The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2009 vol.11)
pp: 54-56
Rick Kuhn , US National Institute of Standards and Technology
Simon Liu , US National Library of Medicine
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities.
Insecure IT, security, interdomain routing, network attacks, network vulnerabilities, routing security
Rick Kuhn, Simon Liu, Hart Rossman, "Practical Interdomain Routing Security", IT Professional, vol.11, no. 6, pp. 54-56, November/December 2009, doi:10.1109/MITP.2009.131
1. W. Aiello, J. Ionnidis, P. McDaniel, "Origin Authentication in Interdomain Routing," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 165–178.
2. "YouTube Hijacking: A RIPE NCC RIS Case Study," 2008; .
3. D. Montgomery and S. Murphy, "Toward Secure Routing Infrastructures," IEEE Security &Privacy, vol. 4, no. 5, 2006, pp. 84–87.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool