Reynolds et al., 2006 - Google Patents
Using external security monitors to secure BGPReynolds et al., 2006
View PDF- Document ID
- 2138831800721538588
- Author
- Reynolds P
- Kennedy O
- Sirer E
- Schneider F
- Publication year
- Publication venue
- Computing and Information Science, Technical Report TR2006-2065
External Links
Snippet
External security monitors (ESMs) are a new network component for securing legacy protocols without requiring modifications to existing hardware, software, or the protocol. An ESM is an additional host that checks each message sent by a legacy host against a safety …
- 230000000246 remedial 0 abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Skowyra et al. | Effective topology tampering attacks and defenses in software-defined networks | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Douligeris et al. | Network security: current status and future directions | |
Hong et al. | Poisoning network visibility in software-defined networks: New attacks and countermeasures. | |
Abliz | Internet denial of service attacks and defense mechanisms | |
Andersen | Mayday: Distributed filtering for internet services | |
US11838283B2 (en) | Network enclave attestation for network and compute devices | |
US10193907B2 (en) | Intrusion detection to prevent impersonation attacks in computer networks | |
Hlavacek et al. | DISCO: Sidestepping RPKI's deployment barriers | |
WO2002101516A2 (en) | Method and apparatus for distributed network security | |
Hussein et al. | Software-Defined Networking (SDN): the security review | |
CA2574248A1 (en) | Method of operating a network with test packets | |
Nicholes et al. | A survey of security techniques for the border gateway protocol (BGP) | |
Li et al. | Enhancing the trust of internet routing with lightweight route attestation | |
Obenshain et al. | Practical intrusion-tolerant networks | |
Wan et al. | S-rip: A secure distance vector routing protocol | |
Hatzivasilis et al. | WARDOG: Awareness detection watchdog for Botnet infection on the host device | |
Soltani et al. | Security of topology discovery service in sdn: Vulnerabilities and countermeasures | |
Wong et al. | Network infrastructure security | |
Ghorbani et al. | Network attacks | |
Li et al. | Secure and reliable data transmission in SDN-based backend networks of industrial IoT | |
Jones | Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure | |
Reynolds et al. | Using external security monitors to secure BGP | |
Jacquemart | Towards uncovering BGP hijacking attacks | |
Reynolds et al. | Securing BGP using external security monitors |