Are we there yet? On RPKI's deployment and security

Y Gilad, A Cohen, A Herzberg, M Schapira… - Cryptology ePrint …, 2016 - eprint.iacr.org
Abstract The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners'
public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Debugging the data plane with anteater

H Mai, A Khurshid, R Agarwal, M Caesar… - ACM SIGCOMM …, 2011 - dl.acm.org
Diagnosing problems in networks is a time-consuming and error-prone process. Existing
tools to assist operators primarily focus on analyzing control plane configuration …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

Accountable internet protocol (AIP)

DG Andersen, H Balakrishnan, N Feamster… - Proceedings of the …, 2008 - dl.acm.org
This paper presents AIP (Accountable Internet Protocol), a network architecture that provides
accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in …

The case for separating routing from routers

N Feamster, H Balakrishnan, J Rexford… - Proceedings of the …, 2004 - dl.acm.org
Over the past decade, the complexity of the Internet's routing infrastructure has increased
dramatically. This complexity and the problems it causes stem not just from various new …

A study of prefix hijacking and interception in the Internet

H Ballani, P Francis, X Zhang - ACM SIGCOMM Computer …, 2007 - dl.acm.org
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can
blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic …

PHAS: A Prefix Hijack Alert System.

M Lad, D Massey, D Pei, Y Wu, B Zhang… - USENIX Security …, 2006 - usenix.org
In a BGP prefix hijacking event, a router originates a route to a prefix, but does not provide
data delivery to the actual prefix. Prefix hijacking events have been widely reported and are …

[图书][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …