Securing BGP — A Literature Survey

@article{Huston2011SecuringB,
  title={Securing BGP — A Literature Survey},
  author={Geoff Huston and Mattia Rossi and Grenville J. Armitage},
  journal={IEEE Communications Surveys & Tutorials},
  year={2011},
  volume={13},
  pages={199-222}
}
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack. This paper examines the Internet's routing architecture and the design of BGP in particular, and surveys the work to date on securing BGP. To date no proposal has been seen as offering a combination of adequate security functions… CONTINUE READING
Highly Cited
This paper has 90 citations. REVIEW CITATIONS

Citations

Publications citing this paper.

91 Citations

051015'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 91 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 166 references

BGP security requirements

  • B. Christian, T. Tauber
  • Internet- Draft (Informational), Nov. . [Online…
  • 2008
Highly Influential
7 Excerpts

Pakistan hijacks YouTube

  • M. A. Brown
  • Renesys Blog, Feb . [Online]. Available: http…
  • 2008
Highly Influential
8 Excerpts

Exploring autonomous system numbers

  • G. Huston
  • Internet Protocol J., vol. 9, no. 1, Mar. .
  • 2006
Highly Influential
13 Excerpts

Priority II: A national cyberspace security threat and vulnerability reduction program

  • Office of the President of the United States
  • . [Online]. Available: http://www.us-cert.gov…
  • 2004
Highly Influential
8 Excerpts