-
1
-
-
34547305580
-
Implications of Path Stability for Efficient Authentication in Interdomain Routing
-
Technical Report NAS-TR-0002-2004, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, Oct. 2004. Revised October
-
W. Aiello, K. Butler, and P. McDaniel. Implications of Path Stability for Efficient Authentication in Interdomain Routing. Technical Report NAS-TR-0002-2004, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, Oct. 2004. Revised October 2005.
-
(2005)
-
-
Aiello, W.1
Butler, K.2
McDaniel, P.3
-
3
-
-
0034538250
-
Security issues in control, management and routing protocols
-
881-894, Elsevier Editions, Amsterdam
-
M. Baltatu, A. Lioy, F. Maino, and D. Mazzocchi. Security issues in control, management and routing protocols. Computer Networks (Amsterdam, Netherlands: 1999), 34(6):881-894, 2000. Elsevier Editions, Amsterdam.
-
(2000)
Computer Networks (Amsterdam, Netherlands: 1999)
, vol.34
, Issue.6
-
-
Baltatu, M.1
Lioy, A.2
Maino, F.3
Mazzocchi, D.4
-
4
-
-
34547352177
-
-
A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols (Draft). IETF, April 2004.
-
A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols (Draft). IETF, April 2004.
-
-
-
-
6
-
-
34547367327
-
-
K. Butler, T. Farley, P. McDaniel, and J. Rexford. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, Feb. 2004. (revised June 2004).
-
K. Butler, T. Farley, P. McDaniel, and J. Rexford. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, Feb. 2004. (revised June 2004).
-
-
-
-
7
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
Feb
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proceedings of NDSS '03, Feb. 2003.
-
(2003)
Proceedings of NDSS '03
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
8
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
IEEE Computer Society Press, June, Los Angeles, CA
-
M. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX). IEEE Computer Society Press, June 2001. Los Angeles, CA.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX)
-
-
Goodrich, M.1
Tamassia, R.2
Schwerin, A.3
-
10
-
-
26444521917
-
SPV: Secure Path Vector Routing for Securing BGP
-
ACM, August
-
Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In ACM SIGCOMM. ACM, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
12
-
-
34547304119
-
-
IANA. Autonomous System. Numbers, March 2003.
-
IANA. Autonomous System. Numbers, March 2003.
-
-
-
-
14
-
-
34547244706
-
Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes
-
Technical Report TR-CS-2005-37, University of New Mexico, Albuquerque, NM, USA, Oct
-
J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes. Technical Report TR-CS-2005-37, University of New Mexico, Albuquerque, NM, USA, Oct. 2005.
-
(2005)
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
15
-
-
34547345799
-
Securing the Border Gateway Protocol
-
Sep
-
S. Kent. Securing the Border Gateway Protocol. The Internet Protocol Journal, 6(3), Sep. 2003.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
-
-
Kent, S.1
-
17
-
-
84867338222
-
Secure Border Gateway Protocol (S-BGP) Real World Performance and Deployment Issues
-
Feb
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure Border Gateway Protocol (S-BGP) Real World Performance and Deployment Issues. In Proceedings of NDSS '00, Feb. 2000.
-
(2000)
Proceedings of NDSS '00
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
20
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Nov
-
L. Lamport. Password Authentication with Insecure Communication. Commun. ACM, 24(11):770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
21
-
-
34547260246
-
An analysis of BGP routing table evolution
-
Technical Report TR030046, Computer Science Department, UCLA, Jan
-
X. Meng, Z. Xu, L. Zhang, and S. Lu. An analysis of BGP routing table evolution. Technical Report TR030046, Computer Science Department, UCLA, Jan. 2003.
-
(2003)
-
-
Meng, X.1
Xu, Z.2
Zhang, L.3
Lu, S.4
-
28
-
-
34547295708
-
The impact of address allocation and routing on the structure and implementation of routing tables
-
Karlsruhe, Germany, Aug, ACM
-
H. Narayan, R. Govindan, and G. Varghese. The impact of address allocation and routing on the structure and implementation of routing tables. In Proceedings of ACM SIGCOMM '03, Karlsruhe, Germany, Aug. 2003. ACM.
