A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route Origin Validation (ROV). Which networks blindly accept invalid routes? Which reject them outright? Which de-preference them if alternatives exist? Recent analysis attempts to use uncontrolled experiments to characterize ROV adoption by comparing valid routes and invalid routes. However, we argue that gaining a solid understanding of ROV adoption is impossible using currently available data sets and techniques...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blac...
Over a decade of work has gone into securing the BGP rout-ing control plane. Through all this, there...
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
The Border Gateway Protocol (BGP) is an essential infrastructure element, often termed “the glue tha...
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly...
The deployment of the Resource Public Key Infrastructure (RPKI) is currently gaining traction within...
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called AS employs ...
As the rollout of secure route origin authentication with the RPKI slowly gains traction among netwo...
As the rollout of secure route origin authentication with the RPKI slowly gains traction among netwo...
BGP, the Internet’s interdomain routing protocol, is highly vulnerable to routing failures that resu...
We design and evaluate a lightweight route verification mechanism that enables a router to discover ...
As RPKI is becoming part of ISPs’ daily operations and Route Origin Validation is getting widely dep...
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blac...
Over a decade of work has gone into securing the BGP rout-ing control plane. Through all this, there...
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
The Border Gateway Protocol (BGP) is an essential infrastructure element, often termed “the glue tha...
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly...
The deployment of the Resource Public Key Infrastructure (RPKI) is currently gaining traction within...
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called AS employs ...
As the rollout of secure route origin authentication with the RPKI slowly gains traction among netwo...
As the rollout of secure route origin authentication with the RPKI slowly gains traction among netwo...
BGP, the Internet’s interdomain routing protocol, is highly vulnerable to routing failures that resu...
We design and evaluate a lightweight route verification mechanism that enables a router to discover ...
As RPKI is becoming part of ISPs’ daily operations and Route Origin Validation is getting widely dep...
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blac...
Over a decade of work has gone into securing the BGP rout-ing control plane. Through all this, there...