Searched for: contributor%3A%22Picek%2C+S.+%28mentor%29%22
(1 - 1 of 1)
document
Huisman, Rick (author), Weegink, Stefan (author), Kaptein, Stef (author), Jeleniewski, Alex (author), Saveur, Tom (author)
The internet consists of many networks connected by the BGP protocol and can easily be manipulated by a hacker. Every day, hackers reroute internet traffic and use that to impersonate entities such as companies, devices and humans. To detect this rerouting, which is also know as a route leak, a BGP monitor can be used. A BGP monitor checks...
bachelor thesis 2020