Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
暂无分享,去创建一个
[1] Nick Feamster,et al. A model of BGP routing for network engineering , 2004, SIGMETRICS '04/Performance '04.
[2] David Meyer,et al. The Generalized TTL Security Mechanism (GTSM) , 2004, RFC.
[3] Joseph Kee-yin Ng,et al. Extensions to BGP to Support Secure Origin BGP , 2004 .
[4] Daniel Massey,et al. A framework for resilient Internet routing protocols , 2004, IEEE Network.
[5] Stephen T. Kent,et al. Securing the Border Gateway Protocol: A Status Update , 2003, Communications and Multimedia Security.
[6] Sandra L. Murphy,et al. BGP Security Vulnerabilities Analysis , 2006, RFC.
[7] Andy Heffernan,et al. Protection of BGP Sessions via the TCP MD5 Signature Option , 1998, RFC.
[8] Patrick D. McDaniel,et al. Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing , 2003, NDSS.
[9] J. Rexford,et al. Network-Wide Prediction of BGP Routes , 2007, IEEE/ACM Transactions on Networking.
[10] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM 2002.
[11] Sean Convery,et al. An Attack Tree for the Border Gateway Protocol , 2003 .
[12] Jennifer Rexford,et al. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[13] Cengiz Alaettinoglu,et al. Using RPSL in Practice , 1999, RFC.
[14] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[15] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[16] Volker Roth,et al. Listen and whisper: security mechanisms for BGP , 2004 .
[17] Cengiz Alaettinoglu,et al. Routing Policy Specification Language (RPSL) , 1998, RFC.
[18] Daniel Massey,et al. Detection of invalid routing announcement in the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.
[19] Adrian Perrig,et al. Modeling adoptability of secure BGP protocols , 2006, SIGMETRICS '06/Performance '06.
[20] Michalis Faloutsos,et al. Analyzing BGP policies: methodology and tool , 2004, IEEE INFOCOM 2004.
[21] Yih-Chun Hu,et al. SPV: secure path vector routing for securing BGP , 2004, SIGCOMM 2004.