© 2018 BGProtect

For any information please contact us here

Related Publications
Interesting work published 

March 19, 2018

Foreign intervention in democratic elections in the Western World is a threat witnessed by the global community, proven by the cyber intervention which took place in the recent election processes in the US and France. Political parties prepare, store and transmit sensitive data on their network, while other interested groups are eager to put their hands on this information. To protec...

March 10, 2018

Governments ministries around the world transmit and receive massive amounts of data over the Internet, some of it containing sensitive data or including confidential information not intended for prying eyes to see. It is not surprising that numerous interested groups are implementing extensive measures to put their hands on this information. Most governments are aware of these dange...

March 1, 2018

Governments agencies the world over regularly communicate over the Internet, often sending sensitive data or confidential information not intended for prying eyes to see. However, numerous unauthorized groups are constantly trying to put their hands on this information. Most agencies are aware of these dangers and invest resources and efforts in defending themselves from cyber-attack...

February 19, 2018

Companies and institutions around the globe transmit tremendous amounts of data over the Internet, some of it containing sensitive data or including confidential information not intended for prying eyes to see. There are many interested groups eager to put their hands on this information. Most organizations are aware of these dangers and invest resources and effort in defending thems...

February 10, 2018

Companies around the globe transmit tremendous amounts of data over the Internet, some of it containing sensitive data or including confidential information not intended for prying eyes to see. There are many interested groups eager to put their hands on this information. Most companies are aware of these dangers and invest resources and effort in defending themselves from cyber-atta...

February 1, 2018

The Internet has completely changed the way financial information is delivered and transactions are performed, and it has become the conduit of choice for banks, credit card companies, insurance companies, stock exchanges, stock brokers and other financial institutions around the world. In the financial world, fast and reliable delivery of information and orders is of the utmost impo...

January 14, 2018

Banks, credit card companies, insurance companies, stock exchanges, stock brokers and other financial institutions around the world transmit and receive massive amounts of data over the Internet, some of it containing sensitive data or including confidential information not intended for prying eyes to see. It is not surprising that numerous interested groups are implementing extensiv...

Abstract—As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Auto...

In this paper we describe a system that allows the real time creation of firewall rules in response to geographic and political changes in the control-plane. This allows an organization to mitigate data exfiltration threats by analyzing Border Gateway Protocol (BGP) updates and blocking packets from being routed through problematic jurisdictions. By inspecting the autonomous system p...

Extensive standardization and R&D efforts are dedicated to establishing secure interdomain routing. These efforts focus on two mechanisms: origin authentication with RPKI,and path validation with BGPsec.

However, while RPKI is finally gaining traction, the adoption of BGPsec seems not
even on the horizon due to inherent, possibly insurmountable,
obstacles, including the need to replac...

Please reload