rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

[PDF][PDF] Evaluating the performance impact of PKI on BGP security

M Zhao, SW Smith, DM Nicol - Multiple Paths to Trust, 2005 - tsapps.nist.gov
Abstract The Border Gateway Protocol is central to making the In ternet work. However,
because it relies on routers from many organizations believing and passing along informa …

[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI).

Z Yan, G Geng, H Nakazato, YJ Park - J. Internet Serv. Inf. Secur., 2018 - isyou.info
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …

Securing BGP communities: design of a new RPKI object to mitigate BGP community attacks

R Huisman - 2022 - repository.tudelft.nl
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack
that exploits the community attribute. These community attacks can influence BGP routing in …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

Using resource public key infrastructure for secure border gateway protocol

G Chang, M Arianezhad… - 2016 IEEE Canadian …, 2016 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is a widely used Internet routing protocol. While several
security features have been introduced and implemented to prevent attacks and address …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …

Poster: Taking the low road: How RPKI invalids propagate

B Du, C Testart, R Fontugne, AC Snoeren… - Proceedings of the ACM …, 2023 - dl.acm.org
The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of
routing information exchanged between networks. To defend against unauthorized use of …

BGP security and the future: A meta-analysis of BGP threats and security to provide a new direction for practical BGP security

T van Rossum - 2020 - repository.tudelft.nl
The Internet consists of many subnetworks, which are connected to each other. These
subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a …

[PDF][PDF] A quantitative analysis of the Resource Public Key Infrastructure adoption of authoritative Domain Name System servers

P Sander - 2022 - nlnetlabs.nl
The Domain Name System (DNS) and the Border Gateway Protocol (BGP) are two
fundamental building blocks of the Internet. These protocols were not designed with security …