Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Aug 30, 2010 · We prove that finding the most damaging strategy is NP-hard, and show how counterintuitive strategies, like announcing longer paths, announcing ...
People also ask
ABSTRACT. In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information.
ABSTRACT. In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information.
Nov 20, 2009 · ABSTRACT. In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing ...
Sep 9, 2014 · When it works. This strategy only involves deviating from normal export policy, rather than lying about paths. Thus, it succeeds against any ...
ABSTRACT. Ever since the 1990s, the de facto standard for Internet inter-. AS1 routing has been BGP, the Border Gateway Protocol. Security issues caused or ...
The experiment results show that the protocols can not only resist eavesdropping, replay attack, man-in-the-middle attack, inquiry address and conversation ...
Jun 21, 2010 · We prove that finding the most damaging strategy is NP-hard, and show how counterintuitive strategies, like announcing longer paths, announcing ...
This work quantifies the ability of the main protocols to blunt traffic-attraction attacks; i.e., an attacker that deliberately attracts traffic to drop, ...