Results 231 to 240 of about 40,203 (280)
Some of the next articles are maybe not open access.

Using BGP Features Towards Identifying Type of BGP Anomaly

2021 International Congress of Advanced Technology and Engineering (ICOTEN), 2021
Unregular events such as large-scale power outages and routing table leaks (RTL) can negatively affect the global routing stability and interrupt Internet services. The Border Gateway Protocol (BGP) is the de-facto Internet routing protocol responsible for managing connectivity between Autonomous Systems (ASes).
Noor Hadi Hammood, Bahaa Al-Musawi
openaire   +2 more sources

BGP hijacking classification

2019 Network Traffic Measurement and Analysis Conference (TMA), 2019
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Cho, Shinyoung   +4 more
openaire   +3 more sources

AP2Vec: An Unsupervised Approach for BGP Hijacking Detection

IEEE Transactions on Network and Service Management, 2022
BGP hijack attacks deflect traffic between endpoints through the attacker network, leading to man-in-the-middle attacks. Thus its detection is an important security challenge.
T. Shapira, Y. Shavitt
semanticscholar   +1 more source

Automatic Inference of BGP Location Communities

Measurement and Modeling of Computer Systems, 2022
We present a set of techniques to infer the semantics of BGP communities from public BGP data. Our techniques infer communities related to the entities or locations traversed by a route by correlating communities with AS paths.
B. A. D. Silva   +5 more
semanticscholar   +1 more source

ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning

IEEE International Conference on Network Protocols, 2021
The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable protocol in the network. However, the lack of routing authentication and validation makes it vulnerable to attacks, including routing leaks, route hijacking, prefix ...
Yutao Dong   +4 more
semanticscholar   +1 more source

BGP Optimal Route Reflection (BGP ORR)

2021
This document proposes a solution for BGP route reflectors to allow them to choose the best path for their clients that the clients themselves would have chosen under the same conditions, without requiring further state or any new features to be placed on the clients. This facilitates, for example, best exit point policy (hot potato routing).
C. Cassar, E. Åman, K. Wang
openaire   +1 more source

A Certificate Pin BGP Protocol: CP-BGP

2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020
Border Gateway Protocol (BGP) is always the target of the attacks since it is the only routing protocol connecting different Autonomous Systems (ASes) in Internet. BGP fraud is one of the common attacks targeting BGP routing on Internet. YouTube hijacking in 2008 and recent Google traffic hijacking in 2018 are because of routing hijacking.
Yanwei Wu, Ru Wang, Xiaohua Xu
openaire   +1 more source

Multiple route selector BGP (MRS-BGP)

Proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010
To maximize the utilization of network resources it is necessary to have good approach for Routing Policy. The protocol currently used for Interdomain Routing is Border Gateway Protocol (BGP). BGP permits each router to use single best route for each destination prefix even though multiple routes to the same destination exists.
L. L. Ragha, K. V. Ghag
openaire   +1 more source

Multiplexing BGP sessions with BGP-Mux

Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, 2007
This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions.
Vytautas Valancius, Nick Feamster
openaire   +1 more source

Home - About - Disclaimer - Privacy