<--- Back to Details
First PageDocument Content
Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Multihoming / Computer network / Network architecture / Internet / Computing
Date: 2010-06-27 16:10:03
Routing
Internet protocols
Internet standards
Border Gateway Protocol
IP hijacking
Router
Multihoming
Computer network
Network architecture
Internet
Computing

How Secure are Secure Interdomain Routing Protocols? Sharon Goldberg Microsoft Research

Add to Reading List

Source URL: www.cs.princeton.edu

Download Document from Source Website

File Size: 374,77 KB

Share Document on Facebook

Similar Documents

Internet / Computing / Network architecture / Routing / Internet Standards / IP addresses / IP hijacking / Internet security / Border Gateway Protocol / Autonomous system / Route Views / Router

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

DocID: 1r3Vh - View Document

Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

DocID: 1qn2z - View Document

Computing / Internet / Network architecture / Border Gateway Protocol / Business intelligence / Peering / Big data / Denial-of-service attack / Business analytics / Internet transit / Internet backbone / IP hijacking

TO P U S E C AS E S WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

DocID: 1q9vY - View Document

Computer networking / Routing protocols / Routing / Internet Standards / Internet protocols / Border Gateway Protocol / Route Views / Router / Control plane / Peering / Convergence / IP hijacking

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

DocID: 1pB61 - View Document

Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / IP hijacking / Router / Autonomous system / Control plane / IP forwarding / GNU Zebra

Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

DocID: 1plXF - View Document