The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment

N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called
AS employs invalid routes. Recently, a data object called Autonomous System Provider …

BGP security in partial deployment: Is the juice worth the squeeze?

R Lychev, S Goldberg, M Schapira - Proceedings of the ACM SIGCOMM …, 2013 - dl.acm.org
As the rollout of secure route origin authentication with the RPKI slowly gains traction among
network operators, there is a push to standardize secure path validation for BGP (ie, S* BGP …

Sign what you really care about–Secure BGP AS-paths efficiently

Y Xiang, X Shi, J Wu, Z Wang, X Yin - Computer Networks, 2013 - Elsevier
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical
role in the reliability of the Internet routing system. However, the system may also be …

APVAS: Reducing Memory Size of AS\_PATH Validation by Using Aggregate Signatures

O Junjie, N Yanai, T Takemura, M Okada… - arXiv preprint arXiv …, 2020 - arxiv.org
The\textit {BGPsec} protocol, which is an extension of the border gateway protocol (BGP),
uses digital signatures to guarantee the validity of routing information. However, BGPsec's …

Identifying and Addressing Reachability and Policy Attacks in “Secure” BGP

Y Song, A Venkataramani, L Gao - IEEE/ACM Transactions on …, 2016 - ieeexplore.ieee.org
BGP is known to have many security vulnerabilities due to the very nature of its underlying
assumptions of trust among independently operated networks. Most prior efforts have …

3S: three‐signature path authentication for BGP security

Y Liu, W Deng, Z Liu, F Huang - Security and Communication …, 2015 - Wiley Online Library
Because of the lack of mechanism to verify a route's path authorization, border gateway
protocol (BGP) has been disrupted by route hijacking for decades. Although several secure …

A first step towards checking BGP routes in the dataplane

T Wirtgen, O Bonaventure - … of the ACM SIGCOMM Workshop on Future …, 2022 - dl.acm.org
BGP is a fragile routing protocol since it is based on an implicit system of trust between the
Autonomous Systems (AS) participating in the exchange of routes on the Internet. Any router …

APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec

O Junjie, N Yanai, T Takemura, M Okada… - … on Fundamentals of …, 2023 - search.ieice.org
The BGPsec protocol, which is an extension of the border gateway protocol (BGP) for
Internet routing known as BGPsec, uses digital signatures to guarantee the validity of routing …

Aggregated path authentication for efficient BGP security

M Zhao, SW Smith, DM Nicol - Proceedings of the 12th ACM conference …, 2005 - dl.acm.org
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is
vulnerable to many attacks, since routers rely on hearsay information from neighbors …

Optimizing BGP security by exploiting path stability

K Butler, P McDaniel, W Aiello - … of the 13th ACM conference on …, 2006 - dl.acm.org
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the
Internet. While the serious vulnerabilities of BGP are well known, no security solution has …