Stable internet routing without global coordination
IEEE/ACM Transactions on Networking (TON)
The stable paths problem and interdomain routing
IEEE/ACM Transactions on Networking (TON)
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Towards an evolvable internet architecture
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Modeling adoptability of secure BGP protocol
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
A study of prefix hijacking and interception in the internet
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Sampling large Internet topologies for simulation purposes
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling the adoption of new network architectures
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Shadow configuration as a network management primitive
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Dynamics of competition between incumbent and emerging network technologies
Proceedings of the 3rd international workshop on Economics of networked systems
Autonomous security for autonomous systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cyclops: the AS-level connectivity observatory
ACM SIGCOMM Computer Communication Review
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Proceedings of the ACM SIGCOMM 2010 conference
How secure are secure interdomain routing protocols
Proceedings of the ACM SIGCOMM 2010 conference
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh
Proceedings of the 6th International COnference
Modeling the dynamics of network technology adoption and the role of converters
IEEE/ACM Transactions on Networking (TON)
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data
ACM SIGCOMM Computer Communication Review
Border gateway protocol (BGP) and traceroute data workshop report
ACM SIGCOMM Computer Communication Review
Anatomy of a large european IXP
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Revisiting routing control platforms with the eyes and muscles of software-defined networking
Proceedings of the first workshop on Hot topics in software defined networks
Anatomy of a large european IXP
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Provable security of S-BGP and other path vector protocols: model, analysis and extensions
Proceedings of the 2012 ACM conference on Computer and communications security
BGP security in partial deployment: is the juice worth the squeeze?
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
AS relationships, customer cones, and validation
Proceedings of the 2013 conference on Internet measurement conference
Journal of Network and Computer Applications
A survey of interdomain routing policies
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
With a cryptographic root-of-trust for Internet routing(RPKI [17]) on the horizon, we can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP [22], secure origin BGP [37]). However, if experience with IPv6 is any indicator, this will be no easy task. Security concerns alone seem unlikely to provide sufficient local incentive to drive the deployment process forward. Worse yet, the security benefits provided by the S*BGP protocols do not even kick in until a large number of ASes have deployed them. Instead, we appeal to ISPs' interest in increasing revenue-generating traffic. We propose a strategy that governments and industry groups can use to harness ISPs' local business objectives and drive global S*BGP deployment. We evaluate our deployment strategy using theoretical analysis and large-scale simulations on empirical data. Our results give evidence that the market dynamics created by our proposal can transition the majority of the Internet to S*BGP.