Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the Border Gateway Protocol (BGP) and its vulnerabilities, focusing on BGP security weaknesses, such as weak authentication mechanisms and BGP hijacking. It discusses real-world examples of BGP hijacking incidents and explores defenses like BGPsec. The importance of cryptography in securing routing information is emphasized, highlighting the need for a hostile network threat model.