BGP Session Takeover Method Based on Docker

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Managing BGP Routes with a BGP Session Multiplexer

This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients access to the same set of BGP feeds, BGP-Mux facilitates many applications, including: (1) scalable, real-time monitoring of BGP update feeds; (3) new routing architectures that requ...

متن کامل

Measuring and Analyzing on Effection of BGP Session Hijack Attack

Because there is no authentication mechanism used in BGP, a mis-behaving router can announce routes to any destination prefix on the Internet and even manipulate route attributes in the routing updates it sends to neighboring routers. Taking advantage of this weakness has become the fundamental mechanism for constructing prefix hijack attacks. The relation of network topology and prefix hijacki...

متن کامل

BGP session lifetime modeling in congested networks

The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism in packet forwarding, BGP sessions are sensitive to severe network congestion. It is thus important to understand the reliability of BGP in congested networks, for the purposes of system reliability evaluation and fail...

متن کامل

Understanding BGP Session Robustness in Bandwidth Saturation Regime

The reliability and robustness of the Border Gateway Protocol (BGP) play very important roles in achieving highly stable and prompt Internet data communication. The present BGP uses TCP/IP to exchange routing control information. These routing control messages are usually not differentiated from the normal data packets in Internet packet forwarding, and this makes BGP sensitive to severe networ...

متن کامل

Status of this Memo BGP Session Security Requirements

The document "BGP security requirements" (draft-ietf-rpsec-bgpsecrec) specifies general security requirements for BGP. However, specific security requirements for single BGP sessions, i.e., the connection between two BGP peers, are only touched on briefly in the section "transport layer protection". This document expands on this particular aspect of BGP security, defining the security requireme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences

سال: 2016

ISSN: 1226-4717

DOI: 10.7840/kics.2016.41.2.238