Are we there yet? On RPKI's deployment and security

Y Gilad, A Cohen, A Herzberg, M Schapira… - Cryptology ePrint …, 2016 - eprint.iacr.org
Abstract The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners'
public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

DRRS-BC: Decentralized routing registration system based on blockchain

H Lu, Y Tang, Y Sun - IEEE/CAA Journal of Automatica Sinica, 2021 - ieeexplore.ieee.org
The border gateway protocol (BGP) has become the indispensible infrastructure of the
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …

The internet blockchain: A distributed, tamper-resistant transaction framework for the internet

A Hari, TV Lakshman - Proceedings of the 15th ACM workshop on hot …, 2016 - dl.acm.org
Existing security mechanisms for managing the Internet infrastructural resources like IP
addresses, AS numbers, BGP advertisements and DNS mappings rely on a Public Key …

Why is it taking so long to secure internet routing?

S Goldberg - Communications of the ACM, 2014 - dl.acm.org
Why is it taking so long to secure internet routing? Page 1 56 COMMUNICATIONS OF THE
ACM | OCTOBER 2014 | VOL. 57 | NO. 10 practice DOI:10.1145/2659899 Article development …

Attacking the network time protocol

A Malhotra, IE Cohen, E Brakke… - Cryptology ePrint …, 2015 - eprint.iacr.org
We explore the risk that network attackers can exploit unauthenticated Network Time
Protocol (NTP) traffic to alter the time on client systems. We first discuss how an on-path …

Inferring BGP blackholing activity in the internet

V Giotsas, G Smaragdakis, C Dietzel, P Richter… - Proceedings of the …, 2017 - dl.acm.org
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to
exchange reachability information among networks in the Internet. However, little is known …

Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering

A Reuter, R Bush, I Cunha, E Katz-Bassett… - ACM SIGCOMM …, 2018 - dl.acm.org
A proposal to improve routing security---Route Origin Authorization (ROA)---has been
standardized. A ROA specifies which network is allowed to announce a set of Internet …

Stellar: network attack mitigation using advanced blackholing

C Dietzel, M Wichtlhuber, G Smaragdakis… - Proceedings of the 14th …, 2018 - dl.acm.org
Network attacks, including Distributed Denial-of-Service (DDoS), continuously increase in
terms of bandwidth along with damage (recent attacks exceed 1.7 Tbps) and have a …

Bgp communities: Even more worms in the routing can

F Streibelt, F Lichtblau, R Beverly, A Feldmann… - Proceedings of the …, 2018 - dl.acm.org
BGP communities are a mechanism widely used by operators to manage policy, mitigate
attacks, and engineer traffic; eg, to drop unwanted traffic, filter announcements, adjust local …