메뉴 건너뛰기




Volumn 13, Issue 2, 2011, Pages 199-222

Securing BGP-A literature survey

Author keywords

BGP; BGP security; Computer Network Protocols; Inter domain routing security; routing

Indexed keywords

BGP; BGP SECURITY; BORDER GATEWAY PROTOCOL; INTERDOMAIN ROUTING; LITERATURE SURVEY; ROUTING; ROUTING ARCHITECTURE; ROUTING INFRASTRUCTURE; SECURITY FUNCTIONS; SECURITY MEASURE;

EID: 80052025564     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.041010.00041     Document Type: Review
Times cited : (98)

References (164)
  • 4
    • 84868376521 scopus 로고    scopus 로고
    • Pakistan hijacks YouTube
    • Feb [Online]. Available
    • M. A. Brown, "Pakistan hijacks YouTube," Renesys Blog, Feb 2008. [Online]. Available: http://www.renesys.com/blog/2008/02/pakistan-hijacks- youtube-1.shtml
    • (2008) Renesys Blog
    • Brown, M.A.1
  • 5
    • 65249085507 scopus 로고    scopus 로고
    • Rationality and traffic attraction: Incentives for honest path announcements in BGP
    • S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright, "Rationality and traffic attraction: incentives for honest path announcements in BGP," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 267-278, 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.4 , pp. 267-278
    • Goldberg, S.1    Halevi, S.2    Jaggard, A.D.3    Ramachandran, V.4    Wright, R.N.5
  • 8
    • 36949014918 scopus 로고    scopus 로고
    • A study of prefix hijacking and interception in the internet
    • DOI 10.1145/1282380.1282411, ACM SIGCOMM 2007: Conference on Computer Communications
    • H. Ballani, P. Francis, and X. Zhang, "A study of prefix hijacking and interception in the Internet," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 265-276, 2007. (Pubitemid 350239790)
    • (2007) ACM SIGCOMM 2007: Conference on Computer Communications , pp. 265-276
    • Ballani, H.1    Francis, P.2    Zhang, X.3
  • 9
    • 70449367901 scopus 로고    scopus 로고
    • Wired Mag.-ThreadLevel Aug [Online]. Available
    • K. Zetter, "Revealed: The Internet's Biggest Security Hole," Wired Mag.-ThreadLevel, Aug 2008. [Online]. Available: http://www.wired.com/ threatlevel/2008/08/revealed-the-in/
    • (2008) Revealed: The Internet's Biggest Security Hole
    • Zetter, K.1
  • 10
    • 33645757765 scopus 로고    scopus 로고
    • Apr. [Online] Available
    • V. J. Bono, "7007 Explanation and Apology," Apr. 1997. [Online]. Available: http://www.merit.edu/mail.archives/nanog/1997-04/msg00444. html
    • (1997) 7007 Explanation and Apology
    • Bono, V.J.1
  • 11
    • 84868354029 scopus 로고    scopus 로고
    • Con-Ed steals the 'net'
    • Jan [Online]. Available
    • T. Underwood, "Con-Ed steals the 'net'," Renesys Blog, Jan 2006. [Online]. Available: http://www.renesys.com/blog/2006/01/coned-steals-the- net.shtml
    • (2006) Renesys Blog
    • Underwood, T.1
  • 14
    • 54249097101 scopus 로고    scopus 로고
    • June [Online] Available
    • G. Huston, "The BGP report for 2005," June 2006. [Online]. Available: http://www.potaroo.net/ispcol/2006-06/bgpupds.html
    • (2006) The BGP Report for 2005
    • Huston, G.1
  • 15
    • 70449418120 scopus 로고    scopus 로고
    • A survey of security techniques for the border gateway protocol (BGP)
    • Quarter
    • M. Nicholes and B. Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," Commun. Surveys and Tuts, IEEE, vol. 11, no. 1, pp. 52-65, Quarter 2009.
    • (2009) Commun. Surveys and Tuts IEEE , vol.11 , Issue.1 , pp. 52-65
    • Nicholes, M.1    Mukherjee, B.2
  • 18
    • 84868367462 scopus 로고
    • Internet Protocol
    • Sept. updated by RFC 1349. [Online]. Available
    • J. Postel, "Internet Protocol," RFC 791 (Standard), Internet Engineering Task Force, Sept. 1981, updated by RFC 1349. [Online]. Available: http://www.ietf.org/rfc/rfc791.txt
    • (1981) RFC 791 (Standard), Internet Engineering Task Force
    • Postel, J.1
  • 20
    • 57049122748 scopus 로고    scopus 로고
    • Internet topology discovery: A survey
    • Quarter
    • B. Donnet and T. Friedman, "Internet topology discovery: A survey," Commun. Surveys Tuts, IEEE, vol. 9, no. 4, pp. 56-69, Quarter 2007.
