2009 Fourth International Conference on Systems and Networks Communications 2009
DOI: 10.1109/icsnc.2009.74
|View full text |Cite
|
Sign up to set email alerts
|

Credible BGP – Extensions to BGP for Secure Networking

Abstract: Border Gateway Protocol (BGP) is the de-facto routing protocol in the Internet. Unfortunately, it is not a secure protocol, and as a result, several attacks have been successfully mounted against the Internet infrastructure. Among the security requirements of BGP is the ability to validate the actual source and path of the BGP update message. This is needed to help reduce the threat of prefix hijacking and IP spoofing based attacks. BGP route associates an address prefix with a set of autonomous systems (AS) t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 5 publications
(5 reference statements)
0
1
0
Order By: Relevance
“…Additionally, incidents drastically vary in duration from minutes to several hours making the prospects of properly capturing data from an attack challenging. While there are possible automated solutions for adding security to the BGP system-such as Resource Public Key Infrastructure (RPKI) and Secure BGP (S-BGP) [26,35,38,51]-the deep entrenchment and foundational role of BGP in the internet [64] means that the protocol does not often change and infrastructure and software upgrades are costly. Because of these challenges, visualization tools present a feasible alternative to manage and understand operations, security incidents, and anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, incidents drastically vary in duration from minutes to several hours making the prospects of properly capturing data from an attack challenging. While there are possible automated solutions for adding security to the BGP system-such as Resource Public Key Infrastructure (RPKI) and Secure BGP (S-BGP) [26,35,38,51]-the deep entrenchment and foundational role of BGP in the internet [64] means that the protocol does not often change and infrastructure and software upgrades are costly. Because of these challenges, visualization tools present a feasible alternative to manage and understand operations, security incidents, and anomalies.…”
Section: Introductionmentioning
confidence: 99%