Section I: The Big Picture
• Chapter 1: Introduction
• Chapter 2: Pre-Requisites
• Chapter 3: BGP-4 Protocol
• Chapter 4: BGP Threat Model
• Chapter 5: Attacks on BGP
Section II: Securing BGP
• Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)
• Chapter 7: Inter-domain Route Validation (IRV)
• Chapter 8: Secure Path Vector (SPV)
• Chapter 9: Listen and Whisper
Subsection II B: Ongoing Efforts
• Chapter 10: Resource Public Key Infrastructure (RPKI)
• Chapter 11: Route Origination Authorization (ROA)
• Chapter 12: BGPSEC Protocol
• Chapter 13: Analysis of SIDR WG Proposals
Section III: Future Way Forward
• Chapter 14: BGP Security Management using Overlay Networks
Xavier Masip-Bruin, Ph.D in telecommunications engineering from UPC, is currently an associate professor of Computer Science and Communications at the Technical University of Catalunya (UPC), Vilanova I la Geltrú, Barcelona, Spain.
Marcelo Yannuzzi is full Department of Computer Architecture, Technical University of Catalonia, Vilanova I la Geltrú, Barcelona, Spain.
Muhammad Shuaib Siddiqui is a PhD candidate at the Advanced Network Architectures Lab, Universitat Politecnica de Catalunya, Vilanova I la Geltrú, Barcelona, Spain.
Ask a Question About this Product More... |