Fortunately, we will have a huge library of BGP Hijacking presentations, talks, & tutorials. Many of these talk about the routing risk and how to mitigate the risk from human mistakes. BGP Hijacking overview. Routing incidents prevention and defense mechanisms. (Updated) from NOCTION provides a good summary of all the materials list below from the various
Tag: BGP Security
BGP Hijacking News, Blogs, and References Articles
Why Review BGP Hijacking News? There is a lot of BGP Hijacking and routing mistakes covered by in the press. It is one of those “controversial” and “exciting” news items. BGP routing incidents (intentional and unintentional) are great press because they have risk imposed on all telecommunications which at times is outside of the control
BGP Hijacking Risks Research Papers and Projects
Research Papers and Projects Exploring BGP Hijacking & Routing Mistakes Risk The BGP Hijacking Risks profile attracts a wide academic interest. This interest attracts government and private research funding to explore new anti-BGP Hijacking tools, techniques, and resiliency approaches. This work is always worth reading, tracking, and exploring to see apply to real-world operations. Monitor,
What can Enterprises do to protect against BGP Hijacks?
Yes, you can minimize the risk to BGP Hijacks. All enterprises around the world need to have a conversation around BGP Hijacks. We see security news around malware, phishing ransomware, DOS attacks, breaches, and range of other attacks. What we do not see is conversations around BGP Hijacks. A BGP Hijack can happen on one Read More
BGP Route Hijacks & Routing Mistakes – What can be done Today?
Protecting your Business, Customers, & the Internet from BGP Route Hijacking Chaos? (DRAFT – Version 0.11) The Internet is glued together with the Board Gateway Protocol (BGP). It may not be perceived as the “perfect” protocol, but it has delivered a transformative global network that spans the Internet and all telecommunications. It is stable, transparent,