A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
One of the most significant Internet-related problems of cybersecurity is route hijacking counteraction in the Internet global routing system. Attacking global routing is capable of harming millions of network devices (and also users) with much less effort than the well-known DDoS or Ransomware atta...
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Zubok, V. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/180256 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
An analysis of publication activity in the scientific and technical direction of "Unmanned aerial vehicles"
by: Крючин, А. А., et al.
Published: (2025)
by: Крючин, А. А., et al.
Published: (2025)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020)
by: S. H. Petrov
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018)
by: Yu. Zubok
Published: (2018)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
Traditional Culture in Ukrainian Tourist Routes
by: I. Shcherbak
Published: (2011)
by: I. Shcherbak
Published: (2011)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
On decompilation of VLIW executable files
by: Jakub, K.
Published: (2017)
by: Jakub, K.
Published: (2017)
Mathematical models of copulas for assessing the risks of green projects
by: Кузнєцова, Н. В., et al.
Published: (2025)
by: Кузнєцова, Н. В., et al.
Published: (2025)
Green projects risk assessment models
by: Кузнєцова, Н. В., et al.
Published: (2024)
by: Кузнєцова, Н. В., et al.
Published: (2024)
A global gravity oscillation determined by superconducting gravimetry measurements and astronomical latitude observations
by: Chapanov, Ya.
Published: (2005)
by: Chapanov, Ya.
Published: (2005)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Features of the assessment of occupational risks in truck transportation
by: Tsopa, Vitaliy A., et al.
Published: (2023)
by: Tsopa, Vitaliy A., et al.
Published: (2023)
Similar Items
-
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020) -
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024) -
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)