Both academic research and historical incidents have shown the impact of unstable BGP speakers on network performance and reliability. A large amount of time and energy has been invested improving router stability. In this paper, we show how an adversary in control of a BGP speaker in a transit AS can cause a victim router in an arbitrary location on the Internet to become unstable. Through experimentation with both hardware and software routers, we examine the behavior of routers under abnormal conditions and come to four conclusions. First, routers placed in certain states behave in anything but a stable manner. Second, unexpected but perfectly legal BGP messages can place routers into those states with disconcerting ease. Third, an ad...
Abstract — Despite BGP’s critical importance as the de-facto Internet inter-domain routing protocol,...
It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity....
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and eng...
Abstract—Both academic research and historical incidents have shown that unstable BGP speakers can h...
Part 2: AdversariesInternational audienceThe BGP protocol is at the core of the routing infrastructu...
Abstract—We explore BGP safety, the question of whether a BGP system converges to a stable routing, ...
Abstract — The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging a...
University of Minnesota Ph.D. dissertation.June 2016. Major: Computer Science. Advisor: Nicholas Ho...
Border Gateway Protocol (BGP) is the routing protocol being used for exchanging path information amo...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
BGP, the current inter-domain routing protocol, assumes that the routing information propagated by a...
Abstract—The routing system is playing a critical role in the Internet. Numerous routing security ev...
Introduction BGP, the current inter-domain routing protocol, is a critical piece responsible for th...
Despite BGP\u27s critical importance as the de-facto Internet inter-domain routing protocol, there i...
Network routers occupy a unique role in modern distributed systems. They are responsible for coopera...
Abstract — Despite BGP’s critical importance as the de-facto Internet inter-domain routing protocol,...
It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity....
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and eng...
Abstract—Both academic research and historical incidents have shown that unstable BGP speakers can h...
Part 2: AdversariesInternational audienceThe BGP protocol is at the core of the routing infrastructu...
Abstract—We explore BGP safety, the question of whether a BGP system converges to a stable routing, ...
Abstract — The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging a...
University of Minnesota Ph.D. dissertation.June 2016. Major: Computer Science. Advisor: Nicholas Ho...
Border Gateway Protocol (BGP) is the routing protocol being used for exchanging path information amo...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
BGP, the current inter-domain routing protocol, assumes that the routing information propagated by a...
Abstract—The routing system is playing a critical role in the Internet. Numerous routing security ev...
Introduction BGP, the current inter-domain routing protocol, is a critical piece responsible for th...
Despite BGP\u27s critical importance as the de-facto Internet inter-domain routing protocol, there i...
Network routers occupy a unique role in modern distributed systems. They are responsible for coopera...
Abstract — Despite BGP’s critical importance as the de-facto Internet inter-domain routing protocol,...
It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity....
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and eng...