Why BGP security is needed
Why BGP security is needed Not so important
Why BGP security is needed Slightly important
Why BGP security is needed Important
Why BGP security is needed Extremely important
Cause of the BGP incidents
Cause of the BGP incidents Not so important
Cause of the BGP incidents Slightly important
Cause of the BGP incidents Important
Cause of the BGP incidents Extremely important
Threats for routing security
Threats for routing security Not so important
Threats for routing security Slightly important
Threats for routing security Important
Threats for routing security Extremely important
How the attackers can abuse BGP
How the attackers can abuse BGP Not so important
How the attackers can abuse BGP Slightly important
How the attackers can abuse BGP Important
How the attackers can abuse BGP Extremely important
BGP Security measures
BGP Security measures Not so important
BGP Security measures Slightly important
BGP Security measures Important
BGP Security measures Extremely important
Which BGP routes you should filter
Which BGP routes you should filter Not so important
Which BGP routes you should filter Slightly important
Which BGP routes you should filter Important
Which BGP routes you should filter Extremely important
How to create BGP filters
How to create BGP filters Not so important
How to create BGP filters Slightly important
How to create BGP filters Important
How to create BGP filters Extremely important
How to create AS-path filters
How to create AS-path filters Not so important
How to create AS-path filters Slightly important
How to create AS-path filters Important
How to create AS-path filters Extremely important
IRR Filtering
IRR Filtering Not so important
IRR Filtering Slightly important
IRR Filtering Important
IRR Filtering Extremely important
Ingress Filtering - what you need to filter on ingress
Ingress Filtering - what you need to filter on ingress Not so important
Ingress Filtering - what you need to filter on ingress Slightly important
Ingress Filtering - what you need to filter on ingress Important
Ingress Filtering - what you need to filter on ingress Extremely important
Egress Filtering – what you need to filter on egress
Egress Filtering – what you need to filter on egress Not so important
Egress Filtering – what you need to filter on egress Slightly important
Egress Filtering – what you need to filter on egress Important
Egress Filtering – what you need to filter on egress Extremely important
Effects/results of improper filtering
Effects/results of improper filtering Not so important
Effects/results of improper filtering Slightly important
Effects/results of improper filtering Important
Effects/results of improper filtering Extremely important
Tools that you can use to generate BGP prefix filters
Tools that you can use to generate BGP prefix filters Not so important
Tools that you can use to generate BGP prefix filters Slightly important
Tools that you can use to generate BGP prefix filters Important
Tools that you can use to generate BGP prefix filters Extremely important
Understanding RPKI concept
Understanding RPKI concept Not so important
Understanding RPKI concept Slightly important
Understanding RPKI concept Important
Understanding RPKI concept Extremely important
Why we need RPKI
Why we need RPKI Not so important
Why we need RPKI Slightly important
Why we need RPKI Important
Why we need RPKI Extremely important
How to implement RPKI
How to implement RPKI Not so important
How to implement RPKI Slightly important
How to implement RPKI Important
How to implement RPKI Extremely important
Implementing BGP OV
Implementing BGP OV Not so important
Implementing BGP OV Slightly important
Implementing BGP OV Important
Implementing BGP OV Extremely important
Creating ROAs
Creating ROAs Not so important
Creating ROAs Slightly important
Creating ROAs Important
Creating ROAs Extremely important
How to drop BGP invalids
How to drop BGP invalids Not so important
How to drop BGP invalids Slightly important
How to drop BGP invalids Important
How to drop BGP invalids Extremely important
Discussing if RPKI is enough for BGP security
Discussing if RPKI is enough for BGP security Not so important
Discussing if RPKI is enough for BGP security Slightly important
Discussing if RPKI is enough for BGP security Important
Discussing if RPKI is enough for BGP security Extremely important
Introducing some tools to create tailored BGP packets
Introducing some tools to create tailored BGP packets Not so important
Introducing some tools to create tailored BGP packets Slightly important
Introducing some tools to create tailored BGP packets Important
Introducing some tools to create tailored BGP packets Extremely important
Protecting BGP sessions with MD5/TCP-AO and TTL
Protecting BGP sessions with MD5/TCP-AO and TTL Not so important
Protecting BGP sessions with MD5/TCP-AO and TTL Slightly important
Protecting BGP sessions with MD5/TCP-AO and TTL Important
Protecting BGP sessions with MD5/TCP-AO and TTL Extremely important
Protecting BGP speaker by implementing control plane policies
Protecting BGP speaker by implementing control plane policies Not so important
Protecting BGP speaker by implementing control plane policies Slightly important
Protecting BGP speaker by implementing control plane policies Important
Protecting BGP speaker by implementing control plane policies Extremely important
BGP hijacks
BGP hijacks Not so important
BGP hijacks Slightly important
BGP hijacks Important
BGP hijacks Extremely important
Route manipulation
Route manipulation Not so important
Route manipulation Slightly important
Route manipulation Important
Route manipulation Extremely important
Man-in-the-middle-attack
Man-in-the-middle-attack Not so important
Man-in-the-middle-attack Slightly important
Man-in-the-middle-attack Important
Man-in-the-middle-attack Extremely important
Implementing BCP38
Implementing BCP38 Not so important
Implementing BCP38 Slightly important
Implementing BCP38 Important
Implementing BCP38 Extremely important
Big networks filter
Big networks filter Not so important
Big networks filter Slightly important
Big networks filter Important
Big networks filter Extremely important
BGP peer-lock
BGP peer-lock Not so important
BGP peer-lock Slightly important
BGP peer-lock Important
BGP peer-lock Extremely important
BGP Flowspec
BGP Flowspec Not so important
BGP Flowspec Slightly important
BGP Flowspec Important
BGP Flowspec Extremely important
MANRS
MANRS Not so important
MANRS Slightly important
MANRS Important
MANRS Extremely important
Next steps for BGP/routing Security
Next steps for BGP/routing Security Not so important
Next steps for BGP/routing Security Slightly important
Next steps for BGP/routing Security Important
Next steps for BGP/routing Security Extremely important
Understanding BGPSEC and why it is not in use
Understanding BGPSEC and why it is not in use Not so important
Understanding BGPSEC and why it is not in use Slightly important
Understanding BGPSEC and why it is not in use Important
Understanding BGPSEC and why it is not in use Extremely important
Drafts for validating whole BGP path
Drafts for validating whole BGP path Not so important
Drafts for validating whole BGP path Slightly important
Drafts for validating whole BGP path Important
Drafts for validating whole BGP path Extremely important