-
2
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar, "Integration of security in network routing protocols," ACM SIGSAC Review, vol.11, no.2, pp. 18-25, 1993.
-
(1993)
ACM SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
5
-
-
0032154023
-
Detecting disruptive routers: A distributed network monitoring approach
-
IEEE Network, 1998
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: a distributed network monitoring approach," in Proc. IEEE Symposium on Security and Privacy, vol.12, 1998, pp. 50-60 (IEEE Network, 1998).
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, vol.12
, pp. 50-60
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
6
-
-
0342446307
-
Protection of BGP sessions via the TCP MD5 signature option
-
A. Heffernan, "Protection of BGP sessions via the TCP MD5 signature option," IETF, RFC 2385, 1998.
-
(1998)
IETF, RFC 2385
-
-
Heffernan, A.1
-
7
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
IEEE J. Select. Areas Commun., 2000
-
S. Kent, C. Lynn, K. Seo, B. B. N. Technol, and M. A. Cambridge, "Secure border gateway protocol (S-BGP)," in Proc. ISOC Network and Distributed Systems Security Symposium, vol.18, 2000, pp. 582-592 (IEEE J. Select. Areas Commun., 2000).
-
(2000)
Proc. ISOC Network and Distributed Systems Security Symposium
, vol.18
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
Technol, B.B.N.4
Cambridge, M.A.5
-
8
-
-
70449458187
-
Validation of the multiple origin ASes conflicts through BGP community attribute
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "Validation of the multiple origin ASes conflicts through BGP community attribute," IETF Draft, 2001.
-
(2001)
IETF Draft
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
9
-
-
34548765292
-
Extensions to BGP to support Secure Origin BGP (soBGP)
-
Oct.
-
J. Ng, "Extensions to BGP to Support Secure Origin BGP (soBGP)," IETF ID draft-ng-sobgp-bgp-extensions-00, Oct., 2002.
-
(2002)
IETF ID Draft-ng-sobgp-bgp-extensions-00
-
-
Ng, J.1
-
10
-
-
0037629741
-
Protecting BGP routes to top-level DNS servers
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, and L. Zhang, "Protecting BGP routes to top-level DNS servers," in Proc. 23rd International Conference on Distrubuted Computing Systems, vol.14, 2003, pp. 851-860.
-
(2003)
Proc. 23rd International Conference on Distrubuted Computing Systems
, vol.14
, pp. 851-860
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Zhang, L.6
-
11
-
-
21844446420
-
Topology-based detection of anomalous BGP messages
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, "Topology-based detection of anomalous BGP messages," in Proc. Symposium on Recent Advances in Intrusion Detection, 2003.
-
(2003)
Proc. Symposium on Recent Advances in Intrusion Detection
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
12
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
G. Goodell, W Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy of interdomain routing," in Proc. NDSS, 2003.
-
(2003)
Proc. NDSS
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
13
-
-
11244282960
-
Origin authentication in interdomain routing
-
W Aiello, J. Ioannidis, and P. McDaniel, "Origin authentication in interdomain routing," Proc. 10th ACM conference on Computer and Communications Security, pp. 165-178, 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security
, pp. 165-178
-
-
Aiello, W.1
Ioannidis, J.2
McDaniel, P.3
-
14
-
-
83255186150
-
Listen and whisper: Security mechanisms for BGP
-
L. Subramanian, V Roth, I. Stoica, S. Shenker, and R. Katz, "Listen and whisper: Security mechanisms for BGP," in Proc. NSDI, 2004.
-
(2004)
Proc. NSDI
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
15
-
-
21844463097
-
SPV: Secure path vector routing for securing BGP
-
Y. C. Hu, A. Perrig, and M. Sirbu, "SPV: secure path vector routing for securing BGP," in Proc. ACM SIGCOMM, 2004, pp. 179-192.
-
(2004)
Proc. ACM SIGCOMM
, pp. 179-192
-
-
Hu, Y.C.1
Perrig, A.2
Sirbu, M.3
-
16
-
-
34250672241
-
Pretty secure BGP (psBGP)
-
T. Wan, E. Kranakis, and P. C. van Oorschot, "Pretty secure BGP (psBGP)," School of Computer Science, Carleton University, Tech. Rep., 2005.
-
(2005)
School of Computer Science, Carleton University, Tech. Rep.
