This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Practical Interdomain Routing Security
November/December 2009 (vol. 11 no. 6)
pp. 54-56
Rick Kuhn, US National Institute of Standards and Technology
Simon Liu, US National Library of Medicine
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities.

1. W. Aiello, J. Ionnidis, P. McDaniel, "Origin Authentication in Interdomain Routing," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 165–178.
2. "YouTube Hijacking: A RIPE NCC RIS Case Study," 2008; www.ripe.net/newsstudy-youtube-hijacking.html .
3. D. Montgomery and S. Murphy, "Toward Secure Routing Infrastructures," IEEE Security &Privacy, vol. 4, no. 5, 2006, pp. 84–87.

Index Terms:
Insecure IT, security, interdomain routing, network attacks, network vulnerabilities, routing security
Citation:
Rick Kuhn, Simon Liu, Hart Rossman, "Practical Interdomain Routing Security," IT Professional, vol. 11, no. 6, pp. 54-56, Nov.-Dec. 2009, doi:10.1109/MITP.2009.131
Usage of this product signifies your acceptance of the Terms of Use.