IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration.
Open Shortest Path First (OSPF) || 2020 || Ser-2Nutan Singh
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
An Overview of Border Gateway Protocol (BGP)Jasim Alam
BGP is the exterior gateway protocol that connects autonomous systems on the internet. It uses distance vector routing and TCP to establish connections between routers in different autonomous systems to exchange routing and reachability information. BGP messages advertise routing prefixes, paths, and policies between autonomous systems. Routers maintain BGP routing tables containing routes and their attributes to determine the best paths for traffic. As the number of autonomous systems and routing entries has increased, challenges around scaling the routing system remain an area of ongoing work.
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration.
Open Shortest Path First (OSPF) || 2020 || Ser-2Nutan Singh
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
The document provides an overview of the Border Gateway Protocol (BGP). It begins with general information about BGP, including that it is used for routing between autonomous systems and is classified as a path vector routing protocol. It then covers BGP theory in detail over several sections, explaining concepts like neighbors, messages, states, attributes and more. The document aims to provide thorough theoretical understanding needed to implement BGP in a lab.
Border Gateway Protocol (BGP) is the routing protocol that controls how data routes between autonomous systems on the Internet. It works by maintaining a table of IP network prefixes and their accessibility between networks. BGP allows for fully decentralized routing and is used internally by gateways to determine the best route to a given destination network. There are two types of BGP sessions - internal BGP (iBGP) for intra-autonomous system routing and external BGP (eBGP) for inter-autonomous system routing. BGP uses messages like OPEN, UPDATE, KEEPALIVE and NOTIFICATION to establish and maintain sessions between routers to exchange routing information.
An Overview of Border Gateway Protocol (BGP)Jasim Alam
BGP is the exterior gateway protocol that connects autonomous systems on the internet. It uses distance vector routing and TCP to establish connections between routers in different autonomous systems to exchange routing and reachability information. BGP messages advertise routing prefixes, paths, and policies between autonomous systems. Routers maintain BGP routing tables containing routes and their attributes to determine the best paths for traffic. As the number of autonomous systems and routing entries has increased, challenges around scaling the routing system remain an area of ongoing work.
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
There are two main types of routing protocols: distance vector protocols like RIP and IGRP that determine the best path based on hop count and send the full routing table, and link state protocols like OSPF and IS-IS that advertise link information to build a shared topology database and converge faster. EIGRP is a hybrid protocol that behaves like a distance vector protocol. Interior routing protocols like these are used within an autonomous system, while exterior protocols like BGP route between autonomous systems.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
This document discusses advanced topics related to BGP routing protocols. It covers scaling iBGP to large networks using techniques like route reflectors and confederations. Route reflectors allow a network to be divided into clusters with designated routers reflecting routes between clusters, reducing the full iBGP mesh. This improves scaling by lowering configuration and resource overhead on each router. The document also examines how iBGP and the BGP decision process interact with the IGP to determine optimal routes and influence traffic flow.
BGP is an exterior gateway protocol that exchanges routing and reachability information between autonomous systems on the Internet. It makes routing decisions based on configured network policies and paths. As the routing protocol of the Internet, BGP is robust and scalable, connecting multiple private networks and autonomous systems globally.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
The document provides information about Border Gateway Protocol (BGP). It discusses BGP basics including terminology, protocol operation, message types, and configuration of BGP peers. Specific topics covered include BGP neighbor and peer relationships, route attributes, and route advertisement between autonomous systems.
RIP (Routing Information Protocol) is a distance-vector interior gateway protocol that uses hop count as its routing metric. It works by having routers periodically share their full routing tables with neighbors every 30 seconds. RIP has a maximum hop count of 15 and routes exceeding this are considered unreachable. While simple to implement, RIP has limitations in scalability and slow convergence for large networks.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
BGP is an inter-AS routing protocol used to exchange routing and reachability information between autonomous systems on the internet. It uses path vector routing rather than distance vector, and carries richer metric information than IGPs. BGP configurations establish neighbor relationships between routers in different ASes to exchange routing updates.
The document discusses Access Control Lists (ACLs), which are lists of permit or deny rules that control what traffic can enter or leave a router's interface. There are standard ACLs, which filter traffic based only on the source IP address, and extended ACLs, which can filter traffic based on additional attributes like destination address, protocol, and port numbers. ACL rules are evaluated sequentially, with an implicit "deny all" rule at the end, so ACLs should be placed strategically to filter traffic close to either its source or destination.
This document discusses the network layer and IP protocol. It begins by explaining the key functions of the network layer, including forwarding, routing, and connection setup in some network architectures. It then explains the differences between virtual circuit and datagram networks, as well as the forwarding and routing processes. The document outlines the chapter and describes the IP datagram format and functions of the IP, ICMP, and routing protocols. It also provides details about router architecture and functions.
A router is a networking device that forwards data packets between computer networks. It is connected to at least two networks, commonly two LANs or WANs, or a LAN and its ISP's network. Routers perform traffic directing functions and use routing protocols to determine the best path for data packet delivery on the Internet. There are different types of routers including wired, wireless, edge, core, and virtual routers that serve various functions in private networks and across the public internet.
This document discusses routing protocols for mobile ad-hoc networks (MANETs). It introduces several routing protocols including proactive (table-driven) protocols like Destination-Sequenced Distance Vector (DSDV), reactive (on-demand) protocols like Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), and hybrid protocols like Zone Routing Protocol (ZRP) that use both proactive and reactive approaches. For each protocol, it provides a brief overview of the routing approach and algorithm. It also compares the characteristics of proactive, reactive and hybrid routing protocols.
Numerology in the context of 5G refers to the configuration of waveform parameters for OFDM-based subframes having different subcarrier spacing and symbol time. The 5G NR radio frame is defined in units of 10ms with subframes of 1ms, and slots of 14 OFDM symbols with a time interval depending on subcarrier spacing. Subcarrier spacing in 5G NR is specified as 15x2^n kHz, where n can be 0, 1, 2, 3, or 4, defining spacings of 15, 30, 60, 120, and 240 kHz, and may also include negative values like 7.5 kHz and 3.75 kHz.
