Lecture

Network Security: BGP Spoofing

Description

This lecture covers the Border Gateway Protocol (BGP) and its vulnerabilities, focusing on BGP security weaknesses, such as weak authentication mechanisms and BGP hijacking. It discusses real-world examples of BGP hijacking incidents and explores defenses like BGPsec. The importance of cryptography in securing routing information is emphasized, highlighting the need for a hostile network threat model.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.