A stealthier partitioning attack against bitcoin peer-to-peer network

M Tran, I Choi, GJ Moon, AV Vu… - 2020 IEEE symposium …, 2020 - ieeexplore.ieee.org
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …

Identifying and addressing protocol manipulation attacks in" secure" BGP

Y Song, A Venkataramani, L Gao - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Over more than a decade, researchers have studied a number of control and data plane
attacks on BGP, the Internet's interdomain routing protocol, in the presence of malicious …

[PDF][PDF] Leaking routes

G Huston - Asia Pacific Network Information Centre (APNIC) Blog, 2012 - dotnxdomain.net
We've just had yet another major routing leak, this time bringing down the Internet for most of
an entire country. Maybe twenty years ago no one would've noticed, let alone comment, but …

Let the market drive deployment: A strategy for transitioning to BGP security

P Gill, M Schapira, S Goldberg - ACM SIGCOMM computer …, 2011 - dl.acm.org
With a cryptographic root-of-trust for Internet routing (RPKI [17]) on the horizon, we can
finally start planning the deployment of one of the secure interdomain routing protocols …

Estimation of the success probability of a malicious attacker on blockchain-based edge network

MN Halgamuge - Computer Networks, 2022 - Elsevier
Modeling highly accurate cyber-attacks on blockchain-based edge networks may be almost
impossible in real-world circumstances due to unanticipated adversary (malicious) behavior …

Securing BGP incrementally

M Suchara, I Avramopoulos, J Rexford - Proceedings of the 2007 ACM …, 2007 - dl.acm.org
Despite the pressing need to secure routing, none of the existing secure variants of BGP has
been widely deployed. Due to the size and decentralized nature of the Internet, it became …

Are BGP routers open to attack? an experiment

L Cavedon, C Kruegel, G Vigna - … Problems in Network Security: IFIP WG …, 2011 - Springer
The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP
has proved to be very stable for its purpose. However, there have been some catastrophic …

[PDF][PDF] Pretty Good BGP: Protecting BGP by cautiously selecting routes

J Karlin, S Forrest, J Rexford - 2005 - Citeseer
Abstract The Border Gateway Protocol (BGP), the Internet's interdomain routing protocol, is
vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public …

An efficient and compacted DAG-based blockchain protocol for industrial Internet of Things

L Cui, S Yang, Z Chen, Y Pan, M Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) has been widely used in many fields. Meanwhile,
blockchain is considered promising to address the issues of the IIoT. However, the current …

Symmetric key approaches to securing BGP—a little bit trust is enough

B Bruhadeshwar, SS Kulkarni… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol that
connects autonomous systems (ASes). Despite its importance for the Internet infrastructure …