4 Hits in 4.7 sec

RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation

Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller
2013 USENIX Security Symposium  
For this purpose, we design and implement a highly efficient C library of the RPKI/RTR router part and the prefix origin validation scheme.  ...  It fetches and stores validated prefix origin data from an RTR-cache and performs origin verification of prefixes as obtained from BGP updates.  ...  We thank Rob Austein, Tim Bruijnzeels (RIPE NCC) and Andrew Chi (BBN) for fruitful interoperability tests with their implementations of the RPKI/RTR cache server.  ... 
dblp:conf/uss/WahlischHSS13 fatcat:qlig5zpzpbhvnpbfi5a7ybzrri

See How ISPs Care

Matthias Wählisch, Thomas C. Schmidt
2015 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication - SIGCOMM '15  
The Resource Public Key Infrastructure (RPKI) allows BGP routers to verify the origin AS of an IP prefix.  ...  It operates on live data and helps end users as well as operators to gain better insight into the Internet security landscape.  ...  Acknowledgments We would like to thank Tas Sóti and Sebastian Meiling for helping on the implementation.  ... 
doi:10.1145/2785956.2790034 dblp:conf/sigcomm/WahlischS15 fatcat:tk7vlhmhnnep7phvgcrm5hzsoy

Measuring and Implementing Internet Backbone Security [article]

Matthias Wählisch, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
In this thesis, we start from the observation that the Internet is a critical infrastructure, which needs severe protection.  ...  We take a practical view on Internet security, considering the whole ecosystem including the network, end devices, and services, protected and threatened by current and future Internet protocols.  ...  Acknowledgments Successful research is linked to passion that is shared with the community. It is not based on working in the ivory tower but on open-minded discussions with friends and colleagues who  ... 
doi:10.17169/refubium-15515 fatcat:xnnrr5rmrffbvmugq7qapdrsqe

An analysis of susceptibility in securing multifaceted Border Gateway Protocol (BGP)

Kyoungha Kim
The Border Gateway Protocol (BGP), which is an inter-domain routing protocol, does not validate the origin and path information that are used to form BGP networks, resulting in many BGP-routing accidents  ...  The Resource Public Key Infrastructure (RPKI ) and BGPsec are remarked as solutions to provide the Origin Validation and Path Validation into BGP.  ...  C library that implements the RPKI /RTR protocol.Wählisch et al.[139]observe that most invalidIn other words, RTRPKI will first synchronize itself with an associated RTRlib cache server in its life cycle  ... 
doi:10.13016/m25j7c fatcat:fai4yvlotfgj3nemlondfndvd4