Sciweavers

160 search results - page 4 / 32
» Securing BGP incrementally
Sort
View
IPOM
2007
Springer
14 years 1 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address preļ¬x origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ā€...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconļ¬gurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
ESORICS
2008
Springer
13 years 9 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
14 years 1 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...