skip to main content
10.1145/1140277.1140334acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article

Modeling adoptability of secure BGP protocols

Published:26 June 2006Publication History

ABSTRACT

No abstract available.

References

  1. H. Chan, D. Dash, A. Perrig, and H. Zhang. Modeling adoptability of secure bgp protocols. Technical Report CMU-CyLab-05-001, CyLab, Carnegie Mellon University, Jan. 2005.Google ScholarGoogle Scholar
  2. G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proc. NDSS'03, Feb. 2003.Google ScholarGoogle Scholar
  3. X. He, C. Papadopoulos, and P. Radoslavov. A framework for incremental deployment strategies for router-assisted services. In INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In Proc. of ACM SIGCOMM 2004, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582--592, apr 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Topology-based detection of anomalous BGP messages. In Proc. RAID'03.Google ScholarGoogle Scholar
  7. S. Murphy. BGP Security Vulnerabilities Analysis. IETF draft-ietf-idr-bgp-vuln-00, February 2002.Google ScholarGoogle Scholar
  8. L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. NSDI'04. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Wan, E. Kranakis, and P. van Oorschot. Pretty secure BGP (psBGP). In Proc. NDSS'05.Google ScholarGoogle Scholar
  10. R. White. Securing BGP through secure origin BGP. Technical report, Cisco Internet Protocol Journal, Sept. 2003.Google ScholarGoogle Scholar
  11. H. Yu, J. Rexford, and E. W. Felten. A distributed reputation approach to cooperative internet routing protection. In Workshop on Secure Network Protocols, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Zhao, S. Smith, D. Nicol Evaluating the Performance Impact of PKI on BGP Security. 4th Annual PKI Research and Development Workshop, April 2005.Google ScholarGoogle Scholar

Index Terms

  1. Modeling adoptability of secure BGP protocols

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGMETRICS '06/Performance '06: Proceedings of the joint international conference on Measurement and modeling of computer systems
      June 2006
      404 pages
      ISBN:1595933190
      DOI:10.1145/1140277
      • cover image ACM SIGMETRICS Performance Evaluation Review
        ACM SIGMETRICS Performance Evaluation Review  Volume 34, Issue 1
        Performance evaluation review
        June 2006
        388 pages
        ISSN:0163-5999
        DOI:10.1145/1140103
        Issue’s Table of Contents

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 June 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate459of2,691submissions,17%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader