BGP
BGPSec – A reality now
The Secure Inter Domain Routing (SIDR) initiative held its first BoF at IETF 64 back in November 2005, and...
Hacking on BGP for Fun and Profit
Of all the many protocols that run over the Internet some are more fundamental than others. Border Gateway Protocol...
BGPmon: Using BGP Data To Fight Spam
Can we use BGP data to find email spammers? And could securing BGP provide a mechanism to help reduce...
BGP Hijacker Steals Bitcoins
Researchers at Dell’s Secureworks have uncovered multiple BGP incidents used to steal bitcoins. According to Secureworks, the attacker used...
Resource Public Key Infrastructure (RPKI)
In response to IP address hijacking attacks and to the continuing vulnerability in IP address hijacking, the IETF Secure...
Video: CrypTech and RPKI (Randy Bush at RIPE 68)
How do we build an open hardware security module that’s verifiably secure? Can we use Openflow and BGP RPKI...
BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security
Want to understand better why we need to secure the Border Gateway Protocol (BGP) to make the Internet’s routing...
Introducing A New Deploy360 Topic: Securing BGP
How can we help network operators ensure that their usage of the Border Gateway Protocol (BGP) is as secure...