2009 IEEE/IFIP International Conference on Dependable Systems &Amp; Networks 2009
DOI: 10.1109/dsn.2009.5270359
|View full text |Cite
|
Sign up to set email alerts
|

HC-BGP: A light-weight and flexible scheme for securing prefix ownership

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Certificates are necessary for authenticating public keys and binding IP prefixes to these public keys belonging to the organization to which the IP prefixes are assigned [7], in existing cryptography-based schemes for preventing IP prefix hijacking such as some typical schemes of which are S-BGP [8], SoBGP [9], psBGP [10], OA [11], SPV [13], HCBGP [12], and so on. Each certificate contains a private extension that specifies the set of address blocks that have been allocated to the organization.…”
Section: B Existing Authentication Of Origin Asmentioning
confidence: 99%
See 1 more Smart Citation
“…Certificates are necessary for authenticating public keys and binding IP prefixes to these public keys belonging to the organization to which the IP prefixes are assigned [7], in existing cryptography-based schemes for preventing IP prefix hijacking such as some typical schemes of which are S-BGP [8], SoBGP [9], psBGP [10], OA [11], SPV [13], HCBGP [12], and so on. Each certificate contains a private extension that specifies the set of address blocks that have been allocated to the organization.…”
Section: B Existing Authentication Of Origin Asmentioning
confidence: 99%
“…The first category is based on cryptography [8], [9], [10], [11], [12], [13], and the second category is based on detection [16], [17], [3], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…Prefix hijacking is a serious BGO security therat by which attackers steal IP addresses belonging to other netwoks [13]. Malicious AS injects false route into global routing table by advertising another network's IP prefix.…”
Section: Bgp Attacks With Ip Prefix Hijackingmentioning
confidence: 99%
“…For example, in the left part of Figure 1, both the attacker and the victim announce the same prefix 10.1.0.0/16. Consequently, AS2 and AS3 may prefer the attacker's route because of the shorter AS path [13].…”
Section: Introductionmentioning
confidence: 99%