[go: up one dir, main page]

Reynolds et al., 2006 - Google Patents

Using external security monitors to secure BGP

Reynolds et al., 2006

View PDF
Document ID
2138831800721538588
Author
Reynolds P
Kennedy O
Sirer E
Schneider F
Publication year
Publication venue
Computing and Information Science, Technical Report TR2006-2065

External Links

Snippet

External security monitors (ESMs) are a new network component for securing legacy protocols without requiring modifications to existing hardware, software, or the protocol. An ESM is an additional host that checks each message sent by a legacy host against a safety …
Continue reading at www.cs.cornell.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Skowyra et al. Effective topology tampering attacks and defenses in software-defined networks
Dayal et al. Research trends in security and DDoS in SDN
Douligeris et al. Network security: current status and future directions
Hong et al. Poisoning network visibility in software-defined networks: New attacks and countermeasures.
Abliz Internet denial of service attacks and defense mechanisms
Andersen Mayday: Distributed filtering for internet services
US11838283B2 (en) Network enclave attestation for network and compute devices
US10193907B2 (en) Intrusion detection to prevent impersonation attacks in computer networks
Hlavacek et al. DISCO: Sidestepping RPKI's deployment barriers
WO2002101516A2 (en) Method and apparatus for distributed network security
Hussein et al. Software-Defined Networking (SDN): the security review
CA2574248A1 (en) Method of operating a network with test packets
Nicholes et al. A survey of security techniques for the border gateway protocol (BGP)
Li et al. Enhancing the trust of internet routing with lightweight route attestation
Obenshain et al. Practical intrusion-tolerant networks
Wan et al. S-rip: A secure distance vector routing protocol
Hatzivasilis et al. WARDOG: Awareness detection watchdog for Botnet infection on the host device
Soltani et al. Security of topology discovery service in sdn: Vulnerabilities and countermeasures
Wong et al. Network infrastructure security
Ghorbani et al. Network attacks
Li et al. Secure and reliable data transmission in SDN-based backend networks of industrial IoT
Jones Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure
Reynolds et al. Using external security monitors to secure BGP
Jacquemart Towards uncovering BGP hijacking attacks
Reynolds et al. Securing BGP using external security monitors