An analysis of the Internet Nodes Security from route hijack cyber attacks
Cyberattacks on global routing on the global computer network Internet (route hijack, route leak) lead to large-scale consequences with violation of data integrity, availability and confidentiality during the process of internetwork data exchange. Threats to BGP-4 routing protocol can’t be fully mit...
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | Zubok, V. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2020
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/218882 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
An analysis of publication activity in the scientific and technical direction of "Unmanned aerial vehicles"
by: Крючин, А. А., et al.
Published: (2025)
by: Крючин, А. А., et al.
Published: (2025)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013)
by: Zubok, V. Yu.
Published: (2013)
NON-DESTRUCTIVE METHODS OF ESTABLISHING A CAUSE-AND-EFFECT RELATIONSHIP BETWEEN WATER SUPPLY NETWORK ACCIDENTS AND THE CONDITIONS FOR PRESERVING ARCHITECTURAL HERITAGE
by: Черевко, І.А., et al.
Published: (2024)
by: Черевко, І.А., et al.
Published: (2024)
From global tectonics to global geodynamics
by: Aryasova, O., et al.
Published: (2018)
by: Aryasova, O., et al.
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
Semantic Indexing and Cluster Analysis of Cybersecurity Documents
by: Ланде, Д. В., et al.
Published: (2024)
by: Ланде, Д. В., et al.
Published: (2024)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
CORRELATION BETWEEN AIR TEMPERATURE AND THUNDERSTORM ACTIVITY IN AFRICA ACCORDING TO THE ELF MEASUREMENTS IN ANTARCTICA, ARCTICA AND UKRAINE
by: Paznukhov, A. V., et al.
Published: (2019)
by: Paznukhov, A. V., et al.
Published: (2019)
CORRELATION BETWEEN AIR TEMPERATURE AND THUNDERSTORM ACTIVITY IN SOUTH AMERICA ACCORDING TO THE ELF MEASUREMENTS IN ANTARCTICA
by: Paznukhov, A. V., et al.
Published: (2020)
by: Paznukhov, A. V., et al.
Published: (2020)
Studying of Node Importance Characteristics in Co-Author Network
by: Balagura, I. V., et al.
Published: (2013)
by: Balagura, I. V., et al.
Published: (2013)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
COMPARISON OF AIR TEMPERATURE VARIATIONS ON THE AFRICAN CONTINENT AND THE SCHUMANN RESONANCE INTENSITY BY USING LONG-TERM ANTARCTIC OBSERVATIONS
by: Paznukhov, A. V., et al.
Published: (2017)
by: Paznukhov, A. V., et al.
Published: (2017)
On the need to use modern capabilities in situational management to protect the state's critical infrastructure
by: Гречанінов , В.Ф.
Published: (2025)
by: Гречанінов , В.Ф.
Published: (2025)
On the nature of the earth’s magnetic field
by: Gordienko, Vadim
Published: (2024)
by: Gordienko, Vadim
Published: (2024)
Assessment of the impact of construction waste generation on the environment
by: Maikovych, Volodymyr Y., et al.
Published: (2024)
by: Maikovych, Volodymyr Y., et al.
Published: (2024)
The analysis of methods of investigation of negative impact on mesofauna and microbiology of soils of contaminated solutions for foam makers
by: Poroshenko, Sergіi S.
Published: (2020)
by: Poroshenko, Sergіi S.
Published: (2020)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Research of network relaxation time as a charac-teristic of network nodes.
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Assessment of pollutants emissions into the atmosphere due to the fire at the Kalynivka oil depotcaused by a missile strike in March 2022
by: Boychenko, S.G., et al.
Published: (2025)
by: Boychenko, S.G., et al.
Published: (2025)
Spatiotemporal analysis of surface temperature dynamics in the Supii River basin using regression methods
by: Marhes, Serhii, et al.
Published: (2025)
by: Marhes, Serhii, et al.
Published: (2025)
Recording and on-line analysis of the earthquakes at the National center of seismological data
by: Gurova, I. Yu., et al.
Published: (2021)
by: Gurova, I. Yu., et al.
Published: (2021)
About the correlation between the values of the VTEC ionosphere parameter on GNSS stations of Ukraine
by: Savchuk, Stepan, et al.
Published: (2019)
by: Savchuk, Stepan, et al.
Published: (2019)
The impact of forest cover decrease on the wind regime changes for the territory of Ukraine based on data of the global numerical experiment LUMIP
by: Pysarenko, L.A., et al.
Published: (2023)
by: Pysarenko, L.A., et al.
Published: (2023)
GROUNDWATER MONITORING AND MATHEMAICAL MODELING OF RADIOACTIVE CONTAMINATION OF GROUNDWATER IN CHERNOBYL EXCLUSION ZONE AND FOR THE URANIUM FACILITIES OF THE FORMER PRIDNEPROVSKY CHEMICAL PLANT (Kamyanske)
by: Bugai, D.O., et al.
Published: (2018)
by: Bugai, D.O., et al.
Published: (2018)
Similar Items
-
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020) -
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021) -
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)