L Miller, C Pelsser - Computer Security–ESORICS 2019: 24th European …, 2019 - Springer
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP (s) to be dropped. Unfortunately, remote …
J Schlamp, J Gustafsson, M Wählisch… - Traffic Monitoring and …, 2015 - Springer
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations …
H Alshamrani, B Ghita - 2016 IEEE 17th International …, 2016 - ieeexplore.ieee.org
In spite of significant on-going research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP …
D Fejza, A Lambert - 2022 12th International Workshop on …, 2022 - ieeexplore.ieee.org
Detecting BGP anomalies is crucial to improve the security and robustness of the Internet's inter-domain routing system. As part of this work, we propose an innovative way for detecting …
Digital systems have become integral to daily life, driven by the widespread adoption of the Internet, social networks, and blockchain technology. While these advancements enhance …
H Alshamrani, B Ghita - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In spite of significant on-going research, the Border Gateway Protocol (BGP) still suffers vulnerability issues specially regarding impersonating the ownership of IP prefixes of ASes …
Q Jacquemart, G Urvoy-Keller, E Biersack - … Greece, March 31-April 1, 2016 …, 2016 - Springer
The IP space has been divided and assigned as a set of IP prefixes. Due to the longest prefix match forwarding rule, a single assigned IP prefix can be further divided into multiple …
Abstract The Border Gateway Protocol (BGP), the main component of core Internet connectivity, suffers vulnerability issues related to the impersonation of the ownership of IP …
GY Wu, A Anbalagan - aravindbgpproject.s3.amazonaws …
Border Gateway Protocol (BGP) routes are vulnerable to hijack when one attacker falsely modifies the route and advertises it to the source. The attacker modifies the route so that they …