    • (2007) Commun. Surveys Tuts IEEE , vol.9 , Issue.4 , pp. 56-69
    • Donnet, B.1    Friedman, T.2
  • 21
    • 0003247401 scopus 로고    scopus 로고
    • Guidelines for creation, selection, and registration of an autonomous system (AS)
    • Mar [Online]. Available
    • J. Hawkinson and T. Bates, "Guidelines for creation, selection, and registration of an autonomous system (AS)," RFC 1930 (Best Current Practice), Internet Engineering Task Force, Mar. 1996. [Online]. Available: http://www.ietf.org/rfc/rfc1930.txt
    • (1996) RFC 1930 (Best Current Practice), Internet Engineering Task Force
    • Hawkinson, J.1    Bates, T.2
  • 22
    • 0003919801 scopus 로고
    • Routing information protocol
    • Jun. updated by RFCs 1388 [Online]. Available
    • C. Hedrick, "Routing information protocol," RFC 1058 (Historic), Internet Engineering Task Force, Jun. 1988, updated by RFCs 1388, 1723. [Online]. Available: http://www.ietf.org/rfc/rfc1058.txt
    • (1988) RFC 1058 (Historic), Internet Engineering Task Force , vol.1723
    • Hedrick, C.1
  • 24
    • 84868362046 scopus 로고    scopus 로고
    • Intermediate system to intermediate system intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)
    • [Online]. Available 10589
    • "Intermediate system to intermediate system intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)," ISO/IEC 10589:2002, 2002. [Online]. Available: http://standards.iso.org/ittf/ PubliclyAvailableStandards/c030932-ISO-IEC-10589-2002(E).zip
    • (2002) ISO/IEC , pp. 2002
  • 25
  • 27
    • 84868377805 scopus 로고
    • Border gateway protocol (BGP)
    • June obsoleted by RFC 1267. [Online]. Available
    • "Border gateway protocol (BGP)," RFC 1163 (Historic), Internet Engineering Task Force, June 1990, obsoleted by RFC 1267. [Online]. Available: http://www.ietf.org/rfc/rfc1163.txt
    • (1990) RFC 1163 (Historic), Internet Engineering Task Force
  • 28
    • 84868368355 scopus 로고
    • Border gateway protocol 3 (BGP-3)
    • Oct. [Online]. Available
    • "Border gateway protocol 3 (BGP-3)," RFC 1267 (Historic), Internet Engineering Task Force, Oct. 1991. [Online]. Available: http://www.ietf.org/rfc/rfc1267.txt
    • (1991) RFC 1267 (Historic), Internet Engineering Task Force
  • 29
    • 0004092895 scopus 로고    scopus 로고
    • A border gateway protocol 4 (BGP-4)
    • Mar. obsoleted by RFC 4271. [Online]. Available
    • Y. Rekhter and T. Li, "A border gateway protocol 4 (BGP-4)," RFC 1771 (Draft Standard), Internet Engineering Task Force, Mar. 1995, obsoleted by RFC 4271. [Online]. Available: http://www.ietf.org/rfc/rfc1771.txt
    • (1995) RFC 1771 (Draft Standard), Internet Engineering Task Force
    • Rekhter, Y.1    Li, T.2
  • 31
    • 84908168935 scopus 로고
    • Transmission Control Protocol
    • Sep. updated by RFCs 1122 [Online]. Available
    • J. Postel, "Transmission Control Protocol," RFC 793 (Standard), Internet Engineering Task Force, Sep. 1981, updated by RFCs 1122, 3168. [Online]. Available: http://www.ietf.org/rfc/rfc793.txt
    • (1981) RFC 793 (Standard), Internet Engineering Task Force , vol.3168
    • Postel, J.1
  • 33
    • 0343448479 scopus 로고    scopus 로고
    • BGP route reflection-an alternative to full mesh IBGP
    • Apr. obsoleted by RFC 4456. [Online]. Available
    • T. Bates, R. Chandra, and E. Chen, "BGP route reflection-an alternative to full mesh IBGP," RFC 2796 (Proposed Standard), Internet Engineering Task Force, Apr. 2000, obsoleted by RFC 4456. [Online]. Available: http://www.ietf.org/rfc/rfc2796.txt
    • (2000) RFC 2796 (Proposed Standard), Internet Engineering Task Force
    • Bates, T.1    Chandra, R.2    Chen, E.3
  • 35
    • 17744368054 scopus 로고    scopus 로고
    • On inferring and characterizing internet routing policies
    • Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
    • F Wang and L. Gao, "On inferring and characterizing internet routing policies," in IMC '03: Proc. 3rd ACM SIGCOMM Conf. Internet Measurement. New York, NY, USA: ACM, 2003, pp. 15-26. (Pubitemid 40730635)
