This Article 
 Bibliographic References 
 Add to: 
Practical Interdomain Routing Security
November/December 2009 (vol. 11 no. 6)
pp. 54-56
Rick Kuhn, US National Institute of Standards and Technology
Simon Liu, US National Library of Medicine
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities.

1. W. Aiello, J. Ionnidis, P. McDaniel, "Origin Authentication in Interdomain Routing," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 165–178.
2. "YouTube Hijacking: A RIPE NCC RIS Case Study," 2008; .
3. D. Montgomery and S. Murphy, "Toward Secure Routing Infrastructures," IEEE Security &Privacy, vol. 4, no. 5, 2006, pp. 84–87.

Index Terms:
Insecure IT, security, interdomain routing, network attacks, network vulnerabilities, routing security
Rick Kuhn, Simon Liu, Hart Rossman, "Practical Interdomain Routing Security," IT Professional, vol. 11, no. 6, pp. 54-56, Nov.-Dec. 2009, doi:10.1109/MITP.2009.131
Usage of this product signifies your acceptance of the Terms of Use.