Essays about: "ip routing"

Showing result 1 - 5 of 55 essays containing the words ip routing.

  1. 1. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Benjamin Thellström; [2023]
    Keywords : ;

    Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE

  2. 2. Longitudinal Characterization of the IP Allocation of the Major Cloud Providers and Other Popular Service Providers : An analysis of the Internet Plane projects collection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Hyab Girma Abera; Gasparas Grikainis; [2022]
    Keywords : IP address; IP-range; Autonomous systems; iPlane; Cloud service provider; Tranco list;

    Abstract : With the growth of the internet and exhaustion of IPv4 addresses, the allocation of IP addresses and routing between autonomous systems is an important factor on what paths are taken on the internet. Paths to different destinations are impacted by different neighbouring autonomous systems and their relations with eachother are important in order to find an optimal route from source to destination. READ MORE

  3. 3. BGPcredit : A Blockchain-based System for Securing BGP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yu Yang Liu; [2022]
    Keywords : blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE

  4. 4. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sergio Ricardo Hernández Torres; [2022]
    Keywords : BGP; IP; Routing; RPKI; Tier-1 ISP;

    Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE

  5. 5. Evaluation of length aware Bloom filter for longest prefix matching using Waldvogels binary search on lengths

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Olof Brücher; [2022]
    Keywords : Longest Prefix Matching; Waldvogels Binary Search on Lengths; Bloom filter; Length aware Bloom filter;

    Abstract : Longest prefix matching is a well-studied problem in the context of IP-packet forwarding, an area of computational specialization where high performance with low memory impact is of the essence. Numerous specialized data structures exist for longest prefix matching in this setting, among them is Waldvogels binary search on lengths, WBSL for short. READ MORE