Author:
Verma Rahul Deo,Govil Mahesh Chandra,Keserwani Pankaj Kumar
Publisher
Springer Nature Singapore
Reference28 articles.
1. Murphy, S. L. (2006). BGP security vulnerabilities analysis. Internet Engineering Task Force
2. Cho, S., Fontugne, R., Cho, K., et al. (2019). BGP hijacking classification. In 2019 Network Traffic Measurement and Analysis Conference (TMA) (pp. 25–32). IEEE.
3. Pallikarakis I A Study in TCP/BGP Session Security.
4. Sanchez, O. R., Ferlin, S., Pelsser, C., Bush, R. (2019). Comparing machine learning algorithms for BGP anomaly detection using graph features. In Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks (pp. 35–41). Association for Computing Machinery.
5. Huisman, R. (2022). Securing BGP communities: design of a new RPKI object to mitigate BGP community attacks.