Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this issue, the Resource Public Key Infrastructure (RPKI) was developed starting in 2008, with deployment beginning in 2011. This paper performs the first comprehensive, longitudinal study of the deployment, coverage, and quality of RPKI. We use a unique dataset containing all RPKI Route Origin Authorizations (ROAs) from the moment RPKI was first deployed, more than 8 years ago. We combine this dataset with BGP announcements from more than 3,300 BGP collectors worldwide. Our analysis shows the after a...
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the ...
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A...
In this paper, we introduce a framework to observe RPKI relying parties (i.e., those that fetch RPKI...
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blac...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
The Border Gateway Protocol (BGP) is an essential infrastructure element, often termed “the glue tha...
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical a...
The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of the most...
BGP, the Internet’s interdomain routing protocol, is highly vulnerable to routing failures that resu...
Across the Internet, mistaken and malicious routing announcements impose significant costs on users ...
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the ...
Web content delivery is one of the most important services on the Internet. Access to websites is ty...
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploit...
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the ...
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A...
In this paper, we introduce a framework to observe RPKI relying parties (i.e., those that fetch RPKI...
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the interna...
BGP is a gaping security hole in todays Internet, as evidenced by numerous Internet outages and blac...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed with-out considering securit...
The Border Gateway Protocol (BGP) is an essential infrastructure element, often termed “the glue tha...
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical a...
The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of the most...
BGP, the Internet’s interdomain routing protocol, is highly vulnerable to routing failures that resu...
Across the Internet, mistaken and malicious routing announcements impose significant costs on users ...
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the ...
Web content delivery is one of the most important services on the Internet. Access to websites is ty...
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploit...
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of the ...
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A...
In this paper, we introduce a framework to observe RPKI relying parties (i.e., those that fetch RPKI...