ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Removing Barriers to RPKI Adoption

Автор: NANOG

Загружено: 2026-02-13

Просмотров: 177

Описание: Abstract

Resource Public Key Infrastructure (RPKI) has emerged as a standard for enhancing the security of Internet routing. Currently, more than 50% BGP prefixes are covered by RPKI Route Origin Authorizations (ROAs), enabling networks to validate the origin of prefix advertisements in BGP. Despite this progress, ROA adoption remains non-uniform, with key stakeholders encountering significant barriers in the adoption process. In this paper, we combine a product adoption framework with data-driven analysis of global RPKI adoption to identify persistent disparities and pinpoint the stages of the adoption process that hinder broader growth. Our study reveals that, although RPKI awareness has grown, the complexity of planning and deploying ROAs remains a significant challenge. Since no unified workflow and documentation exist for ROA planning, many organizations are left without clear operational guidance. To address this challenge, we propose a systematic framework for ROA planning and introduce ru-RPKI-ready, a platform designed to provide data and insights to facilitate ROA planning. Using ru-RPKI-ready, we characterize the routed address space not covered by RPKI ROAs. We find that 47% IPv4 and 71% IPv6 prefixes not in RPKI could be covered with minimal technical effort. Our analysis also reveals that if as few as ten organizations were to take the necessary actions, the global ROA coverage could increase by 7% for IPv4 and 19% for IPv6.

Cecilia Testart:
Cecilia Testart is an assistant professor at the Georgia Institute of Technology (Georgia Tech), with a joint appointment between the School of Cybersecurity and Privacy and the School of Computer Science. Her research focuses on how internet protocols work and evolve, and how the outcome aligns with societal expectations such as security and privacy. Her work lies at the intersection of Internet measurements, security and policy, using data-driven approaches and considering technical and policy challenges to improve Internet security and reliability. Dr. Testart received her PhD in Computer Science from MIT in 2021. She also holds a S.M. in Technology and Policy and a S.M. in Computer Science from MIT, B.S in Engineering from Ecole Centrale Paris (France) and B.S in Industrial Engineering from Universidad de Chile (Chile).

https://nanog.org/events/nanog-96/con...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Removing Barriers to RPKI Adoption

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Decentralizing Software Defined Networking: The Hidden Complexities of SDN & What We Can Do

Decentralizing Software Defined Networking: The Hidden Complexities of SDN & What We Can Do

Panel: Network Automation Isn’t Just About Configuring Network Devices!

Panel: Network Automation Isn’t Just About Configuring Network Devices!

Network Automation Day 1 || Weekend batch 8 PM IST

Network Automation Day 1 || Weekend batch 8 PM IST

IP Geofeeds: Trust, Accuracy, and Abuse

IP Geofeeds: Trust, Accuracy, and Abuse

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Data Visualization: Bridging the Gap: Transforming Complex Data Insights into Business Narratives

Data Visualization: Bridging the Gap: Transforming Complex Data Insights into Business Narratives

AI code security: Codex agents & crypto mining

AI code security: Codex agents & crypto mining

Shaping the Future of BGP Observability: BMP Evolution at IETF

Shaping the Future of BGP Observability: BMP Evolution at IETF

Exodus of IPv4 from War-torn Ukraine

Exodus of IPv4 from War-torn Ukraine

From Datacenter to AI Center, building the networks that build AI

From Datacenter to AI Center, building the networks that build AI

Архитектура интернета и веба | Теоретический курс 2026

Архитектура интернета и веба | Теоретический курс 2026

High-quality IP Geofeeds using AI Coding Assistants and MCP

High-quality IP Geofeeds using AI Coding Assistants and MCP

Keynote: Beyond the Chip: The Unprecedented Infrastructure Demands of AI and HPC

Keynote: Beyond the Chip: The Unprecedented Infrastructure Demands of AI and HPC

FastNetMon Community: Open Source Tool for DDoS Detection

FastNetMon Community: Open Source Tool for DDoS Detection

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Идеальная замена Телеграм найдена! Как работает безопасный мессенджер Element

Идеальная замена Телеграм найдена! Как работает безопасный мессенджер Element

Как работает ГАЛЬВАНИЧЕСКАЯ РАЗВЯЗКА? Оптрон, трансформатор. Понятное объяснение!

Как работает ГАЛЬВАНИЧЕСКАЯ РАЗВЯЗКА? Оптрон, трансформатор. Понятное объяснение!

AI Backend: Deploying SRv6 uSID and SONiC for Deterministic Load Balancing

AI Backend: Deploying SRv6 uSID and SONiC for Deterministic Load Balancing

The Network Automation Map: Navigate Your Journey with the NAF Automation Framework

The Network Automation Map: Navigate Your Journey with the NAF Automation Framework

BalticNOG - Securing the Backbone Defending - Yolandi Cloete

BalticNOG - Securing the Backbone Defending - Yolandi Cloete

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]