A System to Detect {Forged-Origin}{BGP} Hijacks

T Holterbach, T Alfroy, A Phokeer, A Dainotti… - … USENIX Symposium on …, 2024 - usenix.org
Despite global efforts to secure Internet routing, attackers still successfully exploit the lack of
strong BGP security mechanisms. This paper focuses on an attack vector that is frequently …

The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

Poster: LeMon: Global Route Leak Monitoring Service

H Shulman, S Zhao - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
We develop LeMon for real-time detection of route leaks and explain how we resolved the
shortcomings in previous approaches. We perform extensive evaluations of LeMon on …

Exploring the benefit of path plausibility algorithms in BGP

N Rodday, GD Rodosek, A Pras… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is known to have several security weaknesses. Two
major threats are BGP prefix hijacking and BGP route leaks. A hijack refers to the illegitimate …

RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features

J Li, J Cao, Z Meng, R Xie, M Xu - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
BGP is the only inter-domain routing protocol that plays an important role on the Internet.
However, BGP suffers from route leak, which can cause serious security threats. To mitigate …

[PDF][PDF] BGP Data Analysis: Exploring Solutions for Au-tonomous Systems Relationships Inference

A Mobilia - 2023 - alessiomobilia.com
The vast and intricate web of the Internet is a marvel of modern technology, connecting us to
people and information from all corners of the globe, allowing the exchange of confidential …