    • (2003) Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC , pp. 15-26
    • Wang, F.1    Gao, L.2
  • 38
    • 67549121881 scopus 로고    scopus 로고
    • RIPE routing working group recommendations on route-flap damping
    • May obsoletes: ripe-229, ripe-210, ripe-178. [Online]. Available
    • P. Smith and C. Panigl, "RIPE routing working group recommendations on route-flap damping," ripe-378, May 2006, obsoletes: ripe-229, ripe-210, ripe-178. [Online]. Available: http://www.ripe.net/docs/ripe-378. html
    • (2006) Ripe-378
    • Smith, P.1    Panigl, C.2
  • 39
    • 33749869113 scopus 로고    scopus 로고
    • Study of BGP peering session attacks and their impacts on routing performance
    • DOI 10.1109/JSAC.2006.877218, 1705621
    • K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. Kuhn, "Study of BGP peering session attacks and their impacts on routing performance," Sel. Areas Commun., IEEE J., vol. 24, no. 10, pp. 1901-1915, Oct. 2006. (Pubitemid 44559603)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1901-1915
    • Sriram, K.1    Montgomery, D.2    Borchert, O.3    Kim, O.4    Kyhn, D.R.5
  • 42
    • 14344266667 scopus 로고    scopus 로고
    • Understanding BGP misconfiguration
    • DOI 10.1145/964725.633027, Proceedings of the ACM SIGCOMM 2002 Conference - Applications, Technologies, Architectures, and Protocols for Computer Communications
    • R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in SIGCOMM '02: Proc. 2002 Conf. Appl., Technol., Architectures, Protocols Comput. Commun. New York, NY, USA: ACM, 2002, pp. 3-16. (Pubitemid 43843771)
    • (2002) Computer Communication Review , vol.32 , Issue.4 , pp. 3-16
    • Mahajan, R.1    Wetherall, D.2    Anderson, T.3
  • 43
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • DOI 10.1145/1151659.1159947
    • A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 291-302, 2006. (Pubitemid 44623735)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 45
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • B. Kumar, "Integration of security in network routing protocols," SIGSAC Rev., vol. 11, no. 2, pp. 18-25, 1993.
    • (1993) SIGSAC Rev. , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 46
    • 0041296839 scopus 로고
    • Integrating security in inter-domain routing protocols
    • B. Kumar and J. Crowcroft, "Integrating security in inter-domain routing protocols," SIGCOMM Comput. Commun. Rev., vol. 23, no. 5, pp. 36-51, 1993.
    • (1993) SIGCOMM Comput. Commun. Rev. , vol.23 , Issue.5 , pp. 36-51
    • Kumar, B.1    Crowcroft, J.2
  • 48
    • 36949024396 scopus 로고    scopus 로고
    • The generalized TTL security mechanism (GTSM)
    • Feb. obsoleted by RFC 5082. [Online]. Available
    • V. Gill, J. Heasley, and D. Meyer, "The generalized TTL security mechanism (GTSM)," RFC 3682 (Experimental), Internet Engineering Task Force, Feb. 2004, obsoleted by RFC 5082. [Online]. Available: http://www.ietf.org/rfc/rfc3682.txt
    • (2004) RFC 3682 (Experimental), Internet Engineering Task Force
    • Gill, V.1    Heasley, J.2    Meyer, D.3
  • 50
    • 61849089615 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and common mitigations
    • Aug. [Online]. Available
    • W. Eddy, "TCP SYN flooding attacks and common mitigations," RFC 4987 (Informational), Internet Engineering Task Force, Aug. 2007. [Online]. Available: http://www.ietf.org/rfc/rfc4987.txt
    • (2007) RFC 4987 (Informational), Internet Engineering Task Force
    • Eddy, W.1
  • 51
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • Nov. obsoleted by RFC 4301, updated by RFC 3168. [Online]. Available
    • S. Kent and R. Atkinson, "Security architecture for the internet protocol," RFC 2401 (Proposed Standard), Internet Engineering Task Force, Nov. 1998, obsoleted by RFC 4301, updated by RFC 3168. [Online]. Available: http://www.ietf.org/rfc/rfc2401.txt
