Secure inter-domain routing based on blockchain: A comprehensive survey

L Mastilak, P Helebrandt, M Galinski, I Kotuliak - Sensors, 2022 - mdpi.com
The whole Internet consists of thousands of autonomous systems that transfer data with one
another. The BGP plays a significant role in routing, but its behaviour is essentially naive …

GATE-BC: Genetic Algorithm-Powered QoS-Aware Cross-Network Traffic Engineering in Blockchain-Enabled SDN

M Karakus - IEEE Access, 2024 - ieeexplore.ieee.org
As a result of the ubiquitous network applications and services, exacerbated by the
overarching digital revolution the need and demand for efficient and dependable …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

SDBGPChain: A decentralized low complexity framework to detect and prevent the BGPattacks using SDN with smart contract based Dendrimer tree blockchain

TL Kayathri, N Kumaresan, R Vijayabhasker - Computer Networks, 2023 - Elsevier
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the
internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …

The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment

N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called
AS employs invalid routes. Recently, a data object called Autonomous System Provider …

[PDF][PDF] Improving Load Balancing and Scalability by Implementing Path Selection on BGP Using Multi SD-WAN.

N Demaku, A Dermaku - J. Commun., 2022 - jocm.us
This research paper introduces three key problems relevant to data movement across the
multi-domains. They are (1) delays in data transmission because of the failures of the …

The Impact of Cyber Crimes on User Victimization: Assessing Cyber Risks

NR Jaffri - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Data protection, information security and system security are often referred to as cyber
security. So if you do some security research in general, you're likely to see these words very …

Survey on Block Chain Methodology and Agile Technology Revolutionizing Development: Integrating Blockchain Methodology with Agile Technology

T Jalal, S Nasim - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Survey on Block Chain Methodology and Agile Technology Revolutionizing Development:
Integrating Blockchain Methodology with Agil Page 1 Survey on Block Chain Methodology …

Threat analysis of RPKI relying party software

KW Hove - 2022 - essay.utwente.nl
We have looked into the unique characteristics of the RPKI, where unlike other common
protocols all information must be retrieved first, and used that to create a threat model where …