• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Listen and Whisper: Security Mechanisms for BGP (2004)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [sahara.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [cs.nyu.edu]
  • [www.cs.illinois.edu]
  • [cs.brown.edu]
  • [oasis.cs.berkeley.edu]
  • [www.volkerroth.com]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [web.engr.illinois.edu]
  • [www.scs.stanford.edu]
  • [pbg.cs.illinois.edu]
  • [www.cs.utexas.edu]
  • [www.cs.illinois.edu]
  • [www.cs.utexas.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Lakshminarayanan Subramanian , Volker Roth , Ion Stoica , Scott Shenker , Randy H. Katz
Venue:IN PROCEEDINGS OF FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI
Citations:105 - 3 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Subramanian04listenand,
    author = {Lakshminarayanan Subramanian and Volker Roth and Ion Stoica and Scott Shenker and Randy H. Katz},
    title = {Listen and Whisper: Security Mechanisms for BGP},
    booktitle = {IN PROCEEDINGS OF FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI},
    year = {2004},
    publisher = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

BGP, the current inter-domain routing protocol, assumes that the routing information propagated by authenticated routers is correct. This assumption renders the current infrastructure vulnerable to both accidental misconfigurations and deliberate attacks. To reduce this vulnerability, we present a combination of two mechanisms: Listen and Whisper. Listen passively probes the data plane and checks whether the underlying routes to different destinations work. Whisper uses cryptographic functions along with routing redundancy to detect bogus route advertisements in the control plane. These mechanisms are easily deployable, and do not rely on either a public key infrastructure or a central authority like ICANN. The

Keyphrases

security mechanism    central authority    data plane    different destination work    control plane    current inter-domain routing protocol    public key infrastructure    authenticated router    cryptographic function    accidental misconfigurations    current infrastructure vulnerable    bogus route advertisement    deliberate attack   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University