Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation [open pdf - 6MB]
From the Executive Summary: "This NIST [National Institute of Standards and Technology] Cybersecurity Practice Guide demonstrates how networks can protect BGP routes from vulnerability to route hijacks by using available security protocols, products, and tools to perform BGP [Border Gateway Protocol] ROV [route origin validation] to reduce route hijacking threats. The example implementation described in this guide aims to protect the integrity and improve the resiliency of internet traffic exchange by verifying the source of the route."
NIST Special Publication 1800-14; National Institute of Standards and Technology Special Publication 1800-14
Federal Depository Library Program Electronic Collection (FDLP/EC): https://permanent.fdlp.gov/