Results 241 to 250 of about 40,203 (280)
Some of the next articles are maybe not open access.
Detecting BGP Misconfiguration for BGP/MPLS VPNs
Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 2005In BGP/MPLS VPNs, Border Gateway Protocol (BGP) is used to exchange Virtual Private Network (VPN) routing information throughout the provider network consisting of Autonomous Systems (ASes). Configuration errors in BGP/MPLS VPNs can increase Autonomous Systems Border Routers (ASBRs) or Provider Edge (PE) routers overhead on memory and CPU, and even ...
null Haiying Liang +3 more
openaire +1 more source
A Fraud Prevention BGP Protocol: CP-BGP
2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018Border Gateway Protocol (BGP) is the glue of the Internet and the only routing protocol to route between different Autonomous Systems (ASes). Recently the attacks targeting BGP are keeping increasing. For example the the Youtube hijacking in 2008 and Google traffic hijacking on Nov. 12 in 2018. There are lots of secure protocols designed to prevent the
Yanwei Wu, Ruiguo Yu, Ru Wang
openaire +1 more source
International Conference on Cyber Conflict, 2020
This paper presents the results of a year-long research project conducted by GEODE (geode.science), a multidisciplinary team made up of geographers, computer scientists and area specialists.We developed a new methodology for mapping cyberspace in its ...
Frédérick Douzet +5 more
semanticscholar +1 more source
This paper presents the results of a year-long research project conducted by GEODE (geode.science), a multidisciplinary team made up of geographers, computer scientists and area specialists.We developed a new methodology for mapping cyberspace in its ...
Frédérick Douzet +5 more
semanticscholar +1 more source
Recognizing BGP Communities Based on Graph Neural Network
IEEE NetworkThe identification of BGP community attributes holds significant importance in routing modeling for understanding their impact on routing behavior and policies. However, when it comes to identifying BGP community attributes, existing rule-based solutions
Yuntian Tan +4 more
semanticscholar +1 more source
Proceedings of the 2019 International Conference on Blockchain Technology, 2019
Nowadays, the Internet has become a huge network composed of multiple autonomous systems (ASs) which are managed by various network operators. Network operators try to apply different network optimization technologies, based on link state information such as link bandwidth, link delay, to improve the network performance.
Xuyang Ma, Du Xu, Hao Dang
openaire +1 more source
Nowadays, the Internet has become a huge network composed of multiple autonomous systems (ASs) which are managed by various network operators. Network operators try to apply different network optimization technologies, based on link state information such as link bandwidth, link delay, to improve the network performance.
Xuyang Ma, Du Xu, Hao Dang
openaire +1 more source
Proceedings of the 3rd international workshop on Visualization for computer security, 2006
Owing to the inter-domain aspects of BGP routing, it is difficult to correlate information across multiple domains in order to analyze the root cause of the routing outages. We present BGP Eye, a tool for visualization-aided root-cause analysis of BGP anomalies.
Soon Tee Teoh +3 more
openaire +1 more source
Owing to the inter-domain aspects of BGP routing, it is difficult to correlate information across multiple domains in order to analyze the root cause of the routing outages. We present BGP Eye, a tool for visualization-aided root-cause analysis of BGP anomalies.
Soon Tee Teoh +3 more
openaire +1 more source
The Next Generation of BGP Data Collection Platforms
Conference on Applications, Technologies, Architectures, and Protocols for Computer CommunicationBGP data collection platforms as currently architected face fundamental challenges that threaten their long-term sustainability. Inspired by recent work, we analyze, prototype, and evaluate a new optimization paradigm for BGP collection.
Thomas Alfroy +4 more
semanticscholar +1 more source
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stability of Internet routing. Here we make two contributions: firstly we find patterns in BGP updates, like self-similarity, power-law and lognormal marginals; secondly using these ...
B. Aditya Prakash +4 more
openaire +1 more source
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stability of Internet routing. Here we make two contributions: firstly we find patterns in BGP updates, like self-similarity, power-law and lognormal marginals; secondly using these ...
B. Aditya Prakash +4 more
openaire +1 more source
Proceedings of the conference on Internet measurement conference - IMC '03, 2003
The desire to better understand global BGP dynamics has motivated several studies using active measurement techniques, which inject announcements and withdrawals of prefixes from the global routing domain. From these one can measure quantities such as the BGP convergence time.
Z. Morley Mao +3 more
openaire +1 more source
The desire to better understand global BGP dynamics has motivated several studies using active measurement techniques, which inject announcements and withdrawals of prefixes from the global routing domain. From these one can measure quantities such as the BGP convergence time.
Z. Morley Mao +3 more
openaire +1 more source
PEERING: virtualizing BGP at the edge for research
Conference on Emerging Network Experiment and Technology, 2019Internet routing research has long been hindered by obstacles to executing the wide class of experiments necessary to characterize problems and opportunities, and evaluate candidate solutions.
Brandon Schlinker +3 more
semanticscholar +1 more source

