The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
Low-rate DoS attacks, detection, defense, and challenges: A survey
W Zhijun, L Wenjing, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
[PDF][PDF] SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
We have recently witnessed the real life demonstration of link-flooding attacks—DDoS
attacks that target the core of the Internet that can cause significant damage while remaining …
attacks that target the core of the Internet that can cause significant damage while remaining …
[图书][B] SCION: a secure Internet architecture
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
Software-Defined Networking (SDN) enables network innovations with a centralized
controller controlling the whole network through the control channel. Because the control …
controller controlling the whole network through the control channel. Because the control …
Disrupting the SDN control channel via shared links: Attacks and countermeasures
Software-Defined Networking (SDN). SDN enables network innovations with a centralized
controller controlling the whole network through the control channel. Because the control …
controller controlling the whole network through the control channel. Because the control …
[HTML][HTML] The scion internet architecture
The SCION internet architecture Page 1 56 COMMUNICATIONS OF THE ACM | JUNE 2017 |
VOL. 60 | NO. 6 THE INTERNET HAS been successful beyond even the most optimistic …
VOL. 60 | NO. 6 THE INTERNET HAS been successful beyond even the most optimistic …
Toposcope: Recover as relationships from fragmentary observations
Knowledge of the Internet topology and the business relationships between Autonomous
Systems (ASes) is the basis for studying many aspects of the Internet. Despite the significant …
Systems (ASes) is the basis for studying many aspects of the Internet. Despite the significant …