Simulates the Border Gateway Protocol (BGP) routing process and demonstrates two common BGP attacks: sub-prefix hijacking and BGP prepending.
-
Updated
May 12, 2024 - Jupyter Notebook
Simulates the Border Gateway Protocol (BGP) routing process and demonstrates two common BGP attacks: sub-prefix hijacking and BGP prepending.
ACM IMC 2020 paper "On Measuring RPKI Relying Parties"
RPKI Prometheus Exporter
RPKI web test testing valid ROA and invalid ROA http endpoint
A Docker Setup for the RIPE RPKI Validator 2
RPKI testing environment with GoBGP and Routinator
Resource Public Key Infrastructure (RPKI) is a project that categorizes the BGP Updates into three categories valid, invalid, and unknown. The categorization is done using the RPKI containing the certificates and signed ROAs.
A Docker Setup for the NLnet-Labs Routinator
A Docker Setup for the RIPE RPKI Validator 3
The RPKI VRP Checker utility can help (automatically) decide whether a given set of RPKI based VRPs is operationally feasible or not.
Add a description, image, and links to the rpki topic page so that developers can more easily learn about it.
To associate your repository with the rpki topic, visit your repo's landing page and select "manage topics."