[HTML][HTML] Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures

M Kowalski, W Mazurczyk - Computer Networks, 2023 - Elsevier
Background: The inter-domain routing security is often based on trust, which, as seen in
practice, is an insufficient approach. Due to the deficit of native security controls in the …

Securing internet applications from routing attacks

Y Sun, M Apostolaki, H Birge-Lee, L Vanbever… - Communications of the …, 2021 - dl.acm.org
Securing internet applications from routing attacks Page 1 86 COMMUNICATIONS OF THE
ACM | JUNE 2021 | VOL. 64 | NO. 6 review articles THE INTERNET IS a “network of …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

A survey among network operators on BGP prefix hijacking

P Sermpezis, V Kotronis, A Dainotti… - ACM SIGCOMM …, 2018 - dl.acm.org
BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or
modifications to BGP that protect the Internet against it have been proposed. However, the …

RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI

W Li, Z Lin, MI Ashiq, E Aben, R Fontugne… - Proceedings of the …, 2023 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a system to add security to the Internet
routing. In recent years, the publication of Route Origin Authorization (ROA) objects, which …

Beyond limits: How to disable validators in secure networks

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2023 - dl.acm.org
Relying party validator is a critical component of RPKI: it fetches and validates signed
authorizations mapping prefixes to their owners. Routers use this information to block bogus …

Stalloris:{RPKI} downgrade attack

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - 31st USENIX Security …, 2022 - usenix.org
We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI
that allows our attacks is the tradeoff between connectivity and security: when networks …

Behind the scenes of RPKI

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2022 - dl.acm.org
Best practices for making RPKI resilient to failures and attacks recommend using multiple
URLs and certificates for publication points as well as multiple relying parties. We find that …

PEERING: Virtualizing BGP at the Edge for Research

B Schlinker, T Arnold, I Cunha… - Proceedings of the 15th …, 2019 - dl.acm.org
Internet routing research has long been hindered by obstacles to executing the wide class of
experiments necessary to characterize problems and opportunities, and evaluate candidate …

The Dagstuhl beginners guide to reproducibility for experimental networking research

V Bajpai, A Brunstrom, A Feldmann, W Kellerer… - ACM SIGCOMM …, 2019 - dl.acm.org
Reproducibility is one of the key characteristics of good science, but hard to achieve for
experimental disciplines like Internet measurements and networked systems. This guide …