Results 251 to 260 of about 40,203 (280)
Some of the next articles are maybe not open access.

Credible-BGP: A Hybrid Cryptosystem to Secure BGP

2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol.
Junaid Israr   +3 more
openaire   +1 more source

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing

International Conference on Blockchain, 2019
Routing on the Internet is defined among autonomous systems (ASes) based on a weak trust model where it is assumed that ASes are honest. While this trust model strengthens the connectivity among ASes, it results in an attack surface which is exploited by
Muhammad Saad   +5 more
semanticscholar   +1 more source

Working Around BGP: An Improvement of BGP Session Maintenance

International conference on Networking and Services (ICNS'06), 2006
The Border Gateway Protocol (BGP) is the routing protocol that glues together the global Internet. BGP makes use of a "managed session" to maintain a bidirectional error-free session over which reachability information is exchanged between Autonomous Systems (ASes) in the global Internet. Nevertheless, despite its great importance to BGP, this "managed
Cavalli, A., Vieira, D.
openaire   +1 more source

BGP-RCN: improving BGP convergence through root cause notification

Computer Networks, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pei, Dan   +3 more
openaire   +2 more sources

Detecting BGP Route Anomalies with Deep Learning

Conference on Computer Communications Workshops, 2019
Fake or mistaken BGP updates can cause serious damage to Internet routing. We note that an expert network administrator can develop a “gut feeling” that lets them identify mistaken or attack updates.
Kyle McGlynn   +2 more
semanticscholar   +1 more source

BGP Dataset Generation and Feature Extraction for Anomaly Detection

International Symposium on Computers and Communications, 2019
The Border Gateway Protocol (BGP) is the default Internet routing protocol that manages connectivity among Autonomous Systems (ASes). Although BGP disruptions are rare, when they occur the consequences can be very damaging.
P. Fonseca   +3 more
semanticscholar   +1 more source

Beating BGP is Harder than we Thought

ACM Workshop on Hot Topics in Networks, 2019
Online services all seek to provide their customers with the best Quality of Experience (QoE) possible. Milliseconds of delay can cause users to abandon a cat video or move onto a different shopping site, which translates into lost revenue.
Todd Arnold   +6 more
semanticscholar   +1 more source

Persistent BGP deviation

Proceedings of the International Conference on Advances in Computing, Communication and Control, 2009
An autonomous system is a network or group of networks under a common administration and with common routing policies. The Internet is a collection of such autonomous systems. In order to find a path from one autonomous system to any other autonomous system, neighboring autonomous systems exchange routing information via the Border Gateway Protocol ...
Smita A. Attarde, Shital K. Dhamal
openaire   +1 more source

Securing BGP incrementally

Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, 2007
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it became clear that any viable secure routing protocol must offer benefits also in its early stages of deployment.
Martin Suchara   +2 more
openaire   +1 more source

Multi-Scale LSTM Model for BGP Anomaly Classification

IEEE Transactions on Services Computing, 2018
As a policy-based routing protocol, the primary purpose of Border Gateway Protocol (BGP) is to exchange routing reachability information to provide sufficient end-to-end Quality-of-Service (QoS).
Min Cheng   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy