Prior work has demonstrated ways in which to attack the Border Gateway Protocol (BGP) system as well as vulnerabilities of the BGP and its configuration. Furthermore, BGP attacks, such as hijacking, are common in the wild, whether due to accidental misconfiguration or malintent. Recent work demonstrates the feasibility and potential for new BGP attacks based on the BGP community attribute (rerouting and blackholing). Very recently, there have been BGP attacks using BGP communities in the wild. The major issues with BGP communities (among others) are that there is no cryptographic protection, attribution is very difficult, and they are used both for signaling and triggering actions. These issues present opportunities for misconfiguration and...
Border Gateway Protocol (BGP) has proven to be resilient in the face of failures, attacks, and gener...
Transport Communication Protocol (TCP) implementations may not properly implement blind attack prote...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...
The Border Gateway Protocol (BGP) community field is poorly defined and has no means of authenticati...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the s...
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and eng...
© ACM 2018 . This is the author's version of the work. It is posted here for your personal use. Not ...
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploit...
Border Gateway Protocol (BGP) is a dynamic routing protocol in the Internet that allows Autonomous S...
Border Gateway Protocol (BGP) is a dynamic routing protocol in the Internet that allows Autonomous S...
Border Gateway Protocol (BGP) is the routing protocol being used for exchanging path information amo...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
BGP communities are a popular mechanism used by network operators for traffic engineering, blackholi...
We present an evaluation methodology for comparison of existing and proposed new algorithms for Bord...
Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to exchange routi...
Border Gateway Protocol (BGP) has proven to be resilient in the face of failures, attacks, and gener...
Transport Communication Protocol (TCP) implementations may not properly implement blind attack prote...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...
The Border Gateway Protocol (BGP) community field is poorly defined and has no means of authenticati...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the s...
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and eng...
© ACM 2018 . This is the author's version of the work. It is posted here for your personal use. Not ...
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploit...
Border Gateway Protocol (BGP) is a dynamic routing protocol in the Internet that allows Autonomous S...
Border Gateway Protocol (BGP) is a dynamic routing protocol in the Internet that allows Autonomous S...
Border Gateway Protocol (BGP) is the routing protocol being used for exchanging path information amo...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange rea...
BGP communities are a popular mechanism used by network operators for traffic engineering, blackholi...
We present an evaluation methodology for comparison of existing and proposed new algorithms for Bord...
Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to exchange routi...
Border Gateway Protocol (BGP) has proven to be resilient in the face of failures, attacks, and gener...
Transport Communication Protocol (TCP) implementations may not properly implement blind attack prote...
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des ...