Searched for: subject%3A%22BGP%22
(1 - 17 of 17)
document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
Anghel, R.I. (author), Zhauniarovich, Y. (author), Hernandez Ganan, C. (author)
Distributed Denial-of-Service (DDoS) attacks continue to threaten the availability of Internet-based services. While countermeasures exist to decrease the impact of these attacks, not all operators have the resources or knowledge to deploy them. Alternatively, anti-DDoS services such as DDoS clearing houses and blackholing have emerged....
journal article 2024
document
Nosyk, Yevheniya (author), Lone, Qasim (author), Zhauniarovich, Y. (author), Hernandez Ganan, C. (author), Aben, Emile (author), Moura, Giovane C. M. (author), Tajalizadehkhoob, Samaneh (author), Duda, Andrzej (author), Korczyński, Maciej (author)
DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to work properly, it is inherently vulnerable to manipulation. In November 2021, users from Mexico received bogus DNS responses when resolving whatsapp.net. It appeared that a BGP route leak diverged DNS...
conference paper 2023
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
document
Sousi, Mohaned (author), Salinas-Rodriguez, Sergio G. (author), Liu, G. (author), Dusseldorp, Jos (author), Kemperman, Antoine J.B. (author), Schippers, Jan C. (author), van der Meer, Walter G.J. (author), Kennedy, M.D. (author)
The bacterial growth potential (BGP) of drinking water is widely assessed either by flow cytometric intact cell count (BGP<sub>ICC</sub>) or adenosine triphosphate (BGP<sub>ATP</sub>) based methods. Combining BGP<sub>ICC</sub> and BGP<sub>ATP</sub> measurements has been previously applied for various types of drinking water having high to low...
journal article 2021
document
Krenc, Thomas (author), Beverly, Robert (author), Smaragdakis, G. (author)
BGP communities are a popular mechanism used by network operators for traffic engineering, blackholing, and to realize network policies and business strategies. In recent years, many research works have contributed to our understanding of how BGP communities are utilized, as well as how they can reveal secondary insights into real-world...
conference paper 2021
document
van Rossum, Tim (author)
The Internet consists of many subnetworks, which are connected to each other. These subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a part of it. In order to successfully determine routes from one of these ASes to the other, the Border Gateway Protocol (BGP) is used. This protocol has several security flaws...
master thesis 2020
document
Huisman, Rick (author), Weegink, Stefan (author), Kaptein, Stef (author), Jeleniewski, Alex (author), Saveur, Tom (author)
The internet consists of many networks connected by the BGP protocol and can easily be manipulated by a hacker. Every day, hackers reroute internet traffic and use that to impersonate entities such as companies, devices and humans. To detect this rerouting, which is also know as a route leak, a BGP monitor can be used. A BGP monitor checks...
bachelor thesis 2020
document
Sousi, Mohaned (author), Liu, G. (author), Salinas-Rodriguez, Sergio G. (author), Chen, L. (author), Dusseldorp, Jos (author), Wessels, Peter (author), Schippers, Jan C. (author), Kennedy, M.D. (author), van der Meer, Walter (author)
Although water produced by reverse osmosis (RO) filtration has low bacterial growth potential (BGP), post-treatment of RO permeate, which is necessary prior to distribution and human consumption, needs to be examined because of the potential re-introduction of nutrients/contaminants. In this study, drinking water produced from anaerobic...
journal article 2020
document
van Veen, Simone (author)
In the past years, society has become increasingly more reliant on the Internet. Consequently, the security of the Internet became of critical importance. This thesis focusses on the security of one of the Internet's main protocols. This protocol, called the Border Gateway Protocol (BGP), is used to exchange information that allows Internet...
master thesis 2019
document
Semwal, Anant (author)
Inter-Autonomous System (AS) route monitoring is the process of collecting the inter-AS routing information. This information flows on the Internet in the form of BGP UPDATE messages, and the BGP data are the messages obtained by the monitors. Existing methods of monitor placement rely on the network topology which provides inadequate visibility...
master thesis 2019
document
Veenman, Christian (author)
Many processes rely on the availability of the Internet. The Border Gateway Protocol (BGP) is widely used for exchanging routing information between routers and is essential for the successful operation of the Internet. Because BGP has not been designed with security in mind, BGP anomalies such as origin hijacks, route leaks, and link failure...
master thesis 2019
document
Kastelein, Frits (author)
In today's world, the Internet is the backbone of our society. The relatively unknown Border Gateway Protocol (BGP), and with its vulnerabilities, gives malicious parties an opportunity for abuse. By improving the currently known AS relation data set and by simulating BGP traffic this abuse is better spotted. Kastelein's topology generating...
master thesis 2018
document
Sousi, Mohaned (author), Liu, G. (author), Salinas-Rodriguez, Sergio G. (author), Knezev, Aleksandra (author), Blankert, Bastiaan (author), Schippers, Jan C. (author), van der Meer, W.G.J. (author), Kennedy, M.D. (author)
Ensuring the biological stability of drinking water is essential for modern drinking water supply. To understand and manage the biological stability, it is critical that the bacterial growth in drinking water can be measured. Nowadays, advance treatment technologies, such as reverse osmosis (RO), are increasingly applied in drinking water...
journal article 2018
document
Trap, Cyril (author)
The Border Gateway Protocol is critical for the correct working of the Internet. When it fails the impact is usually high and therefore failures should be minimized. Unfortunately the configuration of BGP is prone to errors. Besides that, BGP is targeted by attacks of cyber criminals. A simulator capable of running BGP can reduce the number of...
bachelor thesis 2018
document
Mühlbauer, W. (author), Uhlig, S. (author), Fu, B. (author), Meulle, M. (author), Maennel, O. (author)
conference paper 2007
document
Buob, M.O. (author), Uhlig, S. (author), Meulle, M. (author)
BGP is used today by all Autonomous Systems (AS) in the Internet. Inside each AS, iBGP sessions distribute the external routes among the routers. In large ASs, relying on a fullmesh of iBGP sessions between routers is not scalable, so route-reflection is commonly used. The scalability of route-reflection compared to an iBGP full-mesh comes at...
conference paper
Searched for: subject%3A%22BGP%22
(1 - 17 of 17)