ABSTRACT
No abstract available.
- H. Chan, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure bgp protocols. Technical Report CMU-CyLab-05-001, CyLab, Carnegie Mellon University, Jan. 2005.Google Scholar
- G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proc. NDSS'03, Feb. 2003.Google Scholar
- X. He, C. Papadopoulos, and P. Radoslavov. A framework for incremental deployment strategies for router-assisted services. In INFOCOM, 2003.Google ScholarCross Ref
- Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In Proc. of ACM SIGCOMM 2004, Sept. 2004. Google ScholarDigital Library
- S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582--592, apr 2000. Google ScholarDigital Library
- C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Topology-based detection of anomalous BGP messages. In Proc. RAID'03.Google Scholar
- S. Murphy. BGP Security Vulnerabilities Analysis. IETF draft-ietf-idr-bgp-vuln-00, February 2002.Google Scholar
- L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. NSDI'04. Google ScholarDigital Library
- T. Wan, E. Kranakis, and P. van Oorschot. Pretty secure BGP (psBGP). In Proc. NDSS'05.Google Scholar
- R. White. Securing BGP through secure origin BGP. Technical report, Cisco Internet Protocol Journal, Sept. 2003.Google Scholar
- H. Yu, J. Rexford, and E. W. Felten. A distributed reputation approach to cooperative internet routing protection. In Workshop on Secure Network Protocols, 2005. Google ScholarDigital Library
- M. Zhao, S. Smith, D. Nicol Evaluating the Performance Impact of PKI on BGP Security. 4th Annual PKI Research and Development Workshop, April 2005.Google Scholar
Index Terms
- Modeling adoptability of secure BGP protocols
Recommendations
Modeling adoptability of secure BGP protocol
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communicationsDespite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative ...
Modeling adoptability of secure BGP protocol
SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communicationsDespite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative ...
Comments