RAMPAGE is a web-based tool that utilizes Ramachandran plot analysis to evaluate protein structure models. It takes a protein structure file as input, generates a Ramachandran plot showing residues in favored, allowed, and outlier regions, and analyzes what percentage of residues fall into each region to validate the model. The tool is useful for evaluating protein models generated by computational structure prediction tools.
The Border Gateway protocol (BGP) is the routingProtocolused to route internet
trafficbetweendifferentautonomous system. BGP isdividedinto the Internal Border Gateway Protocol (iBGP)
and External Border Gateway Protocol (eBGP). Internet Service Provider (ISP) runsInternal Border Gateway
Protocol to distribute inter domainrouting information amongtheir Border Gateway Protocol routers. There are
some issues in Border Gateway Protocol, whichincludei BGP scalability ,Routing table growth , Loadbalancing,
Security, etc. In thispaper, efforts are put on investigation scalability issues of iBGP. Issuesrelated to scalability
and theirimprovements are alsodiscussed.
The document discusses the Border Gateway Protocol (BGP), which is used to exchange routing information between autonomous systems on the Internet. It begins by explaining that BGP allows for flexible connections between autonomous systems using arbitrary topologies. It then describes some key characteristics of BGP, including that it exchanges reachability information between systems rather than full routing tables, and considers the Internet a graph of autonomous systems. The document goes on to explain BGP attributes and functions in selecting routes.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
There are two main types of routing protocols: distance vector protocols like RIP and IGRP that determine the best path based on hop count and send the full routing table, and link state protocols like OSPF and IS-IS that advertise link information to build a shared topology database and converge faster. EIGRP is a hybrid protocol that behaves like a distance vector protocol. Interior routing protocols like these are used within an autonomous system, while exterior protocols like BGP route between autonomous systems.
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
This document discusses advanced topics related to BGP routing protocols. It covers scaling iBGP to large networks using techniques like route reflectors and confederations. Route reflectors allow a network to be divided into clusters with designated routers reflecting routes between clusters, reducing the full iBGP mesh. This improves scaling by lowering configuration and resource overhead on each router. The document also examines how iBGP and the BGP decision process interact with the IGP to determine optimal routes and influence traffic flow.
BGP is an exterior gateway protocol that exchanges routing and reachability information between autonomous systems on the Internet. It makes routing decisions based on configured network policies and paths. As the routing protocol of the Internet, BGP is robust and scalable, connecting multiple private networks and autonomous systems globally.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
The document provides information about Border Gateway Protocol (BGP). It discusses BGP basics including terminology, protocol operation, message types, and configuration of BGP peers. Specific topics covered include BGP neighbor and peer relationships, route attributes, and route advertisement between autonomous systems.
RIP (Routing Information Protocol) is a distance-vector interior gateway protocol that uses hop count as its routing metric. It works by having routers periodically share their full routing tables with neighbors every 30 seconds. RIP has a maximum hop count of 15 and routes exceeding this are considered unreachable. While simple to implement, RIP has limitations in scalability and slow convergence for large networks.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
BGP is an inter-AS routing protocol used to exchange routing and reachability information between autonomous systems on the internet. It uses path vector routing rather than distance vector, and carries richer metric information than IGPs. BGP configurations establish neighbor relationships between routers in different ASes to exchange routing updates.
The document discusses Access Control Lists (ACLs), which are lists of permit or deny rules that control what traffic can enter or leave a router's interface. There are standard ACLs, which filter traffic based only on the source IP address, and extended ACLs, which can filter traffic based on additional attributes like destination address, protocol, and port numbers. ACL rules are evaluated sequentially, with an implicit "deny all" rule at the end, so ACLs should be placed strategically to filter traffic close to either its source or destination.
This document discusses the network layer and IP protocol. It begins by explaining the key functions of the network layer, including forwarding, routing, and connection setup in some network architectures. It then explains the differences between virtual circuit and datagram networks, as well as the forwarding and routing processes. The document outlines the chapter and describes the IP datagram format and functions of the IP, ICMP, and routing protocols. It also provides details about router architecture and functions.
A router is a networking device that forwards data packets between computer networks. It is connected to at least two networks, commonly two LANs or WANs, or a LAN and its ISP's network. Routers perform traffic directing functions and use routing protocols to determine the best path for data packet delivery on the Internet. There are different types of routers including wired, wireless, edge, core, and virtual routers that serve various functions in private networks and across the public internet.
This document discusses routing protocols for mobile ad-hoc networks (MANETs). It introduces several routing protocols including proactive (table-driven) protocols like Destination-Sequenced Distance Vector (DSDV), reactive (on-demand) protocols like Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), and hybrid protocols like Zone Routing Protocol (ZRP) that use both proactive and reactive approaches. For each protocol, it provides a brief overview of the routing approach and algorithm. It also compares the characteristics of proactive, reactive and hybrid routing protocols.
Numerology in the context of 5G refers to the configuration of waveform parameters for OFDM-based subframes having different subcarrier spacing and symbol time. The 5G NR radio frame is defined in units of 10ms with subframes of 1ms, and slots of 14 OFDM symbols with a time interval depending on subcarrier spacing. Subcarrier spacing in 5G NR is specified as 15x2^n kHz, where n can be 0, 1, 2, 3, or 4, defining spacings of 15, 30, 60, 120, and 240 kHz, and may also include negative values like 7.5 kHz and 3.75 kHz.
RAMPAGE is a web-based tool that utilizes Ramachandran plot analysis to evaluate protein structure models. It takes a protein structure file as input, generates a Ramachandran plot showing residues in favored, allowed, and outlier regions, and analyzes what percentage of residues fall into each region to validate the model. The tool is useful for evaluating protein models generated by computational structure prediction tools.
