Back to Results
First PageMeta Content
Routing protocols / Internet protocols / Border Gateway Protocol / Computer networking / Routing / Computer network / Router / IP hijacking / Network architecture / Internet / Computing


A Distributed Reputation Approach to Cooperative Internet Routing Protection Harlan Yu, Jennifer Rexford, Edward W. Felten Princeton University {harlanyu, jrex, felten}@cs.princeton.edu
Add to Reading List

Document Date: 2011-04-04 05:09:56


Open Document

File Size: 102,50 KB

Share Result on Facebook

City

Topology / /

Company

South Asian Network Operators Group / IEEE Journal / /

Continent

Asia / /

Country

United States / /

/

Event

Product Issues / Natural Disaster / FDA Phase / /

Facility

By building / University of Oregon Route Views Project / Edward W. Felten Princeton University / /

IndustryTerm

local debugging tools / physical network / local networkmanagement tools / Internet Routing Instabilities / local detection tools / public key infrastructure / online reputation systems / local analysis tools / interdomain routing infrastructure / Internet backbone / Internet Draft / analytic tools / possible solutions / distributed reputation protocol / notorious operator / border routers / network operators / distributed online environments / server / similar groups / interdomain routing protocol / data publishing services / online reputation / online reputation scheme / realistic Internet topology / reputation systems / online trust relationship / autonomous systems / pseudo-anonymous communications / network operator / out-of-band network / online world / faulty underlying network / social network / reputation protocol / overlay network / online social network / Internet Routing Protection Harlan Yu / online community / /

MusicGroup

The Network / /

Organization

University of Oregon / Network Reliability and Interoperability Council / Princeton University / U.S. Securities and Exchange Commission / Information Sharing and Analysis Center for the Internet / /

Person

L. Subramanian / V / Edward W. Felten / Harlan Yu / /

Position

guard / /

Product

Applications Our / belief / underlying network / adversary / our / /

Technology

BGP protocol / public key infrastructure / Secure Border Gateway Protocol / peer-to-peer / PKI / actual BGP protocol / Border Gateway Protocol / P2P / html / distributed reputation protocol / encryption / 2.4 Protocol / DNS / underlying routing protocol / http / ISP / interdomain routing protocol / border routers / reputation protocol / /

URL

http /

SocialTag