메뉴 건너뛰기




Volumn , Issue , 2006, Pages 298-310

Optimizing BGP security by exploiting path stability

Author keywords

BGP; Path stability; Routing; Security

Indexed keywords

COMPUTER SIMULATION; INTERNET; NETWORK PROTOCOLS; NETWORK ROUTING; RESOURCE ALLOCATION;

EID: 34547369855     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180442     Document Type: Conference Paper
Times cited : (63)

References (49)
  • 1
    • 34547305580 scopus 로고    scopus 로고
    • Implications of Path Stability for Efficient Authentication in Interdomain Routing
    • Technical Report NAS-TR-0002-2004, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, Oct. 2004. Revised October
    • W. Aiello, K. Butler, and P. McDaniel. Implications of Path Stability for Efficient Authentication in Interdomain Routing. Technical Report NAS-TR-0002-2004, Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, Oct. 2004. Revised October 2005.
    • (2005)
    • Aiello, W.1    Butler, K.2    McDaniel, P.3
  • 4
    • 34547352177 scopus 로고    scopus 로고
    • A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols (Draft). IETF, April 2004.
    • A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols (Draft). IETF, April 2004.
  • 6
    • 34547367327 scopus 로고    scopus 로고
    • K. Butler, T. Farley, P. McDaniel, and J. Rexford. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, Feb. 2004. (revised June 2004).
    • K. Butler, T. Farley, P. McDaniel, and J. Rexford. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, Florham Park, NJ, Feb. 2004. (revised June 2004).
  • 9
    • 84982836904 scopus 로고    scopus 로고
    • Efficient security mechanisms for routing protocols
    • Feb
    • Y. Hu, A. Perrig, and D. Johnson. Efficient security mechanisms for routing protocols. In Proceedings of NDSS '03, Feb. 2003.
    • (2003) Proceedings of NDSS '03
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 10
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure Path Vector Routing for Securing BGP
    • ACM, August
    • Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In ACM SIGCOMM. ACM, August 2004.
    • (2004) ACM SIGCOMM
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 12
    • 34547304119 scopus 로고    scopus 로고
    • IANA. Autonomous System. Numbers, March 2003.
    • IANA. Autonomous System. Numbers, March 2003.
  • 14
    • 34547244706 scopus 로고    scopus 로고
    • Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes
    • Technical Report TR-CS-2005-37, University of New Mexico, Albuquerque, NM, USA, Oct
    • J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes. Technical Report TR-CS-2005-37, University of New Mexico, Albuquerque, NM, USA, Oct. 2005.
    • (2005)
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 15
    • 34547345799 scopus 로고    scopus 로고
    • Securing the Border Gateway Protocol
    • Sep
    • S. Kent. Securing the Border Gateway Protocol. The Internet Protocol Journal, 6(3), Sep. 2003.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3
    • Kent, S.1
  • 17
    • 84867338222 scopus 로고    scopus 로고
    • Secure Border Gateway Protocol (S-BGP) Real World Performance and Deployment Issues
    • Feb
    • S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure Border Gateway Protocol (S-BGP) Real World Performance and Deployment Issues. In Proceedings of NDSS '00, Feb. 2000.
    • (2000) Proceedings of NDSS '00
    • Kent, S.1    Lynn, C.2    Mikkelson, J.3    Seo, K.4
  • 20
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Nov
    • L. Lamport. Password Authentication with Insecure Communication. Commun. ACM, 24(11):770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 21
    • 34547260246 scopus 로고    scopus 로고
    • An analysis of BGP routing table evolution
    • Technical Report TR030046, Computer Science Department, UCLA, Jan
    • X. Meng, Z. Xu, L. Zhang, and S. Lu. An analysis of BGP routing table evolution. Technical Report TR030046, Computer Science Department, UCLA, Jan. 2003.
    • (2003)
    • Meng, X.1    Xu, Z.2    Zhang, L.3    Lu, S.4
  • 28
    • 34547295708 scopus 로고    scopus 로고
    • The impact of address allocation and routing on the structure and implementation of routing tables
    • Karlsruhe, Germany, Aug, ACM
    • H. Narayan, R. Govindan, and G. Varghese. The impact of address allocation and routing on the structure and implementation of routing tables. In Proceedings of ACM SIGCOMM '03, Karlsruhe, Germany, Aug. 2003. ACM.
    • (2003) Proceedings of ACM SIGCOMM '03
    • Narayan, H.1    Govindan, R.2    Varghese, G.3
  • 30
    • 3042699520 scopus 로고    scopus 로고
    • Evaluation of efficient security for BGP route announcements using parallel simulation
    • July
    • D. Nicol, S. Smith, and M. Zhao. Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory, 12(3-4):187-216, July 2004.
    • (2004) Simulation Modelling Practice and Theory , vol.12 , Issue.3-4 , pp. 187-216
    • Nicol, D.1    Smith, S.2    Zhao, M.3
  • 32
    • 34547349906 scopus 로고    scopus 로고
    • Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program
    • Office of the President of the United States, Nov
    • Office of the President of the United States. Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program. National Strategy to Secure Cyberspace, Nov. 2004.
    • (2004) National Strategy to Secure Cyberspace
  • 33
    • 34547287471 scopus 로고    scopus 로고
    • R. Permian. Network layer Protocols with Byzantine Robustness. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, Oct. 1988. MIT/LCS/TR-429.
    • R. Permian. Network layer Protocols with Byzantine Robustness. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, Oct. 1988. MIT/LCS/TR-429.
  • 35
    • 0003418321 scopus 로고
    • Transmission Control Protocol - DARPA Internet Protocol Program Specification
    • Sep, RFC 793
    • J. Postel. Transmission Control Protocol - DARPA Internet Protocol Program Specification. IETF, Sep. 1981. RFC 793.
    • (1981) IETF
    • Postel, J.1
  • 36
    • 34547370425 scopus 로고    scopus 로고
    • J. Puig, M. Achemlal, E. Jones, and D. McPherson. Generic Security Requirements for Routing Protocols (Draft). IETF, July 2004.
    • J. Puig, M. Achemlal, E. Jones, and D. McPherson. Generic Security Requirements for Routing Protocols (Draft). IETF, July 2004.
  • 38
    • 34547280185 scopus 로고    scopus 로고
    • Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006.
    • Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006.
  • 40
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
  • 48
    • 0034512956 scopus 로고    scopus 로고
    • Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It
    • Nov
    • X. Zhang, S. Wu, Z. Fu, and T.-L. Wu. Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. In Proceedings of ICNP 2000, Nov. 2000.
    • (2000) Proceedings of ICNP 2000
    • Zhang, X.1    Wu, S.2    Fu, Z.3    Wu, T.-L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.