The Border Gateway protocol (BGP) is the routingProtocolused to route internet
trafficbetweendifferentautonomous system. BGP isdividedinto the Internal Border Gateway Protocol (iBGP)
and External Border Gateway Protocol (eBGP). Internet Service Provider (ISP) runsInternal Border Gateway
Protocol to distribute inter domainrouting information amongtheir Border Gateway Protocol routers. There are
some issues in Border Gateway Protocol, whichincludei BGP scalability ,Routing table growth , Loadbalancing,
Security, etc. In thispaper, efforts are put on investigation scalability issues of iBGP. Issuesrelated to scalability
and theirimprovements are alsodiscussed.
The document discusses the Border Gateway Protocol (BGP), which is used to exchange routing information between autonomous systems on the Internet. It begins by explaining that BGP allows for flexible connections between autonomous systems using arbitrary topologies. It then describes some key characteristics of BGP, including that it exchanges reachability information between systems rather than full routing tables, and considers the Internet a graph of autonomous systems. The document goes on to explain BGP attributes and functions in selecting routes.
The document discusses implementing BGP, including BGP terminology, concepts, operation, neighbor relationships, and basic BGP configuration. It describes BGP as a path vector routing protocol used between autonomous systems to exchange routing and reachability information. It differentiates between external BGP which establishes relationships between routers in different autonomous systems, and internal BGP which is used within an autonomous system. Basic BGP configuration involves defining BGP neighbors, entering BGP configuration mode, and activating BGP sessions.
This summary provides the key details about the document in 3 sentences:
The document discusses security issues with the Border Gateway Protocol (BGP) and proposes a method to secure BGP using cyclic shift algorithm and secure hash algorithm-1 (SHA-1) to authenticate BGP peers and establish secure sessions. It analyzes how prefix hijacking can disrupt routing and communication. The proposed approach uses hashing of a dynamically generated key via SHA-1 to authenticate BGP peers during session establishment and secure the exchange of routing updates between trusted peers.
This report provides an introduction to the Border Gateway Protocol (BGP). It defines BGP as the protocol that manages how packets are routed across the internet through the exchange of routing information between edge routers. It explains that BGP directs packets between autonomous systems (AS) and uses routing policies to choose among multiple paths and control routing information redistribution. The report also describes the two types of BGP - external BGP (eBGP) which performs inter-AS routing, and internal BGP (iBGP) which performs intra-AS routing. It concludes that BGP has proven to be scalable and effective for managing and exchanging routing information within and between autonomous systems on the internet.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the four port router for network on chip using the latest verification methodologies, Hardware Verification Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three output ports and one input port, it is packet based Protocol. This Design consists Registers and FIFO. For larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized timemultiplexed approach was used. Compared to the provided software reference implementation, our direct-mapped approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude speedup, depending on the network and router configuration.
Cube2012 high capacity service provider design using gpmls for ip next genera...Ashish Tanwer
The document discusses the design of a high capacity service provider network using Generalized Multiprotocol Label Switching (GMPLS) for next generation IP networks. It outlines the internal architecture of the service provider including the use of BGP confederations, virtual routing and forwarding instances (VRFs), route targets, and route distinguishers to optimize routing. It also describes different GMPLS topology models and considers hardware designs from Cisco, Juniper, and Ciena to support latest protocols, security, and scalability.
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WANijdpsjournal
Routing 1protocols determines the shortest path to transfer the data from one host to another and specify
how communication takes place between each routers. There are different classes of routing protocols are
available in different environments such as intra and inter Autonomous System (AS).A routing protocol can
be static or dynamic as well as link state and path vector. We will focus on Open Shortest Path First
(OSPF) and Border Gateway Protocol (BGP), OSPF and BGP protocols are dynamic in nature. BGP is an
inter-autonomous system routing protocol and OSPF is an intra-a utonomous system routing
protocol. We can analyze the performance of Wide Area Network (WAN) by enabling the Interior Gateway
Protocol (IGP) and Exterior Gateway Protocol (EGP) of the network and ensure the Quality of Service
(QoS).
The document discusses network protocols and the OSI model. It describes the 7 layers of the OSI model from the physical layer to the application layer. It then discusses the TCP/IP protocol suite and its 5 layers. For each layer, it outlines the main responsibilities and protocols that are part of that layer such as IP, ICMP, DHCP, TCP, and others. It also discusses some common routing protocols like RIP, OSPF, and BGP. Finally, it covers issues with using TCP over wireless networks and some proposed solutions to improve its performance.
BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protoco...IJORCS
This document proposes a new single routing protocol called BIGP that can function as both an interior gateway protocol (IGP) and an exterior gateway protocol (EGP). BIGP uses two algorithms - Algorithm1 for intra-autonomous system routing similar to IGPs, and Algorithm2 for inter-autonomous system routing similar to BGP. BIGP packet headers contain care bits to indicate the routing mode. Routing tables store intra- and inter-AS routing information separately to optimize path computation. The protocol aims to improve on IGP and BGP scalability and convergence issues.
This document provides a survey of security techniques for the Border Gateway Protocol (BGP). It reviews recent techniques categorized as cryptographic/attestation, database, overlay/group protocols, penalty methods, and data-plane testing. The techniques are reviewed at a high level and their shortcomings summarized to provide readers a quick understanding of the direction of research in BGP security.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document provides an overview of BGP (Border Gateway Protocol) including:
- BGP is an exterior gateway protocol used to exchange routing information between autonomous systems.
- BGP uses path vector routing to ensure loop-free paths and allows routing policies between autonomous systems.
- BGP establishes TCP connections between peers and exchanges routing updates in messages including open, keepalive, update, and notification types.
