Using ML to Block BGP Hijacking
| dc.contributor.author | Camp, L Jean | |
| dc.date.accessioned | 2025-02-20T15:56:25Z | |
| dc.date.available | 2025-02-20T15:56:25Z | |
| dc.date.issued | 2019 | |
| dc.description | This record is for a(n) offprint of an article published in ;login: the USENIX magazine in 2019. | |
| dc.description.abstract | Border Gateway Protocol (BGP) has proven to be resilient in the face of failures, attacks, and general maliciousness and incompetence. While there are no deployed mechanisms for automatically remediating BGP announcements that may be malicious, there have been many attempts at fixing this sorry state of affairs. In this article, I will describe some troublesome BGP events and how our tool, Bongo, uses machine learning (ML) and Layer 8 in the IP stack to detect malicious announcements and block traffic that would be diverted. | |
| dc.description.version | offprint | |
| dc.identifier.citation | Camp, L Jean. "Using ML to Block BGP Hijacking." ;login: the USENIX magazine, vol. 44, no. 4, pp. 6-10, 2019. | |
| dc.identifier.other | BRITE 4734 | |
| dc.identifier.uri | https://hdl.handle.net/2022/32232 | |
| dc.language.iso | en | |
| dc.relation.journal | ;login: the USENIX magazine | |
| dc.rights | This work may be protected by copyright unless otherwise stated. | |
| dc.title | Using ML to Block BGP Hijacking |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 4734_Using-ML-to-Block-BGP-Hijacking.pdf
- Size:
- 235.79 KB
- Format:
- Adobe Portable Document Format
Collections
Can’t use the file because of accessibility barriers? Contact us