Serial BGP hijackers: A reproducibility study and assessment of current dynamics
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Guest Post: How to filter malicious traffic directly at the network edge, without third-party scrubbing centres.
Guest Post: Combining BGP confederations and AS override can potentially create a BGP routing loop, resulting in an indefinitely expanding AS-PATH.
Guest Post: How how a small issue with BGP routing, a deprecated path attribute, can cause a major interruption to Internet traffic.
Learning from the Cloudflare 1.1.1.1 incident.
Bgpipe, reclaiming class E space, reconsidering RPKI validation, low-latency RPKI validation, and revisiting BCP 194.
What impact would regulating BGP routing security have on the global Internet?
Doug Madory discusses RPKI, BGP, and measurement using Oregon RouteViews.
Guest Post: With BGPKIT Monocle, users can glance at routing stats for any ASN, economy, or the whole Internet or look up prefix origins and examine their RPKI validation status as well as prefix visibility on global routing tables.
Geoff Huston presented on BGP at NANOG 90 in Charlotte, North Carolina, USA from 12 to 14 February.