Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Protecting BGP Routes to Top Level DNS Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
IEEE Journal on Selected Areas in Communications
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
The security appliance to BIRD software router
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
The protocols, data, and algorithms that compute paths through interconnected network devices are possibly the most vital, complex, and fragile components in the global information infrastructure. They are also the least protected. This article examines the current state of, and practical prospects for, security in IP routing infrastructures.