The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing
Abstract The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol in
the Internet, thus it plays a crucial role in current communications. Unfortunately, it was …
the Internet, thus it plays a crucial role in current communications. Unfortunately, it was …
Sign what you really care about–Secure BGP AS-paths efficiently
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical
role in the reliability of the Internet routing system. However, the system may also be …
role in the reliability of the Internet routing system. However, the system may also be …
Routing protocol security using symmetric key based techniques
In this paper, we address the security of routing protocols. Internet routing protocols are
subject to attacks in the control plane as well as the data plane. In the control plane, a …
subject to attacks in the control plane as well as the data plane. In the control plane, a …
RETRACTED ARTICLE: Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using …
Heterogeneous wireless networks play an important role in next-generation worldwide
internet with seamless connectivity. Mobile network operators continue to grow their …
internet with seamless connectivity. Mobile network operators continue to grow their …
Relieve Internet routing security of public key infrastructure
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of
threats that are constantly undermining security of the Internet. Most prominent attacks …
threats that are constantly undermining security of the Internet. Most prominent attacks …
Exponential optimal synchronization of chaotic cryptosystems: Neural-network-based approach
FH Hsiao, KP Hsieh, ZH Lin - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
This paper presents a systematic design methodology for neural-network (NN) based secure
communications in multiple time-delay chaotic (MTDC) systems with optimal H∞ …
communications in multiple time-delay chaotic (MTDC) systems with optimal H∞ …
Security in Border Gateway Protocol (BGP)
Background The Internet is composed of large number of ASs, which relay traffic to each
other on behalf of their customers. The process of routing within an AS is called intra-domain …
other on behalf of their customers. The process of routing within an AS is called intra-domain …
Heuristic algorithm for K-disjoint QoS routing problem
Z Yu, M Ni, Z Wang, H Huang - 2011 Fourth International Joint …, 2011 - ieeexplore.ieee.org
K-disjoint QoS Routing emphasizes to find k disjoint paths from source to destination
satisfying the QoS requirements. It is well-known that this problem is NP-Complete. In this …
satisfying the QoS requirements. It is well-known that this problem is NP-Complete. In this …
[PDF][PDF] Analyzing adoptability of secure BGP routing proposals
M Crone - 2021 - maxcrone.org
With the internet ever-increasing in importance for this world, the issue of insecure BGP
routing has still not been solved. Despite the existence of many proposed solutions to …
routing has still not been solved. Despite the existence of many proposed solutions to …