Sciweavers

24 search results - page 4 / 5
» Are BGP Routers Open to Attack
Sort
View
BROADNETS
2006
IEEE
14 years 5 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
ICDCS
2009
IEEE
14 years 8 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
INFOCOM
2002
IEEE
14 years 3 months ago
Avoiding Instability during Graceful Shutdown of OSPF
Abstract—Many recent router architectures decouple the routing engine from the forwarding engine, so that packet forwarding can continue even when the routing process is not acti...
Aman Shaikh, Rohit Dube, Anujan Varma
IEEEARES
2009
IEEE
14 years 5 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
IMSA
2001
132views Multimedia» more  IMSA 2001»
14 years 7 days ago
Performance of Zebra Routing Software
Zebra is publicly available free routing software that is distributed under GNU General Public License. It supports the following IP routing protocols: BGP-4, RIPv1, RIPv2 and OSP...
R. Fatoohi, R. Singh