Results 251 to 260 of about 40,203 (280)
Some of the next articles are maybe not open access.
Credible-BGP: A Hybrid Cryptosystem to Secure BGP
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol.
Junaid Israr +3 more
openaire +1 more source
RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing
International Conference on Blockchain, 2019Routing on the Internet is defined among autonomous systems (ASes) based on a weak trust model where it is assumed that ASes are honest. While this trust model strengthens the connectivity among ASes, it results in an attack surface which is exploited by
Muhammad Saad +5 more
semanticscholar +1 more source
Working Around BGP: An Improvement of BGP Session Maintenance
International conference on Networking and Services (ICNS'06), 2006The Border Gateway Protocol (BGP) is the routing protocol that glues together the global Internet. BGP makes use of a "managed session" to maintain a bidirectional error-free session over which reachability information is exchanged between Autonomous Systems (ASes) in the global Internet. Nevertheless, despite its great importance to BGP, this "managed
Cavalli, A., Vieira, D.
openaire +1 more source
BGP-RCN: improving BGP convergence through root cause notification
Computer Networks, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pei, Dan +3 more
openaire +2 more sources
Detecting BGP Route Anomalies with Deep Learning
Conference on Computer Communications Workshops, 2019Fake or mistaken BGP updates can cause serious damage to Internet routing. We note that an expert network administrator can develop a “gut feeling” that lets them identify mistaken or attack updates.
Kyle McGlynn +2 more
semanticscholar +1 more source
BGP Dataset Generation and Feature Extraction for Anomaly Detection
International Symposium on Computers and Communications, 2019The Border Gateway Protocol (BGP) is the default Internet routing protocol that manages connectivity among Autonomous Systems (ASes). Although BGP disruptions are rare, when they occur the consequences can be very damaging.
P. Fonseca +3 more
semanticscholar +1 more source
Beating BGP is Harder than we Thought
ACM Workshop on Hot Topics in Networks, 2019Online services all seek to provide their customers with the best Quality of Experience (QoE) possible. Milliseconds of delay can cause users to abandon a cat video or move onto a different shopping site, which translates into lost revenue.
Todd Arnold +6 more
semanticscholar +1 more source
Proceedings of the International Conference on Advances in Computing, Communication and Control, 2009
An autonomous system is a network or group of networks under a common administration and with common routing policies. The Internet is a collection of such autonomous systems. In order to find a path from one autonomous system to any other autonomous system, neighboring autonomous systems exchange routing information via the Border Gateway Protocol ...
Smita A. Attarde, Shital K. Dhamal
openaire +1 more source
An autonomous system is a network or group of networks under a common administration and with common routing policies. The Internet is a collection of such autonomous systems. In order to find a path from one autonomous system to any other autonomous system, neighboring autonomous systems exchange routing information via the Border Gateway Protocol ...
Smita A. Attarde, Shital K. Dhamal
openaire +1 more source
Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07, 2007
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it became clear that any viable secure routing protocol must offer benefits also in its early stages of deployment.
Martin Suchara +2 more
openaire +1 more source
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it became clear that any viable secure routing protocol must offer benefits also in its early stages of deployment.
Martin Suchara +2 more
openaire +1 more source
Multi-Scale LSTM Model for BGP Anomaly Classification
IEEE Transactions on Services Computing, 2018As a policy-based routing protocol, the primary purpose of Border Gateway Protocol (BGP) is to exchange routing reachability information to provide sufficient end-to-end Quality-of-Service (QoS).
Min Cheng +4 more
semanticscholar +1 more source

