RNDMISC-440: First Milestone
This commit is contained in:
38
bericht.bib
38
bericht.bib
@@ -33,6 +33,14 @@ PUBLISHER = "O'Reilly",
|
||||
YEAR = 2002
|
||||
}
|
||||
|
||||
@misc{Schoch.2022,
|
||||
title = "API für Route Injection",
|
||||
school = "Duale Hochschule Baden-Württemberg Karlsruhe",
|
||||
author = "Schoch, Leon",
|
||||
year = 2022,
|
||||
month = oct,
|
||||
}
|
||||
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
% Referenzieren von URL's
|
||||
@@ -106,3 +114,33 @@ YEAR = 2002
|
||||
month = jan,
|
||||
abstract = {This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol. The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced. BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths. This document obsoletes RFC 1771. {[}STANDARDS-TRACK{]}},
|
||||
}
|
||||
|
||||
@misc{rfc5635,
|
||||
series = {Request for Comments},
|
||||
number = 5635,
|
||||
howpublished = {RFC 5635},
|
||||
publisher = {RFC Editor},
|
||||
doi = {10.17487/RFC5635},
|
||||
url = {https://www.rfc-editor.org/info/rfc5635},
|
||||
author = {Warren "Ace" Kumari and Danny R. McPherson},
|
||||
title = {{Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)}},
|
||||
pagetotal = 15,
|
||||
year = 2009,
|
||||
month = aug,
|
||||
abstract = {Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.},
|
||||
}
|
||||
|
||||
@misc{rfc7999,
|
||||
series = {Request for Comments},
|
||||
number = 7999,
|
||||
howpublished = {RFC 7999},
|
||||
publisher = {RFC Editor},
|
||||
doi = {10.17487/RFC7999},
|
||||
url = {https://www.rfc-editor.org/info/rfc7999},
|
||||
author = {Thomas King and Christoph Dietzel and Job Snijders and Gert Döring and Greg Hankins},
|
||||
title = {{BLACKHOLE Community}},
|
||||
pagetotal = 9,
|
||||
year = 2016,
|
||||
month = oct,
|
||||
abstract = {This document describes the use of a well-known Border Gateway Protocol (BGP) community for destination-based blackholing in IP networks. This well-known advisory transitive BGP community named "BLACKHOLE" allows an origin Autonomous System (AS) to specify that a neighboring network should discard any traffic destined towards the tagged IP prefix.},
|
||||
}
|
||||
Reference in New Issue
Block a user