Invalidating idealized BGP security proposals and countermeasures

Q Li, X Zhang, X Zhang, P Su - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is vulnerable to routing attacks because of the lack of
inherent verification mechanism. Several secure BGP schemes have been proposed to …

Route bazaar: Automatic interdomain contract negotiation

I Castro, A Panda, B Raghavan, S Shenker… - 15th Workshop on Hot …, 2015 - usenix.org
While it is widely acknowledged that the Border Gateway Protocol (BGP) has many flaws,
most of the proposed fixes focus solely on improving the stability and security of its path …

A taxonomy of attacks using bgp blackholing

L Miller, C Pelsser - Computer Security–ESORICS 2019: 24th European …, 2019 - Springer
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the
victim sends in a request for traffic to the attacked IP (s) to be dropped. Unfortunately, remote …

[PDF][PDF] Position paper: Operational requirements for secured BGP

SM Bellovin, J Ioannidis, R Bush - DHS Secure Routing Workshop, 2005 - cs.columbia.edu
We are all aware that routing security is a problem. There were warnings in the literature
more than 15 years ago [Bel89, Per88]. In 1999, a National Research Council study called it …

[PDF][PDF] How small groups can secure interdomain routing

I Avramopoulos, M Suchara, J Rexford - 2007 - researchgate.net
Although the Internet's routing system has serious security vulnerabilities, none of the
existing proposals for a secure variant of BGP has been successfully deployed in practice …

Exploring the attack surface of blockchain: A systematic overview

M Saad, J Spaulding, L Njilla, C Kamhoua… - arXiv preprint arXiv …, 2019 - arxiv.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Measuring bgp route origin registration and validation

D Iamartino, C Pelsser, R Bush - International Conference on Passive and …, 2015 - Springer
BGP, the de-facto inter-domain routing protocol, was designed without considering security.
Recently, network operators have experienced hijacks of their network prefixes, often due to …

A survey of how to use blockchain to secure internet of things and the stalker attack

EF Jesus, VRL Chicarino… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key
challenges still need to be given particular attention so that IoT solutions further support the …

Security threats classification in blockchains

JH Mosakheil - 2018 - repository.stcloudstate.edu
Blockchain, the foundation of Bitcoin, has become one of the most popular technologies to
create and manage digital transactions recently. It serves as an immutable ledger which …

[PDF][PDF] An overview of blockchain security analysis

H Wang, Y Wang, Z Cao, Z Li… - Cyber Security: 15th …, 2019 - library.oapen.org
The blockchain, with its own characteristics, has received much attention at the beginning of
its birth and been applied in many fields. At the same time, however, its security issues are …