CFP last date
20 December 2024
Reseach Article

Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique

by Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 15
Year of Publication: 2013
Authors: Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma
10.5120/12962-0088

Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma . Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique. International Journal of Computer Applications. 74, 15 ( July 2013), 29-32. DOI=10.5120/12962-0088

@article{ 10.5120/12962-0088,
author = { Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma },
title = { Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 15 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number15/12962-0088/ },
doi = { 10.5120/12962-0088 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:23.143668+05:30
%A Bhavneet Kaur
%A Karanjeet Singh Kahlon
%A Sandeep Sharma
%T Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 15
%P 29-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the internet, BGP is de-facto inter-domain routing protocol. It is unprotected against number of attacks such as prefix hijacking and traffic interference. There have been many incidents of prefix hijacking on internet. To protect BGP against these kinds of attacks several mechanisms exist but they are not implemented fully because it requires cooperation among tens of thousands of independent ASes. This paper proposes two mechanisms which will show that safety can be achieved by implementing these mechanisms on small group of ASes.

References
  1. R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, Aug. 2002.
  2. V. J. Bono, "7007 explanation and apology," Apr. 1997. http://www. merit. edu/mail. archives/nanog/1997-04/ msg00444. html.
  3. P. Boothe, J. Hiebert, and R. Bush, How prevalent is prefix hijacking on the Internet?," Feb. 2006.
  4. http://www. nanog. org/mtg-0602/boothe. html.
  5. R. Blog, Con-Ed steals the 'net. " http://www. renesys. com/blog/2006/01/conedstealsthenet. shtml.
  6. http://www. ietf. org/html. charters/rpsec-charter. html.
  7. http://www. nanog. org/
  8. J. Karlin, S. Forrest, and J. Rexford, PGBGP simulator. http://www. cs. unm. edu/~karlinjf/pgbgp/.
  9. http://as-rank. caida. org/data/.
  10. http://www. routeviews. org/.
  11. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, PHAS: A pre¯x hijack alert system," in Proc. USENIX Security Symposium, Aug. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

BGP Prefix-hijacking S-BGP so-BGP