BGP

BGPSec – A reality now
BGPSec – A reality now Thumbnail
Deploy360 16 October 2017

BGPSec – A reality now

The Secure Inter Domain Routing (SIDR) initiative held its first BoF at IETF 64 back in November 2005, and...

Hacking on BGP for Fun and Profit
Hacking on BGP for Fun and Profit Thumbnail
Improving Technical Security 10 February 2016

Hacking on BGP for Fun and Profit

Of all the many protocols that run over the Internet some are more fundamental than others. Border Gateway Protocol...

BGPmon: Using BGP Data To Fight Spam
Deploy360 18 September 2014

BGPmon: Using BGP Data To Fight Spam

Can we use BGP data to find email spammers? And could securing BGP provide a mechanism to help reduce...

BGP Hijacker Steals Bitcoins
8 August 2014

BGP Hijacker Steals Bitcoins

Researchers at Dell’s Secureworks have uncovered multiple BGP incidents used to steal bitcoins. According to Secureworks, the attacker used...

Resource Public Key Infrastructure (RPKI)
Securing Border Gateway Protocol (BGP) 13 June 2014

Resource Public Key Infrastructure (RPKI)

In response to IP address hijacking attacks and to the continuing vulnerability in IP address hijacking, the IETF Secure...

Video: CrypTech and RPKI (Randy Bush at RIPE 68)
9 June 2014

Video: CrypTech and RPKI (Randy Bush at RIPE 68)

How do we build an open hardware security module that’s verifiably secure? Can we use Openflow and BGP RPKI...

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security
7 February 2014

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security

Want to understand better why we need to secure the Border Gateway Protocol (BGP) to make the Internet’s routing...

Introducing A New Deploy360 Topic: Securing BGP
Deploy360 29 January 2014

Introducing A New Deploy360 Topic: Securing BGP

How can we help network operators ensure that their usage of the Border Gateway Protocol (BGP) is as secure...