The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Who controls the internet? analyzing global threats using property graph traversals

M Simeonovski, G Pellegrino, C Rossow… - Proceedings of the 26th …, 2017 - dl.acm.org
The Internet is built on top of intertwined network services, eg, email, DNS, and content
distribution networks operated by private or governmental organizations. Recent events …

Pareto-optimal defenses for the web infrastructure: Theory and practice

G Di Tizio, P Speicher, M Simeonovski… - ACM Transactions on …, 2023 - dl.acm.org
The integrity of the content a user is exposed to when browsing the web relies on a plethora
of non-web technologies and an infrastructure of interdependent hosts, communication …

Formally reasoning about the cost and efficacy of securing the email infrastructure

P Speicher, M Steinmetz, R Künnemann… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Security in the Internet has historically been added post-hoc, leaving services like email,
which, after all, is used by 3.7 billion users, vulnerable to large-scale surveillance. For email …

On the soundness of infrastructure adversaries

A Dax, R Künnemann - 2021 IEEE 34th Computer Security …, 2021 - ieeexplore.ieee.org
Campus Companies and network operators perform risk assessment to inform policy-
making, guide infrastructure investments or to comply with security standards such as ISO …

Simulated penetration testing and mitigation analysis

P Speicher - 2022 - publikationen.sulb.uni-saarland.de
As corporate networks and Internet services are becoming increasingly more complex, it is
hard to keep an overview over all deployed software, their potential vulnerabilities, and all …

RPKI Defense Capability Simulation Method Based on Container Virtualization.

B Yu, X Liu, X Wang - Applied Sciences (2076-3417), 2024 - search.ebscohost.com
As the main inter-domain routing protocol in today's internet, the Border Gateway Protocol
(BGP) faces serious security risks during actual usage. Research on BGP malicious attack …

RETRACTED ARTICLE: Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using …

N Elamathi, S Jayashri, R Pitchai - Soft Computing, 2019 - Springer
Heterogeneous wireless networks play an important role in next-generation worldwide
internet with seamless connectivity. Mobile network operators continue to grow their …

Shellshock vulnerability exploitation and mitigation: a demonstration

R Shetty, KKR Choo, R Kaufman - … and Techniques in Cyber Security and …, 2018 - Springer
This paper presents a step-by-step demonstration for the exploitation of CVE-2014-6271,
affecting the 'Bourne Again Shell'(Bash). By design, Bash cannot be accessed via a web …

FD-SP: A method for predicting cascading failures of inter-domain routing system

H Qiu, H Zhu, Y Li, Z Zeng - 2018 IEEE 4th International …, 2018 - ieeexplore.ieee.org
Cascading failures are a severe threat to inter-domain routing system, while little has been
done to detect and report impacts. To address the problem, we analyze the process of …