A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
Man-in-the-middle attack in wireless and computer networking—A review
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is
a serious concern for many security professionals. The attackers target the actual data …
a serious concern for many security professionals. The attackers target the actual data …
DRRS-BC: Decentralized routing registration system based on blockchain
The border gateway protocol (BGP) has become the indispensible infrastructure of the
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …
BGP anomaly detection techniques: A survey
The border gateway protocol (BGP) is the Internet's default inter-domain routing protocol that
manages connectivity among autonomous systems (ASes). Over the past two decades many …
manages connectivity among autonomous systems (ASes). Over the past two decades many …
Why is it taking so long to secure internet routing?
S Goldberg - Communications of the ACM, 2014 - dl.acm.org
Why is it taking so long to secure internet routing? Page 1 56 COMMUNICATIONS OF THE
ACM | OCTOBER 2014 | VOL. 57 | NO. 10 practice DOI:10.1145/2659899 Article development …
ACM | OCTOBER 2014 | VOL. 57 | NO. 10 practice DOI:10.1145/2659899 Article development …
A comprehensive survey on internet outages
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …
they are poorly understood, while a deep understanding of them is essential for …
Content delivery network security: A survey
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to
end users with high performance. CDNs are critical to provide and protect the availability of …
end users with high performance. CDNs are critical to provide and protect the availability of …
[PDF][PDF] Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
Some recent research presented evidence of blocks of IP addresses being stolen by BGP
hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in …
hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in …
The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
On the use of Emulab testbeds for scientifically rigorous experiments
C Siaterlis, AP Garcia, B Genge - … Communications Surveys & …, 2012 - ieeexplore.ieee.org
Internet is considered a Critical Infrastructure (CI) that is vital for both the economy and the
society. Disruptions caused by natural disasters, malicious human actions and even …
society. Disruptions caused by natural disasters, malicious human actions and even …