S Kent - European Public Key Infrastructure Workshop, 2006 - Springer
Abstract The Border Gateway Protocol (BGP)[1] is the foundation of inter-domain Internet routing. A number of papers have described how BGP is highly vulnerable to a wide range …
Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
BGP is known to have many security vulnerabilities due to the very nature of its underlying assumptions of trust among independently operated networks. Most prior efforts have …
BGP is essential to the operation of the Internet, but is vulnerable to both accidental failures and malicious attacks. We propose a new protocol that works in concert with BGP, which …
A Hari, TV Lakshman - Proceedings of the 15th ACM workshop on hot …, 2016 - dl.acm.org
Existing security mechanisms for managing the Internet infrastructural resources like IP addresses, AS numbers, BGP advertisements and DNS mappings rely on a Public Key …
A Gavrichenkov - Black Hat. Briefings, 2015 - docs.huihoo.com
As of 2015, BGP hijacking and route leaking happen quite often. The most outstanding case is Telekom Malaysia leaking about 179,000 prefixes to its upstream Level3, but there are …
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an alternative to centralized services and promise robustness to coordinated attacks. However …
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). Consequently, every AS …
Recent studies have shown that compromising Bitcoin's peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack vectors have been uncovered such as …
Y Liu, S Zhang, H Zhu, PJ Wan, L Gao, Y Zhang… - Journal of Parallel and …, 2020 - Elsevier
In recent years, with the continuous expansion of metropolitan area networks, the routing security problem has become more and more serious. In particular, promise-violating attack …