RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins
Proceedings of the Internet Measurement Conference, pp. 406-419, 2019.
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this issue, the Resource Public Key Infrastructure (RPKI) was developed starting in 2008, with de...More
Full Text (Upload PDF)
PPT (Upload PPT)