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET Journal
This document proposes an Inter Domain Packet Filter (IDPF) architecture to reduce IP spoofing on the internet. The IDPF architecture takes advantage of the limited number of feasible paths between autonomous systems (ASes) implied by their commercial relationships. It constructs packet filters based on routing information exchanged in Border Gateway Protocol (BGP) updates between neighboring ASes, without requiring global routing knowledge. Simulation studies show that even partial deployment of IDPFs can help localize the source of attack packets and limit attackers' ability to spoof IP addresses.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2Krishna Nanda
The document discusses unicast routing protocols used in the Internet, focusing on the Routing Information Protocol (RIP). It provides details on:
1) How the Internet uses hierarchical routing with interior gateway protocols (IGPs) like RIP within autonomous systems (ASes) and exterior gateway protocols like BGP between ASes.
2) Key aspects of RIP including using hop count as the routing metric, periodic routing updates, timers that control route expiration and garbage collection, and its distance-vector algorithm.
3) RIP's scalability is limited by only allowing up to 15 hops within an AS, but it has simple message formats and local updating between neighboring routers.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
This document provides an overview of the Border Gateway Protocol (BGP) which is the routing protocol that allows routers on the internet to exchange information about reachable destinations. BGP focuses on security and scalability to allow internet service providers to exchange routing information in an open environment. The document discusses how BGP enables routers to share information about hundreds of thousands of IP address prefixes and examines approaches for troubleshooting connectivity issues with BGP.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
The document discusses networking concepts like routers, switches, and protocols. It explains that routers operate at the network layer and use layer 3 addresses to transmit data between networks, while switches operate at layer 2 and use MAC addresses. It describes common routing protocols like RIP, OSPF, and BGP and how they calculate paths between networks. The document also provides configuration steps that can be taken to secure routers and switches, such as applying vendor patches and disabling unnecessary routing updates.
Similar to Solution against BGP vulnerabilities (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
1. The document describes a study that designed a balanced scorecard for a nonprofit organization called Yayasan Pembinaan dan Kesembuhan Batin (YPKB) in Malang, Indonesia.
2. The balanced scorecard translated YPKB's vision and mission into strategic objectives across four perspectives: financial, customer, internal processes, and learning and growth.
3. Key strategic objectives included donation growth, budget effectiveness, customer satisfaction, reputation, service quality, innovation, and employee development. Customers perspective had the highest weighting, suggesting a focus on public service over financial growth.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
- The document examines customer experience in supermarkets and hypermarkets in India through a survey of 418 customers.
- It finds that in supermarkets, previous experience, atmosphere, price, social environment and experience in other channels most influence customer experience, while in hypermarkets, previous experience, product assortment, social environment and experience in other channels are most influential.
- The study provides insights for retailers on key determinants of customer experience in each format to help them improve strategies and competitive positioning.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
This document discusses the implementation of quality management principles at Zimbabwe Open University's Matabeleland North Regional Centre. It begins with background information on ZOU and the importance of quality management in open and distance learning institutions. The study aimed to determine if quality management and its principles were being implemented at the regional centre. Key findings included that the centre prioritized customer focus and staff involvement. Decisions were made based on data analysis. The regional centre implemented a quality system informed by its policy documents. The document recommends ensuring staffing levels match needs and providing sufficient resources to the regional centre.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 17-25
www.iosrjournals.org
DOI: 10.9790/0661-17351725 www.iosrjournals.org 17 | Page
Solution against BGP vulnerabilities
Praveen Mandloi, Praveen Kaushik
Dept. of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India
Dept. of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India
Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing information
among Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any security
mechanism, so it is weak to provide security for AS path, verification of AS number ownership as well as
network prefix. Due to lack of security measures, BGP remains vulnerable to various types of misconfiguration
and attacks.
The objective of this paper is to introduce BGP, to present its current vulnerabilities of inter-domain routing
system, to survey some proposed solution for securing BGP and also propose a solution that will overcome
almost all vulnerabilities regarding BGP. We use x.509 certificates for authentication of address space and
BGP speaker. IPsec is also applied for creating secure communication between BGP speakers.In our proposal,
we first authenticate BGP speaker after verifying its certificate, if the certificate is valid then only BGP session
is established. In our analysis we found that our proposed solution has very low computational cost, reduction
of memory requirement at BGP speaker in comparison to other proposals.
Keywords: BGP, x.509v3 certificate, IPsec, MD5, and SHA-1.
I. Introduction
Internet is a collection of networks. While surfing over Internet, user desire service provided by server
somewhere in the Internet. To provide service data must be routed from user’s end to the server. In Internet,
part of network under single administration is called an Autonomous system (AS). Local routing (with respect to
user) infrastructure provides support within a domain and cannot provide complete route for data. All these local
networks exchange their routing information to create a complete path between user and server. This routing
information is exchanged with the help of BGP.
Today, an Internet can be so large that one routing protocol cannot handle the task of updating routing
table of all routers. For this reason, Internet is divided into Autonomous System (AS). Routing is classified into
two categories: Intra-domain routing and Inter-domain routing. Routing within an AS i.e. local AS is called
Intra-domain routing eg. OSPF, RIP. Routing outside AS i.e. with different AS is called Inter-domain routing
eg. BGP.
BGP [6, 7] design did not include security measures against intentional or coincidental errors that could
disrupt routing behavior. Due to lack of security mechanism BGP is vulnerable to various kind of attacks[18].
BGP messages exchanged between BGP peers are sent in plain text. An intruder can alter, forge or replay BGP
packets.Also he can insert bogus routing information that will contaminate complete routing behavior by
advertising a prefix that he do not own, he can alter the AS_PATH mentioned in the UPDATE.Various kinds of
attacks are: attack against confidentiality, integrity, DOS, replay attack, prefix hijack etc.Cryptographic
techniques, certificate attestation, use of shared secret key and many more solutions have been proposed. But
unfortunately none of them worked well. Secure BGP (S-BGP) proposed by Kent is most reliable proposal till
date.
This paper is organized as follows. In section II, we provide a brief overview of BGP, various kinds of
BGP messages and there header format. In section III, we discuss various types of attacks due to lack of security
mechanism. Section IV, describes how attack can be implemented by an intruder by advertising a prefix that it
does not own. Section V, provides summary of work done so far on securing BGP. Section VI contains our
proposed work for securing BGP. Analysis of proposed work is mentioned in section VII.
