A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
Our implementation of AS-TRUST scheme using publicly available BGP traces demonstrates: (1) the number of ASes involved in violating the BGP behavioral assumptions is significant, and (2) the proposed ... AS-TRUST quantifies trust using the notion of AS reputation. To compute reputation, AS-TRUST analyzes updates received in the past. ... Conclusions In this paper we presented AS-TRUST, a reputation-based trust quantification scheme with respect to the adherence of an AS to the three behavioral assumptions of BGP. ...doi:10.1007/978-3-642-21599-5_20 fatcat:vqy6zzdl4zhnvhqhazkxtcs2nm
For it to provide comprehensive security guarantees, it requires that all Autonomous Systems (ASes) in the Internet to adopt the scheme and participate in signature additions and verifications in BGP messages ... Several BGP security proposals have been presented in the literature; however, none has been adopted so far and, as a result, securing BGP remains an unsolved problem to this day. ... We define a control layer of trusted ASes that is comprised of major Autonomous Systems (ASes) in the network. ...doi:10.20381/ruor-5677 fatcat:w4ztysp4wrfntejbgqbhfvhrbi
the possibility of using such a name resolution service as a mechanism to apply access control in the future Internet. ... Now, though, at the end of the PhD journey, everything over the past six years seems so clear in my mind, and I am extremely grateful for all of the support and help I have received in this journey. ... Autonomous System (AS)). ...fatcat:pdqgsd35irhmdmoayxuz6tdndm