The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Securing BGP—A literature survey

G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

The case for separating routing from routers

N Feamster, H Balakrishnan, J Rexford… - Proceedings of the …, 2004 - dl.acm.org
Over the past decade, the complexity of the Internet's routing infrastructure has increased
dramatically. This complexity and the problems it causes stem not just from various new …

A study of prefix hijacking and interception in the Internet

H Ballani, P Francis, X Zhang - ACM SIGCOMM Computer …, 2007 - dl.acm.org
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can
blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic …

PHAS: A Prefix Hijack Alert System.

M Lad, D Massey, D Pei, Y Wu, B Zhang… - USENIX Security …, 2006 - usenix.org
In a BGP prefix hijacking event, a router originates a route to a prefix, but does not provide
data delivery to the actual prefix. Prefix hijacking events have been widely reported and are …

[BOOK][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …

Bind: A fine-grained attestation service for secure distributed systems

E Shi, A Perrig, L Van Doorn - … on Security and Privacy (S&P'05 …, 2005 - ieeexplore.ieee.org
In this paper we propose BIND (binding instructions and data), a fine-grained attestation
service for securing distributed systems. Code attestation has recently received …

Verifying and enforcing network paths with ICING

J Naous, M Walfish, A Nicolosi, D Mazieres… - Proceedings of the …, 2011 - dl.acm.org
We describe a new networking primitive, called a Path Verification Mechanism (pvm). There
has been much recent work about how senders and receivers express policies about the …