    • (1998) RFC 2401 (Proposed Standard), Internet Engineering Task Force
    • Kent, S.1    Atkinson, R.2
  • 53
    • 0342446307 scopus 로고    scopus 로고
    • Protection of BGP sessions via the TCP MD5 signature option
    • Aug. [Online]. Available
    • A. Heffernan, "Protection of BGP sessions via the TCP MD5 signature option," RFC 2385 (Proposed Standard), Internet Engineering Task Force, Aug. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2385. txt
    • (1998) RFC 2385 (Proposed Standard), Internet Engineering Task Force
    • Heffernan, A.1
  • 54
    • 84868363557 scopus 로고    scopus 로고
    • BGP session security requirements
    • Aug. [Online]. Available
    • M. Behringer, "BGP session security requirements," Internet-Draft (Informational), Aug. 2007. [Online]. Available: http://tools.ietf.org/html/draft-behringer-bgp-session-sec-req-02
    • (2007) Ternet-Draft (Informational)
    • Behringer, M.1
  • 55
    • 84868351086 scopus 로고    scopus 로고
    • BGP security requirements
    • Nov. [Online]. Available
    • B. Christian and T. Tauber, "BGP security requirements," Internet-Draft (Informational), Nov. 2008. [Online]. Available: http://tools.ietf. org/html/draft-ietf-rpsec-bgpsecrec-10
    • (2008) Ternet-Draft (Informational)
    • Christian, B.1    Tauber, T.2
  • 57
    • 84868348030 scopus 로고    scopus 로고
    • Nov. [Online] Available
    • S. Murphy, "BGP security analysis," Nov. 2001. [Online]. Available: http://tools.ietf.org/html/draft-murphy-bgp-secr-04
    • (2001) BGP Security Analysis
    • Murphy, S.1
  • 58
    • 0041291986 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • Apr. obsoleted by RFC 5280, updated by RFCs 4325 [Online]. Available
    • R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," RFC 3280 (Proposed Standard), Internet Engineering Task Force, Apr. 2002, obsoleted by RFC 5280, updated by RFCs 4325, 4630. [Online]. Available: http://www.ietf.org/rfc/rfc3280.txt
    • (2002) RFC 3280 (Proposed Standard), Internet Engineering Task Force , vol.4630
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 65
    • 33750327326 scopus 로고    scopus 로고
    • Modeling adoptability of secure BGP protocols
    • DOI 10.1145/1140103.1140334, SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
    • H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling adoptability of secure BGP protocols," in SIGMETRICS '06/Performance '06: Proc. Joint International Conf. Measurement Modeling Computer Syst. New York, NY, USA: ACM, 2006, pp. 389-390. (Pubitemid 44619120)
    • (2006) Performance Evaluation Review , vol.34 , Issue.1 , pp. 389-390
    • Chan, H.1    Dash, D.2    Perrig, A.3    Zhang, H.4
  • 66
    • 0033743163 scopus 로고    scopus 로고
    • Secure border gateway protocol (S-BGP)
    • Apr.
    • S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (S-BGP)," Sel. Areas Commun., IEEE J., vol. 18, no. 4, pp. 582-592, Apr. 2000.
    • (2000) Sel. Areas Commun. IEEE J. , vol.18 , Issue.4 , pp. 582-592
    • Kent, S.1    Lynn, C.2    Seo, K.3
  • 68
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin BGP
    • Sept.
    • R. White, "Securing BGP through secure origin BGP," Internet Protocol J., vol. 6, no. 3, Sept. 2003.
    • (2003) Ternet Protocol J. , vol.6 , Issue.3
    • White, R.1
  • 69
    • 34547504417 scopus 로고    scopus 로고
    • On interdomain routing security and pretty secure BGP (psBGP)
    • P. v. Oorschot, T. Wan, and E. Kranakis, "On interdomain routing security and pretty secure BGP (psBGP)," ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, p. 11, 2007.
    • (2007) ACM Trans. Inf. Syst. Secur. , vol.10 , Issue.3 , pp. 11
    • Oorschot, P.V.1    Wan, T.2    Kranakis, E.3
  • 71
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • S. M. Bellovin, "Security problems in the TCP/IP protocol suite," SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, 1989.
