BGP Session Takeover Method Based on Docker
نویسندگان
چکیده
منابع مشابه
Managing BGP Routes with a BGP Session Multiplexer
This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients access to the same set of BGP feeds, BGP-Mux facilitates many applications, including: (1) scalable, real-time monitoring of BGP update feeds; (3) new routing architectures that requ...
متن کاملMeasuring and Analyzing on Effection of BGP Session Hijack Attack
Because there is no authentication mechanism used in BGP, a mis-behaving router can announce routes to any destination prefix on the Internet and even manipulate route attributes in the routing updates it sends to neighboring routers. Taking advantage of this weakness has become the fundamental mechanism for constructing prefix hijack attacks. The relation of network topology and prefix hijacki...
متن کاملBGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism in packet forwarding, BGP sessions are sensitive to severe network congestion. It is thus important to understand the reliability of BGP in congested networks, for the purposes of system reliability evaluation and fail...
متن کاملUnderstanding BGP Session Robustness in Bandwidth Saturation Regime
The reliability and robustness of the Border Gateway Protocol (BGP) play very important roles in achieving highly stable and prompt Internet data communication. The present BGP uses TCP/IP to exchange routing control information. These routing control messages are usually not differentiated from the normal data packets in Internet packet forwarding, and this makes BGP sensitive to severe networ...
متن کاملStatus of this Memo BGP Session Security Requirements
The document "BGP security requirements" (draft-ietf-rpsec-bgpsecrec) specifies general security requirements for BGP. However, specific security requirements for single BGP sessions, i.e., the connection between two BGP peers, are only touched on briefly in the section "transport layer protection". This document expands on this particular aspect of BGP security, defining the security requireme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences
سال: 2016
ISSN: 1226-4717
DOI: 10.7840/kics.2016.41.2.238