5. Combating prefix hijacking
As seen in the previous paragraphs, it is impossible for a network administrator to maintain a list of associations between AS numbers and the prefixes they are authorized to issue. As a result, the risk of prefix usurpation is very high. Global monitoring tools frequently record occurrences of this type of incident, and are essential for detecting them and triggering appropriate reactions . To combat this vulnerability and improve routing security on the Internet, the RPKI (Resource Public Key Infrastructure, ) architecture...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Combating prefix hijacking
Article included in this offer
"Networks and Telecommunications"
(
170 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!