-
(2003)
Proceedings of ACM SIGCOMM '03
-
-
Narayan, H.1
Govindan, R.2
Varghese, G.3
-
30
-
-
3042699520
-
Evaluation of efficient security for BGP route announcements using parallel simulation
-
July
-
D. Nicol, S. Smith, and M. Zhao. Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory, 12(3-4):187-216, July 2004.
-
(2004)
Simulation Modelling Practice and Theory
, vol.12
, Issue.3-4
, pp. 187-216
-
-
Nicol, D.1
Smith, S.2
Zhao, M.3
-
32
-
-
34547349906
-
Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program
-
Office of the President of the United States, Nov
-
Office of the President of the United States. Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program. National Strategy to Secure Cyberspace, Nov. 2004.
-
(2004)
National Strategy to Secure Cyberspace
-
-
-
33
-
-
34547287471
-
-
R. Permian. Network layer Protocols with Byzantine Robustness. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, Oct. 1988. MIT/LCS/TR-429.
-
R. Permian. Network layer Protocols with Byzantine Robustness. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, Oct. 1988. MIT/LCS/TR-429.
-
-
-
-
35
-
-
0003418321
-
Transmission Control Protocol - DARPA Internet Protocol Program Specification
-
Sep, RFC 793
-
J. Postel. Transmission Control Protocol - DARPA Internet Protocol Program Specification. IETF, Sep. 1981. RFC 793.
-
(1981)
IETF
-
-
Postel, J.1
-
36
-
-
34547370425
-
-
J. Puig, M. Achemlal, E. Jones, and D. McPherson. Generic Security Requirements for Routing Protocols (Draft). IETF, July 2004.
-
J. Puig, M. Achemlal, E. Jones, and D. McPherson. Generic Security Requirements for Routing Protocols (Draft). IETF, July 2004.
-
-
-
-
38
-
-
34547280185
-
-
Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006.
-
Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006.
-
-
-
-
39
-
-
0141920459
-
BGP routing stability of popular destinations
-
New York, NY, USA, ACM Press
-
J. Rexford, J. Wang, Z. Xiao, and Y. Zhang. BGP routing stability of popular destinations. In IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 197-202, New York, NY, USA, 2002. ACM Press.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 197-202
-
-
Rexford, J.1
Wang, J.2
Xiao, Z.3
Zhang, Y.4
-
40
-
-
0017930809
-
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
-
-
-
-
43
-
-
83255186150
-
Listen and Whisper: Security mechanisms for BGP
-
Mar
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security mechanisms for BGP. In Proceedings of NSDI'04, Mar. 2004.
-
(2004)
Proceedings of NSDI'04
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
44
-
-
34547332716
-
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
-
October
-
S. Teoh, K. Ma, S. Wu, D. Pei, L. Wang, L. Zhang, D. Massey, and R. Bush. Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. In Proceedings of IEEE/IFIP DSOM '03, October 2003.
-
(2003)
Proceedings of IEEE/IFIP DSOM '03
-
-
Teoh, S.1
Ma, K.2
Wu, S.3
Pei, D.4
Wang, L.5
Zhang, L.6
Massey, D.7
Bush, R.8
-
46
-
-
0037629741
-
Protecting BGP Routes to Top Level DNS Servers
-
May
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. Protecting BGP Routes to Top Level DNS Servers. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), May 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS)
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Mankin, A.6
Wu, S.F.7
Zhang, L.8
-
47
-
-
34547362242
-
-
North American Network Operators Group NANOG, October
-
K. Zhang, S.-T. Teoh, S.-M. Tseng, C-N. Chuah, K.-L. Ma, and F. Wu. Performing BGP experiments on a semi-realistic internet environment. North American Network Operators Group (NANOG), October 2004.
-
(2004)
Performing BGP experiments on a semi-realistic internet environment
-
-
Zhang, K.1
Teoh, S.-T.2
Tseng, S.-M.3
Chuah, C.-N.4
Ma, K.-L.5
Wu, F.6
-
48
-
-
0034512956
-
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It
-
Nov
-
X. Zhang, S. Wu, Z. Fu, and T.-L. Wu. Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. In Proceedings of ICNP 2000, Nov. 2000.
-
(2000)
Proceedings of ICNP 2000
-
-
Zhang, X.1
Wu, S.2
Fu, Z.3
Wu, T.-L.4
-
49
-
-
33745774761
-
Aggregated path authentication for efficient BGP security
-
Nov, Alexandria, VA, USA
-
M. Zhao, S. W. Smith, and D. M. Nicol. Aggregated path authentication for efficient BGP security. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Nov. 2005. Alexandria, VA, USA.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
|