Security for the DoD transmission control protocol
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Comments on “security problems in the TCP/IP protocol suite”
ACM SIGCOMM Computer Communication Review
Integration of security in network routing protocols
ACM SIGSAC Review
Integrating security in inter-domain routing protocols
ACM SIGCOMM Computer Communication Review
A protocol for route establishment and packet forwarding across multidomain internets
IEEE/ACM Transactions on Networking (TON)
A path-finding algorithm for loop-free routing
IEEE/ACM Transactions on Networking (TON)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Trust Requirements and Performance of a Fast Subtransport-Level Protocol for Secure Communication
IEEE Transactions on Software Engineering
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A Simple active attack against TCP
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Standardizing cryptographic services at OSI higher layers
IEEE Communications Magazine
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
ACM SIGCOMM Computer Communication Review
Security as a quality of service routing problem
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
Aggregated path authentication for efficient BGP security
Proceedings of the 12th ACM conference on Computer and communications security
Computers and Operations Research
Dynamic appointment of ABR for the OSPF routing protocol
Computer Communications
Symmetric Key Approaches to Securing BGP --- A Little Bit Trust Is Enough
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Computers and Operations Research
A verified distance vector routing protocol for protection of internet infrastructure
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Hi-index | 0.24 |
We analyze the security of the BGP routing protocol and identify a number of vulnerabilities in its design and the corresponding threats. We then present modifications to the protocol that minimize or eliminate the most significant threats. The innovation we introduce is the protection of the second-to-last hop information contained in the AS_PATH attributes by digital signatures, and the use of this predecessor information to verify the path of the selected route. With these techniques, we are able to secure complete path information in near constant space, avoiding the recursive protection mechanisms proposed for BGP in the past.