Results 261 to 270 of about 40,203 (280)
Some of the next articles are maybe not open access.
2007 IEEE 10th International Symposium on Workload Characterization, 2007
Determining which routes to use when forwarding traffic is one of the major processing tasks in the control plane of computer networks. We present a novel benchmark that evaluates the performance of the most commonly used Internet-wide routing protocol, the Border Gateway Protocol (BGP).
Qiang Wu +3 more
openaire +1 more source
Determining which routes to use when forwarding traffic is one of the major processing tasks in the control plane of computer networks. We present a novel benchmark that evaluates the performance of the most commonly used Internet-wide routing protocol, the Border Gateway Protocol (BGP).
Qiang Wu +3 more
openaire +1 more source
BGP with BGPsec: Attacks and Countermeasures
IEEE Network, 2019The BGP suffers from numerous security vulnerabilities, for example, fake routing updates incurring traffic hijacking and interception. The BGPsec protocol is supposed to fix these vulnerabilities by attesting routing updates.
Qi Li +4 more
semanticscholar +1 more source
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '02, 2002It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity. Yet little is known about the frequency of misconfiguration or its causes, except for the few spectacular incidents of widespread outages. In this paper, we present the first quantitative study of BGP misconfiguration.
Ratul Mahajan +2 more
openaire +1 more source
BGP confederation provisioning
2007This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the reliability of large scale autonomous systems. We propose and validate an effective methodology to find the optimal design for a given physical topology.
State, Radu +2 more
openaire +1 more source
BGP Anomaly Detection Techniques: A Survey
IEEE Communications Surveys and Tutorials, 2017Bahaa Al-Musawi, P. Branch, G. Armitage
semanticscholar +1 more source

