Poster: Taking the low road: How RPKI invalids propagate

B Du, C Testart, R Fontugne, AC Snoeren… - Proceedings of the ACM …, 2023 - dl.acm.org
The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of
routing information exchanged between networks. To defend against unauthorized use of …

Exploring the benefit of path plausibility algorithms in BGP

N Rodday, GD Rodosek, A Pras… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is known to have several security weaknesses. Two
major threats are BGP prefix hijacking and BGP route leaks. A hijack refers to the illegitimate …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

Perfect is the enemy of good: Setting realistic goals for BGP security

Y Gilad, T Hlavacek, A Herzberg, M Schapira… - Proceedings of the 17th …, 2018 - dl.acm.org
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of
today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …

[PDF][PDF] Pretty Good BGP: Protecting BGP by cautiously selecting routes

J Karlin, S Forrest, J Rexford - 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP), the Internet's interdomain routing protocol, is
vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public …

[PDF][PDF] Secure Border Gateway Protocol (S-BGP)-Real World Performance and Deployment Issues.

ST Kent, C Lynn, J Mikkelson, K Seo - NDSS, 2000 - dpnm.postech.ac.kr
Abstract The Border Gateway Protocol (BGP), which is used to distribute routing information
between autonomous systems, is an important component of the Internet's routing …

Using resource public key infrastructure for secure border gateway protocol

G Chang, M Arianezhad… - 2016 IEEE Canadian …, 2016 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is a widely used Internet routing protocol. While several
security features have been introduced and implemented to prevent attacks and address …

Invalidating idealized BGP security proposals and countermeasures

Q Li, X Zhang, X Zhang, P Su - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is vulnerable to routing attacks because of the lack of
inherent verification mechanism. Several secure BGP schemes have been proposed to …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

Relieve Internet routing security of public key infrastructure

LV Mancini, A Spognardi, C Soriente… - 2012 21st …, 2012 - ieeexplore.ieee.org
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of
threats that are constantly undermining security of the Internet. Most prominent attacks …