<--- Back to Details
First PageDocument Content
Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Router / Transmission Control Protocol / Denial-of-service attack / IP hijacking / Network architecture / Internet / Computing
Date: 2007-01-09 18:02:42
Routing protocols
Internet protocols
Internet standards
Border Gateway Protocol
Routing
Router
Transmission Control Protocol
Denial-of-service attack
IP hijacking
Network architecture
Internet
Computing

Microsoft PowerPoint - BGP_Security_Analysis_NIST_Study1.ppt

Add to Reading List

Source URL: www.antd.nist.gov

Download Document from Source Website

File Size: 1,84 MB

Share Document on Facebook

Similar Documents

Internet / Computing / Network architecture / Routing / Internet Standards / IP addresses / IP hijacking / Internet security / Border Gateway Protocol / Autonomous system / Route Views / Router

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

DocID: 1r3Vh - View Document

Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

DocID: 1qn2z - View Document

Computing / Internet / Network architecture / Border Gateway Protocol / Business intelligence / Peering / Big data / Denial-of-service attack / Business analytics / Internet transit / Internet backbone / IP hijacking

TO P U S E C AS E S WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

DocID: 1q9vY - View Document

Computer networking / Routing protocols / Routing / Internet Standards / Internet protocols / Border Gateway Protocol / Route Views / Router / Control plane / Peering / Convergence / IP hijacking

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

DocID: 1pB61 - View Document

Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / IP hijacking / Router / Autonomous system / Control plane / IP forwarding / GNU Zebra

Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

DocID: 1plXF - View Document