The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
Securing BGP—A literature survey
G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …
the major concerns related to BGP is its lack of effective security measures, and as a result …
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
Accurate real-time identification of IP prefix hijacking
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in
real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network …
real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network …
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
Losing control of the internet: using the data plane to attack the control plane
In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST,
attack, a distributed denial of service attack that attacks the control plane of the Internet …
attack, a distributed denial of service attack that attacks the control plane of the Internet …
On interdomain routing security and pretty secure BGP (psBGP)
It is well known that the Border Gateway Protocol (BGP), the IETF standard interdomain
routing protocol, is vulnerable to a variety of attacks, and that a single misconfigured or …
routing protocol, is vulnerable to a variety of attacks, and that a single misconfigured or …
Computational and energy costs of cryptographic algorithms on handheld devices
H Rifa-Pous, J Herrera-Joancomartí - Future internet, 2011 - mdpi.com
Networks are evolving toward a ubiquitous model in which heterogeneous devices are
interconnected. Cryptographic algorithms are required for developing security solutions that …
interconnected. Cryptographic algorithms are required for developing security solutions that …
An ID-based aggregate signature scheme with constant pairing computations
KA Shim - Journal of Systems and Software, 2010 - Elsevier
An aggregate signature scheme allows n signatures on n distinct messages from n distinct
users to aggregate a single signature. The main benefit of such schemes is that they allow …
users to aggregate a single signature. The main benefit of such schemes is that they allow …
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates
an IP prefix that the router does not own, is becoming an increasingly serious security …
an IP prefix that the router does not own, is becoming an increasingly serious security …