Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Protecting BGP: Quantifying the Impact of RPKI Validation in ISPs and IXPs

NANOG via YouTube

Overview

Explore a technical conference talk that delves into the security vulnerabilities of the Border Gateway Protocol (BGP) and evaluates the effectiveness of Resource Public Key Infrastructure (RPKI) implementation across Internet Service Providers (ISPs) and Internet Exchange Points (IXPs). Learn about active BGP attack measurements using self-owned resources, revealing that while 27% of networks employ RPKI for route validation, significant vulnerabilities persist. Discover through mathematical graph analysis why RPKI enforcement at IXP routeservers fails to prevent global hijack propagation, primarily due to direct customer sessions bypassing validation mechanisms. Examine findings that demonstrate large providers' crucial role in limiting prefix hijack propagation, emphasizing the importance of RPKI validation deployment in major networks. Gain insights from PhD researcher Niklas Vogel's work at Goethe University Frankfurt on advancing RPKI implementation for enhanced internet protection.

Syllabus

The complex reality of protecting BGP​: Quantifying the impact of RPKI validation in ISPs and IXPs​

Taught by

NANOG

Reviews

Start your review of Protecting BGP: Quantifying the Impact of RPKI Validation in ISPs and IXPs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.