BGP with BGPsec: Attacks and Countermeasures
暂无分享,去创建一个
Jianping Wu | Yih-Chun Hu | Mingwei Xu | Qi Li | Jiajia Liu | Yih-Chun Hu | Jiajia Liu | Qi Li | Jianping Wu | Mingwei Xu
[1] Sharon Goldberg,et al. How secure are secure interdomain routing protocols , 2010, SIGCOMM '10.
[2] Christophe Diot,et al. Detection and analysis of routing loops in packet traces , 2002, IMW '02.
[3] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[4] Olivier Bonaventure,et al. Quantifying ases multiconnectivity using multicast information , 2009, IMC '09.
[5] Patrick D. McDaniel,et al. A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.
[6] Yih-Chun Hu,et al. SPV: secure path vector routing for securing BGP , 2004, SIGCOMM.
[7] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[8] Matt Lepinski,et al. BGPsec Protocol Specification , 2017, RFC.
[9] Jérome Durand,et al. BGP Operations and Security , 2015, RFC.
[10] A. Dammer. How Secure are Secure Interdomain Routing Protocols , 2011 .
[11] John S. Heidemann,et al. Understanding block-level address usage in the visible internet , 2010, SIGCOMM '10.
[12] Lixin Gao,et al. Identifying and Addressing Reachability and Policy Attacks in “Secure” BGP , 2016, IEEE/ACM Transactions on Networking.