Black hole (networking)

Known as: Black hole (disambiguation), Black hole router, Silent discard 
In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2004-2016
01220042016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among… (More)
Is this relevant?
2017
2017
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2017
2017
While the clean slate approach proposed by Software Defined Networking (SDN) promises radical changes in the stagnant state of… (More)
  • figure 1
Is this relevant?
2016
2016
DDoS attacks remain a serious threat not only to the edge of the Internet but also to the core peering links at Internet Exchange… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of… (More)
Is this relevant?
2010
2010
The current interdomain routing protocol, Border Gateway Protocol, is limited in implementations of universal security. Because… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Configuring a network is a tedious and error-prone task. In particular, configuring routing policies for a network is complex as… (More)
  • figure 1
  • table I
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Configuring a network is a tedious and error-prone task. In particular, configuring routing policies for a network is complex as… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2006
2006
Previous studies have shown that current inter-domain routing protocol, border gateway protocol (BGP), is vulnerable to various… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Is this relevant?
2004
2004
Previous studies show that current inter-domain routing protocol, border gateway protocol (BGP), is vulnerable to various attacks… (More)
  • figure 1
  • figure 3
  • table I
Is this relevant?