-
-
Wan, T.1
Kranakis, E.2
Van Oorschot, P.C.3
-
20
-
-
70449425424
-
Securing BGP using external security monitors
-
P. Reynolds, O. Kennedy, E. G. Sirer, and F. B. Schneider, "Securing BGP using external security monitors," Cornell University, Tech. Rep., 2006.
-
(2006)
Cornell University, Tech. Rep.
-
-
Reynolds, P.1
Kennedy, O.2
Sirer, E.G.3
Schneider, F.B.4
-
21
-
-
38549165399
-
Efficient techniques for detecting false origin advertisements in inter-domain routing
-
S. Y Qiu, F. Monrose, A. Terzis, and P. D. McDaniel, "Efficient techniques for detecting false origin advertisements in inter-domain routing," in Proc. NPSEC, 2006.
-
(2006)
Proc. NPSEC
-
-
Qiu, S.Y.1
Monrose, F.2
Terzis, A.3
McDaniel, P.D.4
-
23
-
-
70449398459
-
-
Department of Computer Science, University of California, Davis, Tech. Rep.
-
E. Barr, D. DeFigueiredo, M. Nicholes, S. M. Shih Ming Tseng, C. Chuah, B. Mukherjee, and S. F. Wu, "Descartes BGP: A conflict detection and response framework for inter-domain routing," Department of Computer Science, University of California, Davis, Tech. Rep., 2006.
-
(2006)
Descartes BGP: A Conflict Detection and Response Framework for Inter-domain Routing
-
-
Barr, E.1
De Figueiredo, D.2
Nicholes, M.3
Shih Ming Tseng, S.M.4
Chuah, C.5
Mukherjee, B.6
Wu, S.F.7
-
24
-
-
70449454698
-
Don't secure routing protocols, secure data delivery
-
Online
-
D. Wendlandt, Avramopoulos, D. Andersen, and J. Rexford, "Don't secure routing protocols, secure data delivery," ACM SIGCOMM HotNets Workshop, vol.2006. [Online], Available: http://www.cs.princeton.edu/ jrex/papers/acr.pdf
-
ACM SIGCOMM HotNets Workshop
, vol.2006
-
-
Wendlandt, D.1
Andersen, A.D.2
Rexford, J.3
-
26
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
M. Lad, D. Massey, D. Pei, Y Wu, B. Zhang, and L. Zhang, "PHAS: A Prefix Hijack Alert System," Proc. of USENIX Security symposium, 2006.
-
(2006)
Proc. of USENIX Security Symposium
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
27
-
-
85076603762
-
Revolutionary bootstrapping of a global PKI for securing BGP
-
Y. C. Hu, D. McGrew, A. Perrig, B. Weis, and D. Wendlandt, "(Revolutionary bootstrapping of a global PKI for securing BGP," in Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
-
(2006)
Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V)
-
-
Hu, Y.C.1
McGrew, D.2
Perrig, A.3
Weis, B.4
Wendlandt, D.5
-
28
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
X. Hu and Z. Mao, "Accurate Real-time Identification of IP Prefix Hijacking," IEEE Symposium on Security and Privacy, pp. 3-17, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Hu, X.1
Mao, Z.2
-
29
-
-
70449406157
-
-
G. Huston, http://www.potaroo.net/tools/asn32/, 2007.
-
(2007)
-
-
Huston, G.1
-
30
-
-
0003247246
-
Border Gateway Protocol 4
-
SRI Network Information Center
-
Y. Rekhter and T. Li, "Border Gateway Protocol 4," RFC 1771, SRI Network Information Center, 1995.
-
(1995)
RFC 1771
-
-
Rekhter, Y.1
Li, T.2
-
31
-
-
39749100457
-
-
AT&T Labs, Tech. Rep. TD-5UGJ33
-
K. Butler, T. Farley, P. McDaniel, and J. Rexford, "A survey of BGP security," AT&T Labs, Tech. Rep. TD-5UGJ33, 2004.
-
(2004)
A Survey of BGP Security
-
-
Butler, K.1
Farley, T.2
McDaniel, P.3
Rexford, J.4
-
32
-
-
33746235598
-
BGP Security Vulnerabilities Analysis
-
Online
-
S. Murphy, "BGP Security Vulnerabilities Analysis," IETF, RFC 4272, 2006. [Online], Available: http://www.ietf.org/rfc/rfc4272.txt
-
(2006)
IETF, RFC
, vol.4272
-
-
Murphy, S.1
-
33
-
-
11244338691
-
Beware of BGP attacks
-
O. Nordström and C. Dovrolis, "Beware of BGP attacks," ACM SIGCOMM Computer Communication Review, vol.34, no.2, pp. 1-8, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 1-8
-
-
Nordström, O.1
Dovrolis, C.2
-
34
-
-
70449423554
-
-
NIST Special Publication
-
R. Kuhn, K. Sriram, and D. Montgomery, "Border Gateway Protocol Security: Recommendations of the National Institute of Standards and Technology," NIST Special Publication, pp. 800-854, 2007.
