skip to main content
10.1145/1140277.1140334acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article

Modeling adoptability of secure BGP protocols

Published: 26 June 2006 Publication History

Abstract

No abstract available.

References

[1]
H. Chan, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure bgp protocols. Technical Report CMU-CyLab-05-001, CyLab, Carnegie Mellon University, Jan. 2005.
[2]
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proc. NDSS'03, Feb. 2003.
[3]
X. He, C. Papadopoulos, and P. Radoslavov. A framework for incremental deployment strategies for router-assisted services. In INFOCOM, 2003.
[4]
Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In Proc. of ACM SIGCOMM 2004, Sept. 2004.
[5]
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582--592, apr 2000.
[6]
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Topology-based detection of anomalous BGP messages. In Proc. RAID'03.
[7]
S. Murphy. BGP Security Vulnerabilities Analysis. IETF draft-ietf-idr-bgp-vuln-00, February 2002.
[8]
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. NSDI'04.
[9]
T. Wan, E. Kranakis, and P. van Oorschot. Pretty secure BGP (psBGP). In Proc. NDSS'05.
[10]
R. White. Securing BGP through secure origin BGP. Technical report, Cisco Internet Protocol Journal, Sept. 2003.
[11]
H. Yu, J. Rexford, and E. W. Felten. A distributed reputation approach to cooperative internet routing protection. In Workshop on Secure Network Protocols, 2005.
[12]
M. Zhao, S. Smith, D. Nicol Evaluating the Performance Impact of PKI on BGP Security. 4th Annual PKI Research and Development Workshop, April 2005.

Cited By

View all

Index Terms

  1. Modeling adoptability of secure BGP protocols

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMETRICS '06/Performance '06: Proceedings of the joint international conference on Measurement and modeling of computer systems
    June 2006
    404 pages
    ISBN:1595933190
    DOI:10.1145/1140277
    • cover image ACM SIGMETRICS Performance Evaluation Review
      ACM SIGMETRICS Performance Evaluation Review  Volume 34, Issue 1
      Performance evaluation review
      June 2006
      388 pages
      ISSN:0163-5999
      DOI:10.1145/1140103
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 June 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adoptability
    2. critical threshold
    3. incentives compatibility
    4. routing security

    Qualifiers

    • Article

    Conference

    SIGMETRICS06

    Acceptance Rates

    Overall Acceptance Rate 459 of 2,691 submissions, 17%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)One Hop for RPKI, One Giant Leap for BGP SecurityProceedings of the 14th ACM Workshop on Hot Topics in Networks10.1145/2834050.2834078(1-7)Online publication date: 16-Nov-2015
    • (2015)Stabilizing route selection in BGPIEEE/ACM Transactions on Networking10.1109/TNET.2014.229979523:1(282-299)Online publication date: 1-Feb-2015
    • (2013)BGP security in partial deploymentACM SIGCOMM Computer Communication Review10.1145/2534169.248601043:4(171-182)Online publication date: 27-Aug-2013
    • (2013)BGP security in partial deploymentProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM10.1145/2486001.2486010(171-182)Online publication date: 12-Aug-2013
    • (2013)Diffusion dynamics of network technologies with bounded rational usersIEEE/ACM Transactions on Networking10.1109/TNET.2012.218989121:1(28-40)Online publication date: 1-Feb-2013
    • (2013)An agent-based modeling approach of network migration to new technologies2013 IEEE International Conference on Communications (ICC)10.1109/ICC.2013.6654924(2583-2588)Online publication date: Jun-2013
    • (2012)Provable security of S-BGP and other path vector protocolsProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382254(541-552)Online publication date: 16-Oct-2012
    • (2012)Will the three-network convergence happen? — An evolution model based analysis2012 1st IEEE International Conference on Communications in China (ICCC)10.1109/ICCChina.2012.6356869(149-154)Online publication date: Aug-2012
    • (2011)Symmetric Key Approaches to Securing BGP—A Little Bit Trust Is EnoughIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2011.1922:9(1536-1549)Online publication date: 1-Sep-2011
    • (2011)Securing BGP — A Literature SurveyIEEE Communications Surveys & Tutorials10.1109/SURV.2011.041010.0004113:2(199-222)Online publication date: 2011
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media