Optimizing BGP security by exploiting path stability.
Kevin R. B. ButlerPatrick D. McDanielWilliam AielloPublished in: CCS (2006)
Keyphrases
- security issues
- intrusion detection
- security requirements
- anomaly detection
- shortest path
- information security
- computer security
- security problems
- stability analysis
- statistical databases
- information assurance
- access control
- security mechanisms
- network security
- security threats
- key management
- direct optimization
- security vulnerabilities
- functional requirements
- security properties
- data security
- control system
- distributed systems