-
(2007)
Border Gateway Protocol Security: Recommendations of the National Institute of Standards and Technology
, pp. 800-854
-
-
Kuhn, R.1
Sriram, K.2
Montgomery, D.3
-
36
-
-
70449443940
-
-
NANOG mail archives
-
A. Misel, "Wow, AS70071" NANOG mail archives, 1997.
-
(1997)
Wow, AS70071
-
-
Misel, A.1
-
38
-
-
34250672241
-
Pretty Secure BGP (psBGP)
-
W Tao and K. PC, "Pretty Secure BGP (psBGP)," Proc. of NDSS, 2005.
-
(2005)
Proc. of NDSS
-
-
Tao, W.1
Pc, K.2
-
41
-
-
84867338222
-
Secure border gateway protocol (S-BGP)-real world performance and deployment issues
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure border gateway protocol (S-BGP)-real world performance and deployment issues," in Proc, Network and Distributed System Security Symposium, 2000, pp. 103-116.
-
(2000)
Proc, Network and Distributed System Security Symposium
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
43
-
-
51349120643
-
Detecting bogus BGP route information: Going beyond prefix hijacking
-
J. Qiu, L. Gao, S. Ranjan, and A. Nucci, "Detecting bogus BGP route information: Going beyond prefix hijacking," in Proc. IEEE SecureComm, 2007.
-
(2007)
Proc. IEEE SecureComm
-
-
Qiu, J.1
Gao, L.2
Ranjan, S.3
Nucci, A.4
-
45
-
-
33749060897
-
A distributed reputation approach to cooperative Internet routing protection
-
H. Yu, J. Rexford, and E. Feiten, "A distributed reputation approach to cooperative Internet routing protection," IEEE ICNP Workshop on Secure Network Protocols (NPSec), pp. 73-78, 2005.
-
(2005)
IEEE ICNP Workshop on Secure Network Protocols (NPSec)
, pp. 73-78
-
-
Yu, H.1
Rexford, J.2
Feiten, E.3
-
46
-
-
44249126961
-
SANE: A Protection Architecture for Enterprise Networks
-
M. Casado, T. Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, "SANE: A Protection Architecture for Enterprise Networks," Proc. ACMIUSENIX NSDI, 2006.
-
(2006)
Proc. ACMIUSENIX NSDI
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
47
-
-
36949024396
-
The generalized TTL security mechanism (GTSM)
-
V. Gill, J. Heasley, and D. Meyer, "The generalized TTL security mechanism (GTSM)," IETF, RFC 3682, 2004.
-
(2004)
IETF, RFC
, vol.3682
-
-
Gill, V.1
Heasley, J.2
Meyer, D.3
-
48
-
-
0037845990
-
BGP Route Flap Damping
-
C. Villamizar, R. Chandra, and R. Govindan, "BGP Route Flap Damping," IETF, RFC 2439, 1998.
-
(1998)
IETF, RFC
, vol.2439
-
-
Villamizar, C.1
Chandra, R.2
Govindan, R.3
-
49
-
-
36949036650
-
A light-weight distributed scheme for detectingIP prefix hijacks in realtime
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detectingIP prefix hijacks in realtime," in Proc. ACM SIGCOMM, 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
50
-
-
70449430670
-
Modeling adoptability of secure BGP protocol
-
H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling adoptability of secure BGP protocol," in Proc. International Conference on Measurement and Modeling of Computer Systems, 2006.
-
(2006)
Proc. International Conference on Measurement and Modeling of Computer Systems
-
-
Chan, H.1
Dash, D.2
Perrig, A.3
Zhang, H.4
-
52
-
-
33746235595
-
The performance impact of BGP security
-
M. Zhao, S. W. Smith, and D. M. Nicol, "The performance impact of BGP security," IEEE Network, vol.19, no.6, pp. 42-48, 2005.
-
(2005)
IEEE Network
, vol.19
, Issue.6
, pp. 42-48
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
|