Section VIII has concluded this paper.
II. BGP Overview
BGP version 4 is current version of BGP. Routers running BGP are called BGP speakers. The primary
function of BGP is to exchange network layer reachability information (NLRI) with other BGP speakers. BGP
uses TCP [11] as its transport protocol. Routing information is exchanged by BGP speakers via UPDATE
messages. BGP does not provide any authentication or integrity checking mechanism for UPDATE message that
are received. No mechanism is provided by BGP to check whether NLRI information announced by AS is
authorized to announce or not. BGP provides no way to ensure that the AS’s in the AS_PATH are legitimate.
2. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 18 | Page
BGP believes whatever information is received is true, which cause vulnerabilities. BGP UPDATE message
either advertises a feasible route or a withdrawn route. BGP speaker change routing table according to the
UPDATE message. Since there is no checking mechanism any faulty or misconfigured source can inject bogus
information. The received bogus information is sent to BGP peers who can disrupt complete routing behavior.
BGP header format is as follows:
Fig 1: BGP header format (Source: RFC 4271)
Marker:This is 16 bytes field. It must be set to all 1’s.
Length:This is 2 bytes field. This field indicates total length of message including header in bytes.
Type:This is 1 byte field. Type indicates type of message.
Type Message
1 OPEN
2 UPDATE
3 NOTIFICATION
4 KEEP-ALIVE
BGP’s smallest message size is 19 bytes and maximum message size is 4096 bytes. All BGP messages
have fixed size header of size 19 bytes. There are four types of BGP control messages: OPEN, KEEP-ALIVE,
NOTIFICATION and UPDATE.
OPEN message:
After TCP connection is established by BGP peers, first message sent by each side is an OPEN
message. If OPEN message is satisfactory a KEEP-ALIVE message is sent as an acknowledgement.
Fig 2: OPEN message format(Source: RFC 4271)
Version:This field is of 1 byte. Current version of BGP is version 4.
My Autonomous system:This field is of 2 bytes. This field mentions AS number of sender.
Hold time:This field is of 2 bytes. This value indicates maximum number of seconds that may elapse between
receipts of successive UPDATE or KEEP-ALIVE message.
BGP Identifier:This field is of 4 bytes. IP address of BGP speaker is BGP identifier.
Optional parameter length:This field is of 1 byte and indicates length of Optional parameter length field in
bytes.
Optional parameter:This field is of variable length. This field contains list of Optional parameter.
UPDATE message:
UPDATE messages are exchanged only if there is change in the topology, i.e. either the route is
withdrawn or a feasible route is advertised.
3. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 19 | Page
Fig 3: UPDATE message format(Source: RFC 4271)
Withdrawn route length:This field is of 2 bytes. This field indicates length of withdrawn routefield in bytes.
Withdrawn routes:This field is of variable length. This field contains IP prefixfor the routes that is being
withdrawn.
Total path attribute length:This field is of 2 bytes.This field contains total length of path attribute field in
bytes.
Path attributes: This field is of variable length. When an UPDATE message is sent by a BGP speaker to its
peer it prepends its AS number in this field, which forms a chain of AS number that is the path for that IP prefix.
Network Layer Reachability Information:This variable length field contains list of IP address prefix.
KEEP-ALIVE message:
This message is to inform other BGP peer that other BGP peer is still alive and reachable. A KEEP-
ALIVE message must be exchanged before expiration of hold time mentioned in OPEN message. Size of
KEEP-ALIVE message is 19 bytes. It contains only BGP header. BGP header is shown above.
NOTIFICATION message:
Notification message are sent if there is any error in BGP session. After sending Notification message
BGP connection is terminated immediately.
Fig 4: NOTIFICATION message format (Source: RFC 4271)
Error code:This 1 byte field indicate type of NOTIFICATION.
Error sub-code: This 1 byte field indicate more specified reason for the NOTIFICATION.
Data:This variable field is used to know the reason for getting NOTIFICATION.
Before exchanging updates, BGP speaker establishes connection with BGP peer. Firstly it performs 3
way handshaking with other BGP peer. After handshaking both BGP peers exchange OPEN message, if OPEN
message is acceptable a KEEP-ALIVE message is sent in response as an acknowledgement. Once both sides
have received KEEP-ALIVE message, BGP session gets established. If routes are withdrawn or feasible routes
are found then BGP peer sends an UPDATE message. Otherwise KEEP-ALIVE messages are exchanged
between BGP peers. When an error occurs NOTIFICATION message is sent and BGP session is terminated.
III. BGP Security Issues
Since there is no security mechanism provided by BGP, BGP is vulnerable to various kinds of attack [8, 10].
a) Attack against confidentiality:
Data that is exchanged between two parties should not be known to third person. If the information is
known to someone else, data exchanged is not confidential. Information exchanged between BGP peers is in
plain text. Eavesdropping on the message stream disclose information.
b) Attack against integrity:
Data exchanged should not be modified by someone else in between during transmission. It should be
received in same way as it was sent. Modification in the information is attack against integrity. If the
information gets modified routing information will become inconsistent.
4. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 20 | Page
c) Prefix hijack:
An AS announces itself as originator of the prefix that it does not own. As the bogus path propagates,
some AS will route data to hijacker instead of legitimate host.
d) Path spoofing attack:
Path spoofing attacks are initiated by malicious agent. Path spoofing attack occurs when AS palaces
itself in AS_PATH that it does not announce, and makes the path invalid. This causes legitimate traffic to pass
through that AS.
e) Denial of Service:
Making resources unavailable to its intended users is DOS attack. Bogus routing information will never
lead data to reach its end system.
f) Replay attack:
Sending captured messages after some time interval to receiving host is replay attack. Receiver of
message thinks as if this is new message coming from a legitimate host. BGP has no mechanism to differentiate
between messages. Previous UPDATE messages can be resent by an intruder causing link to be withdrawn
which is currently working.
