Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 15
Year of Publication: 2013
Authors:
Bhavneet Kaur
Karanjeet Singh Kahlon
Sandeep Sharma
10.5120/12962-0088

Bhavneet Kaur, Karanjeet Singh Kahlon and Sandeep Sharma. Article: Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique. International Journal of Computer Applications 74(15):29-32, July 2013. Full text available. BibTeX

@article{key:article,
	author = {Bhavneet Kaur and Karanjeet Singh Kahlon and Sandeep Sharma},
	title = {Article: Inter-Domain Routing with Shielded Infrastructure and Buzzer Technique},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {15},
	pages = {29-32},
	month = {July},
	note = {Full text available}
}

Abstract

In the internet, BGP is de-facto inter-domain routing protocol. It is unprotected against number of attacks such as prefix hijacking and traffic interference. There have been many incidents of prefix hijacking on internet. To protect BGP against these kinds of attacks several mechanisms exist but they are not implemented fully because it requires cooperation among tens of thousands of independent ASes. This paper proposes two mechanisms which will show that safety can be achieved by implementing these mechanisms on small group of ASes.

References

  • R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM, Aug. 2002.
  • V. J. Bono, "7007 explanation and apology," Apr. 1997. http://www. merit. edu/mail. archives/nanog/1997-04/ msg00444. html.
  • P. Boothe, J. Hiebert, and R. Bush, How prevalent is prefix hijacking on the Internet?," Feb. 2006.
  • http://www. nanog. org/mtg-0602/boothe. html.
  • R. Blog, Con-Ed steals the 'net. " http://www. renesys. com/blog/2006/01/conedstealsthenet. shtml.
  • http://www. ietf. org/html. charters/rpsec-charter. html.
  • http://www. nanog. org/
  • J. Karlin, S. Forrest, and J. Rexford, PGBGP simulator. http://www. cs. unm. edu/~karlinjf/pgbgp/.
  • http://as-rank. caida. org/data/.
  • http://www. routeviews. org/.
  • M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, PHAS: A pre¯x hijack alert system," in Proc. USENIX Security Symposium, Aug. 2006.