Back to Results
First PageMeta Content
Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Routing protocol / Route filtering / Network architecture / Internet / Computing


Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin Stephanie Forrest
Add to Reading List

Document Date: 2006-09-02 13:54:00


Open Document

File Size: 158,49 KB

Share Result on Facebook

City

Topology / /

Company

Distributed Systems / AT&T / Autonomous Systems / Equinix / PGBGP / Con Edison / IEEE Journal / /

/

Event

FDA Phase / M&A / /

Facility

Santa Fe Institute / University of Michigan / /

IndustryTerm

e-prints / Internet Registries / Internet Service Providers / software crashes / border gateway protocol / study network / Internet Draft / real time / anomaly-detection algorithms / human network operator / public-key infrastructure / search functionality / software updates / largescale Internet attacks / local network operator / Internet Measurement Workshop / interdomain routing protocol / Internet Alert Registry / inference algorithms / Internet Numbers / border gateway routing protocol / network operator / low-end routers / Internet routing / proposed strong solutions / router software / weaker solutions / /

Organization

Asia Pacific Network Information Centre / National Science Foundation / University of Michigan / Princeton University / University of New Mexico / Santa Fe Institute / of New Mexico Santa Fe Institute / Homeland Security Advanced Research Projects Agency / /

Person

Karlin Stephanie Forrest Jennifer / L. Subramanian / V / Josh Karlin Stephanie Forrest / /

Position

announcer / forward data packets / representative / /

Product

BGP / /

ProvinceOrState

Michigan / Manitoba / /

Technology

border gateway routing protocol / BGP protocol / inference algorithms / Secure border gateway protocol / analysis algorithm / low-end routers / Border Gateway Protocol / BGP router / BGP routers / html / public-key infrastructure / anomaly-detection algorithms / DNS / following protocol / http / ISP / Simulation / interdomain routing protocol / edge router / not require changing the BGP protocol / /

URL

http /

SocialTag