IV. Motivational Work
As BGP does not provide any means to authenticate BGP speaker nor there is any means to verify if the
prefix that is announced is legitimate or not. An intruder can generate an UPDATE for a particular IP prefix that
it does not own or an intruder can alter the AS_PATH. Both can contaminate complete routing behaviour. If an
altered UPDATE message is received and routing is updated according to the UPDATE many kind of attacks can
be implemented.
If an AS announces an IP prefix that it does not own, BGP peers accept that UPDATE message and
make changes according to the UPDATE and send the same UPDATE to its own peers after appending there AS
number in the AS_PATH. Most of the BGP speakers will use the same incorrect path for forwarding the packets
to particular IP prefix. Since the origin is not the owner of IP prefix and cannot deliver the packets to the actual
owner.
An intruder can also alter the AS_PATH, they can introduce their AS number in the AS_PATH and
make the UPDATE invalid. As the UPDATE is traversed all the BGP speakers will use the same path as
mentioned in UPDATE. While sending data to particular destination, data is forwarded to intruder. An intruder
can alter or read the messages, the packets may even be dropped and not reach its destination.
Now we will see how above mentioned attack is implemented: Below shown is the arrangement of a
network. AS1, AS2, AS3, AS4 are the AS with their respective AS numbers. IP prefixes they own are also
mentioned corresponding to each AS. Each BGP speaker will create a TCP session with neighbouring BGP
speakers. After exchanging OPEN messages and KEEPALIVE in response, UPDATE messages are exchanged.
Fig 5: AS’s connected to each other
Routing table for AS1 will be:
IP prefix AS_PATH
8.0.0.0/8 AS1
9.0.0.0/8 AS1 AS2
7.0.0.0/8 AS1 AS2 AS3
6.0.0.0/8 AS1 AS2 AS3 AS4
5. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 21 | Page
Routing table for AS3 will be:
IP prefix AS_PATH
8.0.0.0/8 AS3 AS2 AS1
9.0.0.0/8 AS3 AS2
7.0.0.0/8 AS3
6.0.0.0/8 AS3 AS4
If everything goes well this routing table will remain consistent. But suppose if AS 4 gets compromised
and it start advertising its IP prefix as 8.0.0.0/8 instead of 6.0.0.0/8 then how routing table is changed and how
attack is performed.
Fig 5: AS’s connected with false advertisement
Routing table for AS3:
IP prefix AS_PATH
8.0.0.0/8 AS4
9.0.0.0/8 AS3 AS2
7.0.0.0/8 AS3
As we can see AS_PATH corresponding to 8.0.0.0/8 has changed from AS3 AS2 AS1 to AS4. When
AS3 BGP speaker receives UPDATE corresponding to 8.0.0.0/8 it compares length of AS_PATH. Since length
of AS4 is smaller than AS3 AS2 AS1, it updates its routing table with AS4. But AS4 is not authorized to
advertise the IP prefix 8.0.0.0/8 and also packets that should be delivered to AS1 which is actual owner of that
prefix will never receive those packets.
V. Related Work
Several researches have been made to propose a solution for securing BGP. This section discusses
various security proposals and their drawbacks. Several security mechanisms can be classified as: Cryptographic
techniques, certificate and attestation, use of shared secret key and many more.
1. Cryptographic techniques:
Cryptography is applied most often in BGP. Confidentiality, integrity and entity authentication are
achieved using cryptography.
a) Cryptographic hash function:
Cryptographic hash function compute a fixed length hash value from an input text and form the
compressed message known as message digest. The most common hash functions in use are Message Digest
Algorithm 5 (MD5) [9] and Secure Hash Algorithm 1 (SHA1) [12]. It is computationally infeasible to find input
from message digest and also it is infeasible to find two different inputs having same hash value. Originator of
message creates message digest from message and send message and message digest as well to the receiver.
Receiver computes message digest on message using same algorithm as that of sender and verifies both the
message digests, if they are same message is accepted and message integrity is verified. Security against entity
authentication, prefix hijack and replay attack are not achieved using cryptographic hash function.
b) Message Authentication Code (MAC):
Secret key is required for computing MAC. MAC [13] is generated by computing a function that takes
input i.e. message and secret key, and outputs a tag. The party receiving the message who has knowledge of the
secret key will be able to compute the same function and verify whether the generated MAC matches the one
that was sent. Integrity and Entity authentication are achieved using MAC. Prefix hijack and replay attack are
not achieved using MAC.
6. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 22 | Page
c) Public key cryptography:
Asymmetric or public key cryptography (PKC) is used in many security solutions. Message
confidentiality is achieved using encryption. Cipher text is generated with help of public key of message
recipient. Only the AS with corresponding private key can decrypt the message. Integrity is achieved using
digital signature. Entity authentication is also ensured because the message can only be decrypted using private
of the recipient. Prefix hijack and replay attack cannot be prevented using public key cryptography.
Below shown is the table comparing above proposed algorithms and ensuring which attacks can be
overcome using this approach.
Security
mechanism
Integrity Entity
authentication
Prefix
hijack
Replay
attack
Hash
Function
Yes No No No
MAC Yes Yes No No
PKC Yes Yes No No
2. Certificate and attestation:
Certificates are provided in hierarchical manner. PKI’s are strict hierarchies rooted at ICANN. Roots of
PKI are natural trusted authorities for AS number i.e. Internet Assigned Number Authority (IANA) or Internet
Corporation of Assigned Numbers and Names (ICANN). They provide certificate to Routing Information
Registries (RIR), which further provide certificate to Internet Service Providers (ISP) and then to user. Proposed
solutions using certificate and attestation are discussed below:
Term Description
Org1_x 1st
tier organization (A registry)
Org2_x 2nd
tier organization (An ISP or DSP)
Org3_x 3rd
tier organization (A DSP or user)
Fig 6: Address allocation PKI structure.
Term Description
Registry n DNS name of a registry.
