Back to Results
First PageMeta Content
Routing protocols / Border Gateway Protocol / Routing / Route Views / GNU Zebra / Router / Route flapping / IP hijacking / Network architecture / Internet / Computing


Securing BGP Using External Security Monitors ∗ Patrick Reynolds, Oliver Kennedy, Emin G¨un Sirer, Fred B. Schneider {reynolds,okennedy,egs,fbs}@cs.cornell.edu Abstract
Add to Reading List

Document Date: 2006-12-22 13:51:13


Open Document

File Size: 155,33 KB

Share Result on Facebook

Company

IBM / Cisco / B CA PA K AB / K AB / Pirelli / HP / Symantec / E K AB / A. K AB / Qualcomm / Microsoft / /

Currency

pence / /

/

Event

Product Issues / Product Recall / /

Facility

store F / /

IndustryTerm

traffic using commodity hardware / online keys / secure co-processors / secure hardware / enough routers / unmodified legacy protocol / Internet AS graph / legacy network protocols / message-processing rate / commodity secure co-processor / target protocol / attestation services / Internet Routing Validation / malicious router / server-class hardware / internal routing protocol / trusted computing platform helps / autonomous systems / trusted computing platforms / non-essential services / trusted computing / trusted computing base / particular network / internal routing protocols / secure network / legacy protocols / /

MusicGroup

W X Legacy / Monitor Legacy / /

OperatingSystem

MacOS / Linux / GNU / /

Organization

National Science Foundation / U.S. Government / U.S. Department of Homeland Security / CA PA / Office for Domestic Preparedness / Core Duo / /

Person

Oliver Kennedy / Fred B. Schneider / Patrick Reynolds / /

Position

malicious administrator / local administrator / speaker / valid BGP speaker / non-soBGP speaker / nonsoBGP speaker / Wb / logical speaker / BGP speaker / soBGP speaker / malicious BGP speaker / unmonitored BGP speaker / local BGP speaker / administrator / single BGP speaker / /

Product

prefix / BGP / route / /

ProvinceOrState

Manitoba / Arizona / /

PublishedMedium

the Nexus / /

TVShow

Legacy / /

Technology

RAM / unmodified legacy protocol / Linux / secure co-processors / securing legacy network protocols / internal routing protocols / internal routing protocol / target protocol / Legacy host Unmodified network protocol / BGP router / BGP routers / Secret key / existing BGP routers / commodity secure co-processor / operating system / securing legacy protocols / legacy network protocols / malicious router / routing protocol / public key / legacy protocols / same protocol / network protocols / /

SocialTag