Launch Your Cybersecurity Career in 6 Months
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a technical conference talk that delves into the security vulnerabilities of the Border Gateway Protocol (BGP) and evaluates the effectiveness of Resource Public Key Infrastructure (RPKI) implementation across Internet Service Providers (ISPs) and Internet Exchange Points (IXPs). Learn about active BGP attack measurements using self-owned resources, revealing that while 27% of networks employ RPKI for route validation, significant vulnerabilities persist. Discover through mathematical graph analysis why RPKI enforcement at IXP routeservers fails to prevent global hijack propagation, primarily due to direct customer sessions bypassing validation mechanisms. Examine findings that demonstrate large providers' crucial role in limiting prefix hijack propagation, emphasizing the importance of RPKI validation deployment in major networks. Gain insights from PhD researcher Niklas Vogel's work at Goethe University Frankfurt on advancing RPKI implementation for enhanced internet protection.
Syllabus
The complex reality of protecting BGP​: Quantifying the impact of RPKI validation in ISPs and IXPs​
Taught by
NANOG