The stable paths problem and interdomain routing
IEEE/ACM Transactions on Networking (TON)
Bgp
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
A performance evaluation of BGP-based traffic engineering
International Journal of Network Management
Toward Secure Routing Infrastructures
IEEE Security and Privacy
Accurate Real-time Identification of IP Prefix Hijacking
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
Analysis of BGP prefix origins during google's may 2005 outage
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
BGP routing policies in ISP networks
IEEE Network: The Magazine of Global Internetworking
The performance impact of BGP security
IEEE Network: The Magazine of Global Internetworking
Open issues in interdomain routing: a survey
IEEE Network: The Magazine of Global Internetworking
Sign what you really care about - Secure BGP AS-paths efficiently
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The Internet consists of a large number of interconnected Autonomous Systems (ASes) which exchange their routes using Border Gateway Protocol (BGP). However, it was originally designed to operate in a trusted environment, and there are no internal mechanisms to protect the information it carries. We have implemented RTR-BIRD, which is an enhancement of BIRD software router to interact with RTRPKI which is another implementation of us to allow RTR-BIRD to support origin validation using Resource Public Key Infrastructure (RPKI). In contrast to QuaggaSRx that is the only one RPKI-capable software router implementation at this time, our implementation enables users to access an empirical cache rather than a virtual cache which is implemented by National Institute of Standards and Technology (NIST) and resides in a local. Subsequently, RTR-BIRD can be exploited for practical testing in software-based routing environment against QuaggaSRx. Our main contribution here is that we have developed the originator which not only makes a software router (BIRD) interact with RPKI but also shares a validated cache as well as Route Origin Authorizations (ROAs) of the cache with the other software routers. We also expect that RTR-BIRD is faster than QuaggaSRx as much as the difference in performance between the deployed and latest version of BIRD and that of Quagga. It's because an algorithm theoretically shows the same performance in a same situation, and each origin validation scheme of RTR-BIRD and QuaggaSRx, each of which is implemented based on the same standard defined by IETF, is equivalent to each other.