N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better understand and improve RPKI deployment, measuring route origin authorization (ROA) …
H Shulman, S Zhao - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
We develop LeMon for real-time detection of route leaks and explain how we resolved the shortcomings in previous approaches. We perform extensive evaluations of LeMon on …
N Rodday, GD Rodosek, A Pras… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is known to have several security weaknesses. Two major threats are BGP prefix hijacking and BGP route leaks. A hijack refers to the illegitimate …
J Li, J Cao, Z Meng, R Xie, M Xu - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
BGP is the only inter-domain routing protocol that plays an important role on the Internet. However, BGP suffers from route leak, which can cause serious security threats. To mitigate …
The vast and intricate web of the Internet is a marvel of modern technology, connecting us to people and information from all corners of the globe, allowing the exchange of confidential …