Back to Results
First PageMeta Content
Routing / Internet standards / Internet protocols / Border Gateway Protocol / IP hijacking / Route filtering / Router / Classless Inter-Domain Routing / Route Views / Network architecture / Internet / Computing


Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes Josh Karlin University of New Mexico Stephanie Forrest University of New Mexico
Add to Reading List

Document Date: 2005-10-27 19:53:22


Open Document

File Size: 108,00 KB

Share Result on Facebook

Company

Autonomous Systems / Equinix / PGBGP / Google / ASs / /

Event

FDA Phase / /

IndustryTerm

Internet Registries / Internet Service Providers / software crashes / Internet registry / vulnerable protocol / Internet connectivity / large-scale Internet attack / public-key infrastructure / software updates / local network operator / financial Web site / interdomain routing protocol / advertising sub-prefixes / inference algorithms / network operator / vigilant operator / low-end routers / Internet routing / Web server / behavior-based anomaly-detection systems / router software / search engine / /

Organization

Princeton University / University of New Mexico Santa Fe Institute Abstract / University of New Mexico / /

Position

announcer / forward data packets / representative / /

Product

some / /

Technology

BGP-speaking router / 1 Jennifer Rexford Princeton University Introduction The Border Gateway Protocol / BGP protocol / inference algorithms / low-end routers / search engine / BGP routers / BGP-speaking routers / public-key infrastructure / 2.1 Border Gateway Protocol / load balancing / simulation / interdomain routing protocol / therefore vulnerable protocol / 5 router / Web server / not require changing the BGP protocol / /

URL

www.google.com / /

SocialTag