The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2009 vol.11)
pp: 54-56
Rick Kuhn , US National Institute of Standards and Technology
Simon Liu , US National Library of Medicine
ABSTRACT
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities.
INDEX TERMS
Insecure IT, security, interdomain routing, network attacks, network vulnerabilities, routing security
CITATION
Rick Kuhn, Simon Liu, Hart Rossman, "Practical Interdomain Routing Security", IT Professional, vol.11, no. 6, pp. 54-56, November/December 2009, doi:10.1109/MITP.2009.131
REFERENCES
1. W. Aiello, J. Ionnidis, P. McDaniel, "Origin Authentication in Interdomain Routing," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 165–178.
2. "YouTube Hijacking: A RIPE NCC RIS Case Study," 2008; www.ripe.net/newsstudy-youtube-hijacking.html .
3. D. Montgomery and S. Murphy, "Toward Secure Routing Infrastructures," IEEE Security &Privacy, vol. 4, no. 5, 2006, pp. 84–87.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool