Towards detecting BGP route hijacking using the RPKI

被引:0
|
作者
Wählisch, Matthias [1 ]
Maennel, Olaf [2 ]
Schmidt, Thomas C. [3 ]
机构
[1] Freie Universität Berlin, Germany
[2] Loughborough University, United Kingdom
[3] HAW Hamburg, Germany
关键词
Engineering Village;
D O I
暂无
中图分类号
学科分类号
摘要
deployment - Inter-domain routing systems - Misconfigurations - Operational testing - Prefix hijacking - Prototype implementations - rpki - Secure inter-domain routing
引用
收藏
页码:103 / 104
相关论文
共 50 条
  • [21] ARTEMIS: Neutralizing BGP Hijacking Within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (06) : 2471 - 2486
  • [22] Detecting DNS hijacking by using NetFlow data
    Fejrskov, Martin
    Pedersen, Jens Myrup
    Vasilomanolakis, Emmanouil
    2022 IEEE Conference on Communications and Network Security, CNS 2022, 2022, : 273 - 280
  • [23] Detecting DNS hijacking by using NetFlow data
    Fejrskov, Martin
    Pedersen, Jens Myrup
    Vasilomanolakis, Emmanouil
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 273 - 280
  • [24] ARTEMIS: Neutralizing BGP Hijacking within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 6 - 6
  • [25] HEAP: Reliable Assessment of BGP Hijacking Attacks
    Schlamp, Johann
    Holz, Ralph
    Jacquemart, Quentin
    Carle, Georg
    Biersack, Ernst W.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (06) : 1849 - 1861
  • [26] RPKI is Coming of Age A Longitudinal Study of RPKI Deployment and Invalid Route Origins
    Chung, Taejoong
    Aben, Emile
    Bruijnzeels, Tim
    Chandrasekaran, Balakrishnan
    Choffnes, David
    Levin, Dave
    Maggs, Bruce M.
    Mislove, Alan
    van Rijswijk-Deij, Roland
    Rula, John
    Sullivan, Nick
    IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, : 406 - 419
  • [27] Improving Prefix Hijacking Defense of RPKI From an Evolutionary Game Perspective
    Zeng, Man
    Huang, Xiaohong
    Zhang, Pei
    Li, Dandan
    Xie, Kun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5170 - 5184
  • [28] 基于RPKI-ASPA改进的BGP路径保护机制
    包卓
    马迪
    毛伟
    邵晴
    计算机系统应用, 2022, 31 (02) : 316 - 324
  • [29] Securing prefixes against BGP hijacking in a cooperative way
    Wang, Xiao-Qiang
    Zhu, Pei-Dong
    Lu, Xi-Cheng
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (03): : 642 - 661
  • [30] Case Study Analysis on BGP: Prefix Hijacking and Transit AS
    Hakimi, Rifqy
    Saputra, Yuris Mulya
    Nugraha, Beny
    2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,