BGP is the most important component of Internet routing and yet it is vulnerable to many threats such as IP prefix hijacking, which has created significant problems over the decade. There have been two approaches to address the IP prefix hijacking issue: anomaly detection-based approach and cryptography-based one. Due to complexity and deployment concern of the latter, there are a lot of solutions that take the former approach. We propose a probabilistic IP prefix authentication (PIPA) scheme that leverages the existing BGP anomaly detection-based solutions as well as public internet registry information. That is, PIPA determines the authenticity of the pair (IP prefix, AS path) in BGP messages by using historical stability of the BGP infor...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of threats that...
DoctorThe Internet is a decentralized network comprised of many interconnected networks and designed...
In spite of significant on-going research, the Border gateway protocol (BGP) still encompasses conce...
In this paper, we present novel and practical techniques to accurately detect IP prefix hijacking at...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
IP spoofing remains a popular method to launch Distributed Denial of Service (DDOS) attacks. Several...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
Network measurement has shown that a specific IP address prefix may be announced by more than one au...
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing inform...
This paper proposes a novel approach that draws upon the existing architecture and contractual rela-...
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP pr...
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical a...
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately B...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of threats that...
DoctorThe Internet is a decentralized network comprised of many interconnected networks and designed...
In spite of significant on-going research, the Border gateway protocol (BGP) still encompasses conce...
In this paper, we present novel and practical techniques to accurately detect IP prefix hijacking at...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
IP spoofing remains a popular method to launch Distributed Denial of Service (DDOS) attacks. Several...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
Network measurement has shown that a specific IP address prefix may be announced by more than one au...
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing inform...
This paper proposes a novel approach that draws upon the existing architecture and contractual rela-...
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP pr...
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical a...
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately B...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of threats that...