    • (1989) SIGCOMM Comput. Commun. Rev. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 72
    • 21644436994 scopus 로고    scopus 로고
    • Key management considerations for the TCP MD5 signature option
    • July [Online]. Available
    • M. Leech, "Key management considerations for the TCP MD5 signature option," RFC 3562 (Informational), Internet Engineering Task Force, July 2003. [Online]. Available: http://www.ietf.org/rfc/rfc3562.txt
    • (2003) RFC 3562 (Informational), Internet Engineering Task Force
    • Leech, M.1
  • 75
    • 84868371712 scopus 로고    scopus 로고
    • Deploying a new Hash Algorithm
    • October [Online]. Available
    • S. Bellovin and E. Rescorla, "Deploying a new Hash Algorithm," in NIST Cryptographic Hash Workshop, October 2005. [Online]. Available: http://csrc.nist.gov/groups/ST/hash/documents/Bellovin-new-hash.pdf
    • (2005) NIST Cryptographic Hash Workshop
    • Bellovin, S.1    Rescorla, E.2
  • 76
    • 84868352544 scopus 로고    scopus 로고
    • NIST Cryptographic Standards Status Report
    • April [Online]. Available
    • B. Burr, "NIST Cryptographic Standards Status Report," Internet 2 5th Annual PKI R&D Workshop, April 2006. [Online]. Available: http://middleware.internet2.edu/pki06/proceedings/burr-nist-crypto-standards.ppt
    • (2006) Ternet 2 5th Annual PKI R&D Workshop
    • Burr, B.1
  • 77
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Wang and H. Yu, "How to break MD5 and other hash functions," in EUROCRYPT, 2005, pp. 19-35. [Online]. Available: http://dx.doi.org/10.1007/ 11426639-2 (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 78
    • 77954806438 scopus 로고    scopus 로고
    • Standards maturity variance regarding the TCP MD5 signature option (RFC 2385) and the BGP-4 specification
    • Jan. [Online]. Available
    • S. Bellovin and A. Zinin, "Standards maturity variance regarding the TCP MD5 signature option (RFC 2385) and the BGP-4 specification," RFC 4278 (Informational), Internet Engineering Task Force, Jan. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4278.txt
    • (2006) RFC 4278 (Informational), Internet Engineering Task Force
    • Bellovin, S.1    Zinin, A.2
  • 80
    • 78049399140 scopus 로고    scopus 로고
    • UMAC: Message authentication code using universal hashing
    • Mar. [Online]. Available
    • T. Krovetz, "UMAC: Message authentication code using universal hashing," RFC 4418 (Informational), Internet Engineering Task Force, Mar. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4418.txt
    • (2006) RFC 4418 (Informational), Internet Engineering Task Force
    • Krovetz, T.1
  • 87
    • 84868373016 scopus 로고    scopus 로고
    • Jan. [Online] Available
    • D. Ward, "Securing BGPv4 using IPsec," Jan. 2002. [Online]. Available: http://tools.ietf. org/html/draft-ward-bgp-ipsec-00
    • (2002) Securing BGPv4 Using IPsec
    • Ward, D.1
  • 88
  • 89
    • 0003828107 scopus 로고
    • Network layer protocols with byzantine robustness
    • [Online]. Available
    • R. Perlman, "Network layer protocols with byzantine robustness," Tech. Rep., 1988. [Online]. Available: http://www.lcs.mit.edu/ publications/specpub. php?id=997
    • (1988) Tech. Rep.
    • Perlman, R.1
  • 90
    • 0030373106 scopus 로고    scopus 로고
    • Securing the border gateway routing protocol
    • GLOBECOM '96. 'Commun.: Key Global Prosperity, Nov 1996
    • B. Smith and J. Garcia-Luna-Aceves, "Securing the border gateway routing protocol," in Global Telecommun. Conf., 1996. GLOBECOM '96. 'Commun.: Key Global Prosperity, Nov 1996, pp. 81-85.
    • (1996) Global Telecommun. Conf. , pp. 81-85
    • Smith, B.1    Garcia-Luna-Aceves, J.2
  • 91
    • 0032026162 scopus 로고    scopus 로고
    • Efficient security mechanisms for the border gateway routing protocol
    • Mar.
    • "Efficient security mechanisms for the border gateway routing protocol," Computer Commun., vol. 21, no. 3, pp. 203-210, Mar. 1998.