Org m DNS name of ISP/DSP/Organization m
AS x DNS name of AS x
Fig 7: Autonomous system identification
7. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 23 | Page
Public Key Infrastructure (PKI) Certificate: PKI’s are based on X.509v3 [14] certificates. PKI [15] is a
model for creating, distributing and revoking certificate. PKI is a storage place for private key of those members
that need to hold their private keys safe. This is used to authenticate data by approving the identity of BGP
speaker.
a) Secure BGP(S-BGP):
Kent proposed Secure BGP(S-BGP)[1] for both origin authentication and path authentication. S-BGP
contains three major components: PKIs, Attestation and IPsec.
PKI’s are same as discussed above.Owner of IP prefixes signs using Address attestation certificate and
when an UPDATE is sent to other BGP peers, it prepends it’s AS number in AS_PATH and signs the message
using Route attestation certificate. Address attestation is used to authenticate address allocation. Route
attestation is used to authenticate AS in an AS_PATH. All UPDATE messages sent by BGP peers are signed
using associated private key. IPsec is used to provide protection of BGP sessions. Each UPDATE receiving end
has to verify all the route attestations and address attestation before accepting the UPDATE message. If
everything is found correct, changes are made in routing table.
Still there are some limitations of S-BGP. Route attestation must be performed for every update that
passes through the AS. At the end, the receiver has to verify all the AS that are mentioned in the AS_PATH and
also verify origin. This process of signing and verifying has high computational cost.
b) Secure origin BGP (so-BGP):
so-BGP [2] also aims to provide both origin authentication and path authentication. so-BGP proposes
use of centralized hierarchical PKI for IP prefix ownership and decentralized model for AS number
authentication. Hierarchical PKI for so-BGP is same as that of S-BGP. For IP prefix ownership AS attach its
Address attestation certificate, which is verified by other BGP peers to check whether originating AS is
authorized to announce the IP prefix or not and for path authentication, so-BGP builds a topology map of the
paths of entire network. After receiving route announcement, the speaker verifies the announced AS path with
the topology.
so-BGP does not provide strong protection as S-BGP. It is not able to catch an AS path falsification.
c) Inter-domain Route Validation:
Inter-domain Route Validation (IRV)[3] combines features of S-BGP and Internet routing registries.
Address attestation and route attestation are not sent along with the update message. Each AS provide IRV
server. After receiving an UPDATE message, receiving AS can query originating AS to authenticate received
route. AS mentioned in AS_PATH are also queried if they have received this advertised message and if they
have received this, from which AS they have received and forwarded to which AS.
Are query and response are authenticated? How will the response be validated? Are query and response
unaltered? These issues are not specified by IRV. Also additional overhead lies because of query and response
with particular AS.
Previously
proposed
work
Integrity Prefix
hijack
Path
spoofing
Computational
cost
S-BGP Yes Yes Yes High
so-BGP Yes Yes No Moderate
IRV Yes Yes Yes High
3. Some more proposals:
Key chain based signatures and use of private key are other proposed solutions for securing BGP.
a) Keychain Based Signatures:
In KC-x [4], every BGP speaker generates a temporary key pair i.e. public and private key. A BGP
speaker authorizes its next hop speaker. It passes its private key to next BGP speaker in plain text. In Keychain
based signature, each BGP speaker signs the UPDATE message with temporary private key of preceding
speaker that is received rather than its own private key. The UPDATE message and public key ofa BGP speaker
are signed by its previous BGP speaker’s private key that was received. The above idea forms a chain of
authorization. The only exception is that the originating speaker does not receive any private key so it encrypts
the message using its own private key that is authenticated by PKI. Verification of UPDATE message is done by
using temporary public key of all previous speakers that are mentioned in the UPDATE message. Upon
receiving the UPDATE the message is decrypted in the same way as it was encrypted. Initially the message is
8. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 24 | Page
decrypted by origins public key, and then BGP speaker gets the public key of BGP speaker in UPDATE
message.
b) Trust between BGP speakers with the help of Secure Private key:
It [5] creates trust between BGP speakers only one time i.e. during TCP session establishment. Instead
of distributing key in plaintext, hash code of key is generated and sent to BGP peer.BGP speaker is
authenticated with that hash code. If sent hash code matches with the hash code that is generated at the receiver
end then the secure connection is established and routing UPDATE message are exchanged. If hash code does
not match then connection not set up between BGP speakers. Cyclic key shifting algorithm is used for key
generation and SHA-1 is used for hashing of key. Once secure session is established each route update travel on
secure channel.
VI. Proposed Work
Our proposed work uses same architecture as that of S-BGP. We use x.509v3 certificate that are issued
by trusted authorities. Certificates are provided in hierarchical manner. Public Key Infrastructure’s (PKI) is
strict hierarchy rooted at Internet Corporation of Assigned Numbers and Names (ICANN) or Internet Assigned
Number Authority (IANA). They provide certificate to Routing Information Registries (RIR), which further
provide certificate to Internet Service Providers (ISP) and then to user. These certificates namely address
attestation certificate and route attestation certificate are used for entity authentication by approving the identity
of BGP speaker.S-BGP sends one address attestation certificate and route attestation certificate equal to number
of AS in AS_PATH for each UPDATE. Reducing number of route attestation certificate with each UPDATE
message can reduce computational cost and time.
In this paper, we aim to propose a method through which we can reduce computational cost of S-BGP.
We propose not to send route attestation certificate with the UPDATE message, only address attestation
certificate is to be sent. Route attestation certificate is used to authenticate BGP speaker at the time of BGP
session establishment. Valid route attestation certificate leads to BGP session establishment else the session
won’t be established. Now since only those BGP speakers are connected that are legitimate and hold route
attestation certificate, only address attestation certificate is needed to be attested with the UPDATE message.
This reduces number of route attestation certificate and also reduces computation cost to great level.
BGP session establishment process is mentioned above. While sending OPEN message, route
attestation certificate is to be sent and verified by receiving BGP speaker, and then in response to valid route
attestation certificate, KEEP-ALIVE message should be sent. This establishes BGP session with legitimate BGP
speaker, now only receiving speaker has to verify address attestation certificate for each UPDATE message.
