RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins

Emile Aben
Emile Aben
Tim Bruijnzeels
Tim Bruijnzeels
Balakrishnan Chandrasekaran
Balakrishnan Chandrasekaran
John Rula
John Rula
Nick Sullivan
Nick Sullivan

Proceedings of the Internet Measurement Conference, pp. 406-419, 2019.

Cited by: 10|Bibtex|Views107|DOI:https://doi.org/10.1145/3355369.3355596
EI
Other Links: dl.acm.org|dblp.uni-trier.de|academic.microsoft.com

Abstract:

Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) announces routes for IP space it does not control. To address this issue, the Resource Public Key Infrastructure (RPKI) was developed starting in 2008, with de...More

Code:

Data:

Your rating :
0

 

Tags
Comments