    • (1998) Computer Commun. , vol.21 , Issue.3 , pp. 203-210
  • 92
    • 84868371104 scopus 로고
    • Protocol for exchange of inter-domain routeing information among intermediate systems to support forwarding of ISO 8473 PDUs
    • [Online]. Available 10747
    • "Protocol for exchange of inter-domain routeing information among intermediate systems to support forwarding of ISO 8473 PDUs," ISO/IEC 10747:1994, 1994. [Online]. Available: http://www.iso.org/iso/iso-catalogue/ catalogue-tc/catalogue-detail.htm?csnumber=21417
    • (1994) ISO/IEC , pp. 1994
  • 97
    • 84868383614 scopus 로고    scopus 로고
    • Evaluating the performance impact of PKI on BGP security
    • Apr. [Online]. Available
    • M. Zhao and D. Nicol, "Evaluating the performance impact of PKI on BGP security," Internet 2 4th Annual PKI R&D Workshop, Apr. 2005. [Online]. Available: http://middleware.internet2.edu/pki05/proceedings/zhao- sbgp.pdf
    • (2005) Ternet 2 4th Annual PKI R&D Workshop
    • Zhao, M.1    Nicol, D.2
  • 98
    • 33746235595 scopus 로고    scopus 로고
    • The performance impact of BGP security
    • DOI 10.1109/MNET.2005.1541720
    • M. Zhao, S. Smith, and D. Nicol, "The performance impact of BGP security," Netw., IEEE, vol. 19, no. 6, pp. 42-48, Nov.-Dec. 2005. (Pubitemid 46444793)
    • (2005) IEEE Network , vol.19 , Issue.6 , pp. 42-48
    • Zhao, M.1    Smith, S.W.2    Nicol, D.M.3
  • 101
    • 47749104797 scopus 로고    scopus 로고
    • Exploring autonomous system numbers
    • Mar.
    • G. Huston, "Exploring autonomous system numbers," Internet Protocol J., vol. 9, no. 1, Mar. 2006.
    • (2006) Ternet Protocol J. , vol.9 , Issue.1
    • Huston, G.1
  • 108
    • 33747891596 scopus 로고    scopus 로고
    • Origin authentication in interdomain routing
    • DOI 10.1016/j.comnet.2005.11.007, PII S1389128605003920
    • P. McDaniel, W. Aiello, K. Butler, and J. Ioannidis, "Origin authentication in interdomain routing," Comput. Netw., vol. 50, no. 16, pp. 2953-2980, 2006. (Pubitemid 44292593)
    • (2006) Computer Networks , vol.50 , Issue.16 , pp. 2953-2980
    • McDaniel, P.1    Aiello, W.2    Butler, K.3    Ioannidis, J.4
  • 109
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • R. C. Merkle, "Protocols for public key cryptosystems," Security Privacy, IEEE Symp., vol. 0, p. 122, 1980.
    • (1980) Security Privacy IEEE Symp. , vol.0 , pp. 122
    • Merkle, R.C.1
  • 110
    • 21844463097 scopus 로고    scopus 로고
    • SPV: Secure path vector routing for securing BGP
    • DOI 10.1145/1030194.1015488, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • Y.-C. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," in SIGCOMM '04: Proc. 2004 Conf. Appl., Technol., Architectures, Protocols Comput. Commun. New York, NY, USA: ACM, 2004, pp. 179-192. (Pubitemid 40954879)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 179-192
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 111
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Aug.
    • C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," Netw., IEEE/ACM Trans., vol. 7, no. 4, pp. 502-513, Aug. 1999.
    • (1999) Netw. IEEE/ACM Trans. , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1    Lam, S.2
  • 112
    • 85028913061 scopus 로고
    • On-line/off-line digital signatures
    • New York, NY, USA: Springer-Verlag New York, Inc.
    • S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," in CRYPTO '89: Proc. Advances Cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1989, pp. 263-275.
    • (1989) CRYPTO '89: Proc. Advances Cryptology , pp. 263-275
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 113
    • 56349120333 scopus 로고    scopus 로고
    • Analysis of the SPV secure routing protocol: Weaknesses and lessons
    • B. Raghavan, S. Panjwani, and A. Mityagin, "Analysis of the SPV secure routing protocol: Weaknesses and lessons," SIGCOMM Comput. Commun. Rev., vol. 37, no. 2, pp. 29-38, 2007.
    • (2007) SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.2 , pp. 29-38
    • Raghavan, B.1    Panjwani, S.2    Mityagin, A.3
  • 116
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Springer Berlin/Heidelberg, Jan. 2003
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Advances in Cryptology-EUROCRYPT 2003, vol. 2656. Springer Berlin/Heidelberg, Jan. 2003, p. 641.
