Launch Your Cybersecurity Career in 6 Months
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive research presentation on Route Origin Validation (ROV) deployment measurement and analysis across the global Internet infrastructure. Learn about an innovative measurement framework that uses dynamically served customized Route Origin Authorizations (ROAs) from controlled publication points to target specific Relying Party (RP) servers, enabling precise identification of ROV dependencies between 21,827 Autonomous Systems (ASes) and their transit providers. Discover findings revealing that 1,127 ASes self-deploy ROV while 1,815 rely entirely on upstream filtering, with 69.6% of "protected" ASes remaining vulnerable to local hijacks. Examine critical infrastructure dependencies showing over half of ROV-deploying ASes depend on single RP servers, with router enforcement lagging ROA updates by approximately 37 minutes. Analyze simulation results demonstrating that enabling ROV in the top 100 ASes protects 27.6% of networks, while disabling it in Tier-1 providers exposes 23.8% to hijacks. Understand systemic risks in routing security, limitations of collateral protection assumptions, and strategies for implementing resilient RP configurations to strengthen overall Internet routing security. Access open-sourced tools and datasets designed to support community measurement and mitigation efforts in routing security research.
Syllabus
RoVista+: Mapping Real ROV Deployments, Dependencies, and Delays
Taught by
NANOG