Detectable, traceable, and manageable blockchain technologies BHE: an attack scheme against bitcoin p2p network

J Yang, G Sun, R Xiao, H He - Wireless Communications and …, 2022 - Wiley Online Library
As the most successful cryptocurrency, bitcoin has become the primary target of attackers.
The security risks existing in bitcoin network (P2P networks) may pose serious threats to …

[PDF][PDF] Secure Border Gateway Protocol (S-BGP)-Real World Performance and Deployment Issues.

ST Kent, C Lynn, J Mikkelson, K Seo - NDSS, 2000 - users.ece.cmu.edu
Abstract The Border Gateway Protocol (BGP), which is used to distribute routing information
between autonomous systems, is an important component of the Internet's routing …

Bgpy: The bgp python security simulator

J Furuness, C Morris, R Morillo, A Herzberg… - Proceedings of the 16th …, 2023 - dl.acm.org
The security of Border Gateway Protocol (BGP), and inter-domain routing in general,
remains a challenge, in spite of its well-known importance, repeated attacks and incidents …

3S: three‐signature path authentication for BGP security

Y Liu, W Deng, Z Liu, F Huang - Security and Communication …, 2015 - Wiley Online Library
Because of the lack of mechanism to verify a route's path authorization, border gateway
protocol (BGP) has been disrupted by route hijacking for decades. Although several secure …

RPKI vs ROVER: comparing the risks of BGP security solutions

A Malhotra, S Goldberg - ACM SIGCOMM Computer Communication …, 2014 - dl.acm.org
BGP, the Internet's interdomain routing protocol, is highly vulnerable to routing failures that
result from unintentional misconfigurations or deliberate attacks. To defend against these …

[PDF][PDF] Pretty Secure BGP, psBGP.

T Wan, E Kranakis, PC van Oorschot - NDSS, 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP) is the de-facto standard inter-domain routing
protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of types …

Analysis of border gateway protocol (bgp) with improvement in byzantine robustness

RD Verma, SG Samaddar - 2018 Conference on Information …, 2018 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the default interdomain routing protocol. However, BGP
suffers from many security vulnerabilities such as Byzantine failure. In case of Byzantine …

Identifying and Addressing Reachability and Policy Attacks in “Secure” BGP

Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
BGP is known to have many security vulnerabilities due to the very nature of its underlying
assumptions of trust among independently operated networks. Most prior efforts have …

Security enhancement on BGP protocol: A literature survey

P Sharma, V Sharma - International Conference on Computing …, 2015 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is an exterior gateway classless path vector routing
protocol. It is a routing protocol operated to exchange routing information among different …

A first step towards checking BGP routes in the dataplane

T Wirtgen, O Bonaventure - … of the ACM SIGCOMM Workshop on Future …, 2022 - dl.acm.org
BGP is a fragile routing protocol since it is based on an implicit system of trust between the
Autonomous Systems (AS) participating in the exchange of routes on the Internet. Any router …