How secure are secure interdomain routing protocols?

S Goldberg, M Schapira, P Hummon, J Rexford - Computer Networks, 2014 - Elsevier
In response to high-profile Internet outages, BGP security variants have been proposed to
prevent the propagation of bogus routing information. The objective of this paper is to inform …

An infrastructure supporting secure internet routing

S Kent - European Public Key Infrastructure Workshop, 2006 - Springer
Abstract The Border Gateway Protocol (BGP)[1] is the foundation of inter-domain Internet
routing. A number of papers have described how BGP is highly vulnerable to a wide range …

Identifying and Addressing Reachability and Policy Attacks in “Secure” BGP

Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
BGP is known to have many security vulnerabilities due to the very nature of its underlying
assumptions of trust among independently operated networks. Most prior efforts have …

[PDF][PDF] Working around BGP: an incremental approach to improving security and accuracy in interdomain routing.

G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel… - NDSS, 2003 - cs.purdue.edu
BGP is essential to the operation of the Internet, but is vulnerable to both accidental failures
and malicious attacks. We propose a new protocol that works in concert with BGP, which …

The internet blockchain: A distributed, tamper-resistant transaction framework for the internet

A Hari, TV Lakshman - Proceedings of the 15th ACM workshop on hot …, 2016 - dl.acm.org
Existing security mechanisms for managing the Internet infrastructural resources like IP
addresses, AS numbers, BGP advertisements and DNS mappings rely on a Public Key …

[PDF][PDF] Breaking HTTPS with BGP hijacking

A Gavrichenkov - Black Hat. Briefings, 2015 - docs.huihoo.com
As of 2015, BGP hijacking and route leaking happen quite often. The most outstanding case
is Telekom Malaysia leaking about 179,000 prefixes to its upstream Level3, but there are …

Resilience of blockchain overlay networks

A Paphitis, N Kourtellis, M Sirivianos - International Conference on …, 2023 - Springer
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an
alternative to centralized services and promise robustness to coordinated attacks. However …

Towards uncovering BGP hijacking attacks

Q Jacquemart - 2015 - pastel.hal.science
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange
routing information using the Border Gateway Protocol (BGP). Consequently, every AS …

Bijack: Breaking bitcoin network with tcp vulnerabilities

S Li, S Shi, Y Xiao, C Zhang, YT Hou, W Lou - European Symposium on …, 2023 - Springer
Recent studies have shown that compromising Bitcoin's peer-to-peer network is an effective
way to disrupt the Bitcoin service. While many attack vectors have been uncovered such as …

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks

Y Liu, S Zhang, H Zhu, PJ Wan, L Gao, Y Zhang… - Journal of Parallel and …, 2020 - Elsevier
In recent years, with the continuous expansion of metropolitan area networks, the routing
security problem has become more and more serious. In particular, promise-violating attack …