Results 161 to 170 of about 27,657 (209)
Some of the next articles are maybe not open access.
Securing BGP — A Literature Survey
IEEE Communications Surveys and Tutorials, 2011The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack.
Grenville Armitage
exaly +3 more sources
BGP-RCN: improving BGP convergence through root cause notification
Computer Networks, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dan Pei, Lixia Zhang
exaly +3 more sources
A Certificate Pin BGP Protocol: CP-BGP
2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020Border Gateway Protocol (BGP) is always the target of the attacks since it is the only routing protocol connecting different Autonomous Systems (ASes) in Internet. BGP fraud is one of the common attacks targeting BGP routing on Internet. YouTube hijacking in 2008 and recent Google traffic hijacking in 2018 are because of routing hijacking.
Yanwei Wu, Ru Wang, Xiaohua Xu 0002
openaire +1 more source
Multiplexing BGP sessions with BGP-Mux
Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, 2007This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions.
Vytautas Valancius, Nick Feamster
openaire +1 more source
Proceedings of the conference on Internet measurement conference - IMC '03, 2003
The desire to better understand global BGP dynamics has motivated several studies using active measurement techniques, which inject announcements and withdrawals of prefixes from the global routing domain. From these one can measure quantities such as the BGP convergence time.
Zhuoqing Morley Mao +3 more
openaire +1 more source
The desire to better understand global BGP dynamics has motivated several studies using active measurement techniques, which inject announcements and withdrawals of prefixes from the global routing domain. From these one can measure quantities such as the BGP convergence time.
Zhuoqing Morley Mao +3 more
openaire +1 more source
Multiple route selector BGP (MRS-BGP)
Proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010To maximize the utilization of network resources it is necessary to have good approach for Routing Policy. The protocol currently used for Interdomain Routing is Border Gateway Protocol (BGP). BGP permits each router to use single best route for each destination prefix even though multiple routes to the same destination exists.
Lata L. Ragha, K. V. Ghag
openaire +1 more source
Credible-BGP: A Hybrid Cryptosystem to Secure BGP
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol.
Junaid Israr +3 more
openaire +1 more source
Detecting BGP Misconfiguration for BGP/MPLS VPNs
Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 2005In BGP/MPLS VPNs, Border Gateway Protocol (BGP) is used to exchange Virtual Private Network (VPN) routing information throughout the provider network consisting of Autonomous Systems (ASes). Configuration errors in BGP/MPLS VPNs can increase Autonomous Systems Border Routers (ASBRs) or Provider Edge (PE) routers overhead on memory and CPU, and even ...
HaiYing Liang +3 more
openaire +1 more source
Working Around BGP: An Improvement of BGP Session Maintenance
International conference on Networking and Services (ICNS'06), 2006The Border Gateway Protocol (BGP) is the routing protocol that glues together the global Internet. BGP makes use of a "managed session" to maintain a bidirectional error-free session over which reachability information is exchanged between Autonomous Systems (ASes) in the global Internet. Nevertheless, despite its great importance to BGP, this "managed
Cavalli, A., Vieira, D.
openaire +1 more source
2019 Network Traffic Measurement and Analysis Conference (TMA), 2019
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Shinyoung Cho +4 more
openaire +2 more sources
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Shinyoung Cho +4 more
openaire +2 more sources

