Results 161 to 170 of about 27,657 (209)
Some of the next articles are maybe not open access.

Securing BGP — A Literature Survey

IEEE Communications Surveys and Tutorials, 2011
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack.
Grenville Armitage
exaly   +3 more sources

BGP-RCN: improving BGP convergence through root cause notification

Computer Networks, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dan Pei, Lixia Zhang
exaly   +3 more sources

A Certificate Pin BGP Protocol: CP-BGP

2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020
Border Gateway Protocol (BGP) is always the target of the attacks since it is the only routing protocol connecting different Autonomous Systems (ASes) in Internet. BGP fraud is one of the common attacks targeting BGP routing on Internet. YouTube hijacking in 2008 and recent Google traffic hijacking in 2018 are because of routing hijacking.
Yanwei Wu, Ru Wang, Xiaohua Xu 0002
openaire   +1 more source

Multiplexing BGP sessions with BGP-Mux

Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, 2007
This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions.
Vytautas Valancius, Nick Feamster
openaire   +1 more source

BGP beacons

Proceedings of the conference on Internet measurement conference - IMC '03, 2003
The desire to better understand global BGP dynamics has motivated several studies using active measurement techniques, which inject announcements and withdrawals of prefixes from the global routing domain. From these one can measure quantities such as the BGP convergence time.
Zhuoqing Morley Mao   +3 more
openaire   +1 more source

Multiple route selector BGP (MRS-BGP)

Proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010
To maximize the utilization of network resources it is necessary to have good approach for Routing Policy. The protocol currently used for Interdomain Routing is Border Gateway Protocol (BGP). BGP permits each router to use single best route for each destination prefix even though multiple routes to the same destination exists.
Lata L. Ragha, K. V. Ghag
openaire   +1 more source

Credible-BGP: A Hybrid Cryptosystem to Secure BGP

2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol.
Junaid Israr   +3 more
openaire   +1 more source

Detecting BGP Misconfiguration for BGP/MPLS VPNs

Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 2005
In BGP/MPLS VPNs, Border Gateway Protocol (BGP) is used to exchange Virtual Private Network (VPN) routing information throughout the provider network consisting of Autonomous Systems (ASes). Configuration errors in BGP/MPLS VPNs can increase Autonomous Systems Border Routers (ASBRs) or Provider Edge (PE) routers overhead on memory and CPU, and even ...
HaiYing Liang   +3 more
openaire   +1 more source

Working Around BGP: An Improvement of BGP Session Maintenance

International conference on Networking and Services (ICNS'06), 2006
The Border Gateway Protocol (BGP) is the routing protocol that glues together the global Internet. BGP makes use of a "managed session" to maintain a bidirectional error-free session over which reachability information is exchanged between Autonomous Systems (ASes) in the global Internet. Nevertheless, despite its great importance to BGP, this "managed
Cavalli, A., Vieira, D.
openaire   +1 more source

BGP hijacking classification

2019 Network Traffic Measurement and Analysis Conference (TMA), 2019
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Shinyoung Cho   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy