Detection of Invalid Routing Announcement in the Internet
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Protecting BGP Routes to Top Level DNS Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Towards an accurate AS-level traceroute tool
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring ISP topologies with rocketfuel
IEEE/ACM Transactions on Networking (TON)
ACM SIGCOMM Computer Communication Review
Collecting the internet AS-level topology
ACM SIGCOMM Computer Communication Review
An empirical study of "bogon" route advertisements
ACM SIGCOMM Computer Communication Review
Listen and whisper: security mechanisms for BGP
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Open issues in interdomain routing: a survey
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Since the lack of necessary security mechanisms, the Internet's inter-domain routing system, mainly based on the Border Gateway Protocol (BGP), inevitably faces with serious security threats. Although there are many researches focus on the security of inter-domain routing and BGP, few people have quantified the routing security of the current BGP system effectively. Moreover, Internet operators do need useful information to judge security threats of their autonomous systems (ASes) and BGP routers. In this paper, we propose a security evaluation model, SEM, to assess security threats of the routing system. The basic idea of SEMis simple, namely, the security status of the whole system rests with its parts'. In addition, we quantify security threats status of the routing information from RouteViews using our model. The experimental results show that the model can provide intuitive security threat indices for BGP routers, various ASes and the BGP system respectively, and further more, it can provide valuable, intuitional curve for Internet operators.