Inter Domain Routing Security
Inter Domain Routing Security
Yannuzzi, Marcelo; Siddiqui, Muhammad Shuaib; Masip-Bruin, Xavier
ISTE Ltd and John Wiley & Sons Inc
08/2023
320
Dura
Inglês
9781848215399
15 a 20 dias
Descrição não disponível.
Section I: The Big Picture
* Chapter 1: Introduction
* Chapter 2: Pre-Requisites
* Chapter 3: BGP-4 Protocol
* Chapter 4: BGP Threat Model
* Chapter 5: Attacks on BGP
Section II: Securing BGP
* Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)
* Chapter 7: Inter-domain Route Validation (IRV)
* Chapter 8: Secure Path Vector (SPV)
* Chapter 9: Listen and Whisper
Subsection II B: Ongoing Efforts
* Chapter 10: Resource Public Key Infrastructure (RPKI)
* Chapter 11: Route Origination Authorization (ROA)
* Chapter 12: BGPSEC Protocol
* Chapter 13: Analysis of SIDR WG Proposals
Section III: Future Way Forward
* Chapter 14: BGP Security Management using Overlay Networks
* Chapter 1: Introduction
* Chapter 2: Pre-Requisites
* Chapter 3: BGP-4 Protocol
* Chapter 4: BGP Threat Model
* Chapter 5: Attacks on BGP
Section II: Securing BGP
* Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)
* Chapter 7: Inter-domain Route Validation (IRV)
* Chapter 8: Secure Path Vector (SPV)
* Chapter 9: Listen and Whisper
Subsection II B: Ongoing Efforts
* Chapter 10: Resource Public Key Infrastructure (RPKI)
* Chapter 11: Route Origination Authorization (ROA)
* Chapter 12: BGPSEC Protocol
* Chapter 13: Analysis of SIDR WG Proposals
Section III: Future Way Forward
* Chapter 14: BGP Security Management using Overlay Networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Border Gateway Protocol; Internet security; Secure Inter-Domain Routing; BGP; SIDR; IETF
Section I: The Big Picture
* Chapter 1: Introduction
* Chapter 2: Pre-Requisites
* Chapter 3: BGP-4 Protocol
* Chapter 4: BGP Threat Model
* Chapter 5: Attacks on BGP
Section II: Securing BGP
* Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)
* Chapter 7: Inter-domain Route Validation (IRV)
* Chapter 8: Secure Path Vector (SPV)
* Chapter 9: Listen and Whisper
Subsection II B: Ongoing Efforts
* Chapter 10: Resource Public Key Infrastructure (RPKI)
* Chapter 11: Route Origination Authorization (ROA)
* Chapter 12: BGPSEC Protocol
* Chapter 13: Analysis of SIDR WG Proposals
Section III: Future Way Forward
* Chapter 14: BGP Security Management using Overlay Networks
* Chapter 1: Introduction
* Chapter 2: Pre-Requisites
* Chapter 3: BGP-4 Protocol
* Chapter 4: BGP Threat Model
* Chapter 5: Attacks on BGP
Section II: Securing BGP
* Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)
* Chapter 7: Inter-domain Route Validation (IRV)
* Chapter 8: Secure Path Vector (SPV)
* Chapter 9: Listen and Whisper
Subsection II B: Ongoing Efforts
* Chapter 10: Resource Public Key Infrastructure (RPKI)
* Chapter 11: Route Origination Authorization (ROA)
* Chapter 12: BGPSEC Protocol
* Chapter 13: Analysis of SIDR WG Proposals
Section III: Future Way Forward
* Chapter 14: BGP Security Management using Overlay Networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.