BGP hijacking

Results: 45



#Item
1Internet / Computing / Network architecture / Routing / Internet Standards / IP addresses / IP hijacking / Internet security / Border Gateway Protocol / Autonomous system / Route Views / Router

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

Add to Reading List

Source URL: www.inspire.edu.gr

Language: English - Date: 2016-06-27 04:34:24
2Computer networking / Routing protocols / Routing / Internet Standards / Internet protocols / Border Gateway Protocol / Route Views / Router / Control plane / Peering / Convergence / IP hijacking

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-12 22:28:16
3Routing protocols / Internet Standards / Internet protocols / Border Gateway Protocol / Routing / Router / IP hijacking / Resource Public Key Infrastructure

BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

Add to Reading List

Source URL: www.pmacct.net

Language: English - Date: 2011-11-01 05:09:41
4Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
5Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
6

JACQUEMART LAYOUT_Layout:44 PM Page 2 Visual Analytics for BGP Monitoring and Prefix Hijacking Identification Ernst Biersack and Quentin Jacquemart, Eurecom Fabian Fischer and Johannes Fuchs, University of K

Add to Reading List

Source URL: www.e-biersack.eu

Language: English - Date: 2013-07-01 09:50:12
    7Routing protocols / Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Path vector protocol / Network architecture / Computing / Internet

    1 A Survey of BGP Security Issues and Solutions Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford Abstract

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2008-09-21 13:02:46
    8Computing / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Resource Public Key Infrastructure / Autonomous system / IP hijacking / Path vector protocol / Network architecture / Internet / Routing protocols

    BGP Route Leaks Analysis Benjamin Wijchers Faculty of Exact Sciences, department of Computer Science Vrije Universiteit Amsterdam

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2014-12-04 08:33:22
    9Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / IP-VPN Lite / Network architecture / Internet / Computing

    ISP Workshop Lab Module 7 – BGP route filtering and advanced features Objective: Using the network configured in Module 6, use various configuration methods on BGP peerings to demonstrate neighbour filtering and more

    Add to Reading List

    Source URL: nsrc.org

    Language: English - Date: 2014-12-03 20:19:03
    10Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Peering / IP hijacking / Internet / Network architecture / Computing

    BGP  2010-­‐2011   Geoff  Huston   APNIC  R&D   Conven9onal  (Historical)  BGP  Wisdom   IAB  Workshop  on  Inter-­‐Domain  rou9ng  in  

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-05-04 18:39:48
    UPDATE