Kim, YanggonKim, Kyoungha2016-10-242016-10-242016-10-242016-05DSP2016Kimhttp://hdl.handle.net/11603/3289(D. Sc.) -- Towson University, 2016The Border Gateway Protocol (BGP), which is an inter-domain routing protocol, does not validate the origin and path information that are used to form BGP networks, resulting in many BGP-routing accidents. The Resource Public Key Infrastructure (RPKI ) and BGPsec are remarked as solutions to provide the Origin Validation and Path Validation into BGP. The validation methodologies in those solutions are based on the Public Key Infrastructure (PKI ) so as to offer the strong security level but produce significant computational overhead, especially in validating paths. In this paper, we contribute to developing BGP implementations for researchers to perform practical BGP simulations based on RPKI or BGPsec, as well as to analyze BGP data. Our implementations also introduce less computational overhead with the same capabilities.Construction of secured BGP networks -- The feasibility analysis of BGPsec -- BGP data analysis: what are insecure and how to protect them? -- BGP data analysis: load reduction on validating BGP paths based on BGP data analysisapplication/pdfxiv, 129 pagesen-USAn analysis of susceptibility in securing multifaceted Border Gateway Protocol (BGP)Text