    • (2003) Advances in Cryptology-EUROCRYPT , vol.2656 , pp. 641
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 117
    • 56349132859 scopus 로고    scopus 로고
    • Ordered mul-tisignatures and identity-based sequential aggregate signatures, with applications to secure routing
    • New York, NY, USA: ACM
    • A. Boldyreva, C. Gentry, A. O'Neill, and D. H. Yum, "Ordered mul-tisignatures and identity-based sequential aggregate signatures, with applications to secure routing," in CCS '07: Proc. 14th ACM Conf. Comput. Commun. Security. New York, NY, USA: ACM, 2007, pp. 276-285.
    • (2007) CCS '07: Proc. 14th ACM Conf. Comput. Commun. Security , pp. 276-285
    • Boldyreva, A.1    Gentry, C.2    O'Neill, A.3    Yum, D.H.4
  • 118
    • 56349146197 scopus 로고    scopus 로고
    • New multiparty signature schemes for network routing applications
    • "New multiparty signature schemes for network routing applications," ACM Trans. Inf. Syst. Secur, vol. 12, no. 1, pp. 1-39, 2008.
    • (2008) ACM Trans. Inf. Syst. Secur , vol.12 , Issue.1 , pp. 1-39
  • 119
    • 34547369855 scopus 로고    scopus 로고
    • Optimizing BGP security by exploiting path stability
    • DOI 10.1145/1180405.1180442, 1180442, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • K. Butler, P. McDaniel, and W. Aiello, "Optimizing BGP security by exploiting path stability," in CCS '06: Proc. 13th ACM Conf. Comput. Commun. Security. New York, NY, USA: ACM, 2006, pp. 298-310. (Pubitemid 47131378)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 298-310
    • Butler, K.1    McDaniel, P.2    Aiello, W.3
  • 121
    • 52049098470 scopus 로고    scopus 로고
    • Autonomous security for autonomous systems
    • "Autonomous security for autonomous systems," Comput. Netw., vol. 52, no. 15, pp. 2908-2923, 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.15 , pp. 2908-2923
  • 123
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detecting ip prefix hijacks in real-time
    • DOI 10.1145/1282380.1282412, ACM SIGCOMM 2007: Conference on Computer Communications
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detecting ip prefix hijacks in real-time," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 277-288, 2007. (Pubitemid 350239791)
    • (2007) ACM SIGCOMM 2007: Conference on Computer Communications , pp. 277-288
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5
  • 124
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in SP '07: Proc. 2007 IEEE Symp. Security Privacy. Washington, DC, USA: IEEE Comput. Society, 2007, pp. 3-17. (Pubitemid 47432512)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 3-17
    • Hu, X.1    Mao, Z.M.2
  • 125
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • X. Hu and Z. Mao, "Accurate real-time identification of IP prefix hijacking," in Security Privacy, 2007. SP '07. IEEE Symp., May 2007, pp. 3-17. (Pubitemid 47432512)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 3-17
    • Hu, X.1    Mao, Z.M.2
  • 126
    • 35248861643 scopus 로고    scopus 로고
    • Topology-based detection of anomalous BGP messages
    • Springer Berlin/Heidelberg, Feb.
    • C. Kruegel, D. Mutz, W. Robertson, and F Valeur, "Topology-based detection of anomalous BGP messages," in Recent Advances Intrusion Detection, vol. 2820. Springer Berlin/Heidelberg, Feb. 2003, pp. 17-35.
    • (2003) Recent Advances Intrusion Detection , vol.2820 , pp. 17-35
    • Kruegel, C.1    Mutz, D.2    Robertson, W.3    Valeur, F.4
  • 135
    • 36048995031 scopus 로고    scopus 로고
    • Understanding resiliency of internet topology against prefix hijack attacks
    • DOI 10.1109/DSN.2007.95, 4272988, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
    • M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding resiliency of internet topology against prefix hijack attacks," in DSN '07: Proc. 37th Annual IEEE/IFIP International Conf. Dependable Syst. Netw. Washington, DC, USA: IEEE Comput. Society, 2007, pp. 368-377. (Pubitemid 350080442)
    • (2007) Proceedings of the International Conference on Dependable Systems and Networks , pp. 368-377
    • Lad, M.1    Oliveira, R.2    Zhang, B.3    Zhang, L.4
  • 138
    • 38049150830 scopus 로고    scopus 로고
    • Measures of self-similarity of BGP updates and implications for securing BGP
    • PAM Heidelberg, DE: Springer-Verlag Berlin, Apr. 2007
    • G. Huston, "Measures of self-similarity of BGP updates and implications for securing BGP," in Proc. 8th International Conf. Passive Active Netw. Measurement (PAM 2007), vol. 4427. Heidelberg, DE: Springer-Verlag Berlin, Apr. 2007, pp. 1-10.
