The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
Securing BGP—A literature survey
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …
the major concerns related to BGP is its lack of effective security measures, and as a result …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
A survey of BGP security issues and solutions
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
The case for separating routing from routers
Over the past decade, the complexity of the Internet's routing infrastructure has increased
dramatically. This complexity and the problems it causes stem not just from various new …
dramatically. This complexity and the problems it causes stem not just from various new …
A study of prefix hijacking and interception in the Internet
H Ballani, P Francis, X Zhang - ACM SIGCOMM Computer …, 2007 - dl.acm.org
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can
blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic …
blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic …
PHAS: A Prefix Hijack Alert System.
In a BGP prefix hijacking event, a router originates a route to a prefix, but does not provide
data delivery to the actual prefix. Prefix hijacking events have been widely reported and are …
data delivery to the actual prefix. Prefix hijacking events have been widely reported and are …
[BOOK][B] SCION: a secure Internet architecture
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …
Bind: A fine-grained attestation service for secure distributed systems
In this paper we propose BIND (binding instructions and data), a fine-grained attestation
service for securing distributed systems. Code attestation has recently received …
service for securing distributed systems. Code attestation has recently received …
Verifying and enforcing network paths with ICING
We describe a new networking primitive, called a Path Verification Mechanism (pvm). There
has been much recent work about how senders and receivers express policies about the …
has been much recent work about how senders and receivers express policies about the …