Using this approach the time required to verify attestation certificate for each UPDATE is reduced to great
extent. Only one certificate is to be verified for each UPDATE.
We use IPsec at network layer for security of BGP message. BGP is transported over TCP and is thus
protected against disordered, lost or replayed packet. We use the Encapsulating Security Payload (ESP) protocol
for maintaining integrity, authentication and anti-replay of BGP message. ESP header contains sequence number
field that is used to avoid replayed packets.
VII. Analysis
Following an IETF standards action in November 2006, the Internet Assigned Numbers Authority
(IANA) has extended the AS Number field to 32 bits in size, increasing the pool size from 65536 to
4,294,967,296 values [16]. There are about 69,638 AS till date 07th
April 2015 [16, 17]. An X.509 certificate used
in this environment is about 450 bytes long.
Assuming a network arrangement and analysing efficiency of the proposed protocol and S-BGP.
Fig 8: AS’s connected to each other
Assuming:
i. Size of UPDATE message is 100 bytes.
ii. Size of address attestation certificate is 30 bytes.
iii. Size of route attestation certificate is 30 bytes.
AS1 advertise an UPDATE for address prefix say 8.0.0.0/8 to its peer AS2. UPDATE message has
message, address attestation and route attestation certificate attached. The same UPDATE is advertised by AS2 to
AS3 and by AS3 to AS4 and so on till AS7. Overall there are one address attestation and five route attestation
9. Solution against BGP vulnerabilities
DOI: 10.9790/0661-17351725 www.iosrjournals.org 25 | Page
certificates. Total size of UPDATE till it reaches AS7 is 280 bytes. To send UPDATE of size 100 bytes, 280
bytes are sent. This is wastage of bandwidth and consuming high computational cost as well.
According to our proposed work, BGP session is only established only when route attestation certificate
is verified. So when an UPDATE is propagated no need to attest route attestation certificate with the UPDATE
because all the BGP speaker connected have already verified their identity. Only address attestation certificate is
to be sent with UPDATE. According to same scenario as discussed above, for each UPDATE only one address
attestation certificate is sent and no route attestation certificate is sent. Total size of UPDATE till it reaches AS7
is 130 bytes, which is less than that of S-BGP.
Now since the size of UPDATE message is reduced, the bandwidth is efficiently utilized and also the
BGP speaker receiving UPDATE does not have to verify the entire route attestation certificate which reduces
computational cost.
VIII. Conclusion
In this paper we focused on BGP’s working, vulnerabilities, how attacks can be implemented and
provided work done on BGP so far.We have seen different ways to secure BGP but using certificate attestation,
BGP can be made more secure.None of the proposed work is implemented yet in practice. S-BGP is the most
reliable proposed work till date. The only drawback of S-BGP is that it has high computational cost.
Our main purpose was to reduce high computational cost of S-BGP. The proposed solution can secure
BGP from prefix hijacking, altering AS_PATH and replay attack. Using route attestation certificate for
connection establishment reduces overhead of BGP speaker and also effectively utilizes bandwidth. Our
proposed work also uses IPsec for packet security at network layer.
References
[1]. S. Kent, C. Lynn, and K. Seo“ Secure Border Gateway Protocol (S-BGP)” IEEE JOURNAL ON SELECTED AREAS IN
COMMUNICATION, VOL. 18, NO. 4, APRIL 2000.
[2]. R. White ”Architecture and Deployment Considerations for Secure Origin BGP (so-BGP)” , IETF ID draft-white-sobgp-
architecture-02, June 2006.
[3]. G. Goodell,W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin “Working around BGP: An incremental approach to
improving security and accuracy of inter-domain routing” in Proc. ISOC NDSS’03, San Diego, CA, Feb. 2003.
[4]. Heng Yin, Bo Sheng, Haining Wang, Jianping Pan “Keychain-Based Signatures for Securing BGP” IEEE JOURNAL ON
SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 8, OCTOBER 2010.
[5]. Divan G. Raimagia, Shraddha Singh, and SameenaZafar “Trust between BGP speakers with the help of Secure Private key” 2012
NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING, NUiCONE-2012, 06-08 DECEMBER,2013.
[6]. Y. Rekhter, T. Li, S. Hares “ A Border Gateway Protocol 4 (BGP-4)” RFC 4271, January 2006.
[7]. Rekhter, Y. and T. Li, "A Border Gateway Protocol 4 (BGP-
[8]. 4)", RFC 1771, March 1995.
[9]. S. Murphy ” BGP Security Vulnerabilities Analysis” RFC 4272, January 2006.
[10]. R. Rivest, “The MD5 Message digest algorithm” RFC 1321, April 1992.
[11]. Kevin Butler, Patrick McDaniel “ A survey of BGP security and solutions” Vol. 98 No.1, Proceeding of the IEEE, January 2010.
[12]. ”Transmission Control Protocol”, RFC 793, September 1981.
[13]. ”Secure Hash Algorithm 1 (SHA1)”, RFC 3174, September 2001.
[14]. MAC [Online] Available : http://en.wikipedia.org/wiki/Message_authentication_code
[15]. x.509 [Online] Available: https://en.wikipedia.org/wiki/X.509
[16]. Public Key Infrastructure [Online] Available: https://en.wikipedia.org/wiki/Public_key_infrastructure
[17]. Regional Internet Registries Statistics [Online] Available: http://www-public.it-
sudparis.eu/~maigron/RIR_Stats/RIR_Delegations/World/ASN-ByNb.html
[18]. AS number report [Online] Available: http://www.potaroo.net/tools/asn16/
[19]. Geoff Huston, Mattia Rossi, and Grenville Armitage “Securing BGP- A Literature Survey” IEEE COMMUNICATIONS
SURVEYS & TUTORIALS, VOL. 13, NO. 2, SECOND QUARTER, 201