    • (2007) Proc. 8th International Conf. Passive Active Netw. Measurement , vol.4427 , pp. 1-10
    • Huston, G.1
  • 141
    • 34247194569 scopus 로고    scopus 로고
    • Network-wide prediction of BGP routes
    • DOI 10.1109/TNET.2007.892876
    • N. Feamster and J. Rexford, "Network-wide prediction of BGP routes," Netw., IEEE/ACM Trans., vol. 15, no. 2, pp. 253-266, April 2007. (Pubitemid 46621608)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.2 , pp. 253-266
    • Feamster, N.1    Rexford, J.2
  • 145
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V. N. Padmanabhan and D. R. Simon, "Secure traceroute to detect faulty or malicious routing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
    • (2003) SIGCOMM Comput. Commun. Rev. , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.N.1    Simon, D.R.2
  • 150
    • 72949118871 scopus 로고    scopus 로고
    • A survey of BGP security issues and solutions
    • Jan. 2010
    • K. Butler, T. R. Farley, P. McDaniel, and J. Rexford, "A survey of BGP security issues and solutions," Proc. IEEE, vol. 98, no. 1, pp. 100-122, Jan. 2010.
    • Proc. IEEE , vol.98 , Issue.1 , pp. 100-122
    • Butler, K.1    Farley, T.R.2    McDaniel, P.3    Rexford, J.4
  • 151
    • 57749091537 scopus 로고    scopus 로고
    • Public key superstructure 'it's PKI Jim, but not as we know it!'
    • New York, NY, USA: ACM
    • S. Wilson, "Public key superstructure 'it's PKI Jim, but not as we know it!'," in IDtrust '08: Proc. 7th Symp. Identity Trust on Internet. New York, NY, USA: ACM, 2008, pp. 72-88.
    • (2008) IDtrust '08: Proc. 7th Symp. Identity Trust on Internet , pp. 72-88
    • Wilson, S.1
  • 152
    • 33847617478 scopus 로고    scopus 로고
    • Reengineering the internet for better security
    • M. Parameswaran, X. Zhao, A. B. Whinston, and F. Fang, "Reengineering the internet for better security," Comput., vol. 40, no. 1, pp. 40-44, 2007.
    • (2007) Comput. , vol.40 , Issue.1 , pp. 40-44
    • Parameswaran, M.1    Zhao, X.2    Whinston, A.B.3    Fang, F.4
  • 154
    • 2342453262 scopus 로고    scopus 로고
    • A framework for resilient Internet routing protocols
    • Mar.-Apr.
    • D. Pei, L. Zhang, and D. Massey, "A framework for resilient Internet routing protocols," Netw., IEEE, vol. 18, no. 2, pp. 5-12, Mar.-Apr. 2004.
    • (2004) Netw. IEEE , vol.18 , Issue.2 , pp. 5-12
    • Pei, D.1    Zhang, L.2    Massey, D.3
  • 155
    • 84868366104 scopus 로고    scopus 로고
    • Nov. [Online] Available
    • N. Hilliard, "RFC 5082 GTSM for Quagga bgpd," Nov. 2008. [Online]. Available: http://lists.quagga.net/pipermail/quagga-dev/2008-November/ 006116.html
    • (2008) RFC 5082 GTSM for Quagga Bgpd
    • Hilliard, N.1
  • 159
    • 4243968055 scopus 로고    scopus 로고
    • Commentary on inter-domain routing in the internet
    • Dec. [Online]. Available
    • G. Huston, "Commentary on inter-domain routing in the internet," RFC 3221 (Informational), Internet Engineering Task Force, Dec. 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3221.txt
    • (2001) RFC 3221 (Informational), Internet Engineering Task Force
    • Huston, G.1
  • 160
    • 80052036188 scopus 로고    scopus 로고
    • Scaling inter-domain routing-a view forward
    • Dec
    • "Scaling inter-domain routing-a view forward," Internet Protocol J., vol. 4, no. 4, Dec 2001.
    • (2001) Ternet Protocol J. , vol.4 , Issue.4
  • 164
    • 77957595181 scopus 로고    scopus 로고
    • last accessed June [Online]. Available
    • T. Bates, P. Smith, and G. Huston, "The CIDR report," last accessed: June 2009. [Online]. Available: http://www.cidr-report.org/as2.0/
    • (2009) The CIDR Report
    • Bates, T.1    Smith, P.2    Huston, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.