from numerous security vulnerabilities, for example, fake routing updates incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these …
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing protocol. Despite its critical role on the Internet, it does not provide any security guarantees …