SDBGPChain: A decentralized low complexity framework to detect and prevent the BGPattacks using SDN with smart contract based Dendrimer tree blockchain

TL Kayathri, N Kumaresan, R Vijayabhasker - Computer Networks, 2023 - Elsevier
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the
internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment

N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called
AS employs invalid routes. Recently, a data object called Autonomous System Provider …

The Impact of Cyber Crimes on User Victimization: Assessing Cyber Risks

NR Jaffri - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Data protection, information security and system security are often referred to as cyber
security. So if you do some security research in general, you're likely to see these words very …

Survey on Block Chain Methodology and Agile Technology Revolutionizing Development: Integrating Blockchain Methodology with Agile Technology

T Jalal, S Nasim - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Survey on Block Chain Methodology and Agile Technology Revolutionizing Development:
Integrating Blockchain Methodology with Agil Page 1 Survey on Block Chain Methodology …