Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
نویسندگان
چکیده
Researchers have studied a number of control and data plane attacks on BGP, the Internet’s interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane—to ensure reachability and enable ASes to pick routes according to their policies—despite the presence of SBGP-like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet’s AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
منابع مشابه
Addressing Security Issues in the Border Gateway Protocol
The Internet is a critical component in today’s society. This makes it ever so important to have a secure routing protocol. In the current Internet routing protocol, BGP, security was only an afterthought as it was designed on the basis of trust. With trust, misconfigurations and attacks can disrupt the Internet easily. Therefore, many proposals have been made to make BGP more secure. In this p...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملIncentives for Deploying Secure Routing
The Internet’s routing and forwarding infrastructure is vulnerable to attacks and misconfigurations that threaten the ability of hosts to communicate. Attacks that inject false information into BGP or compromise a router on the data path can impair data confidentiality & integrity, and disrupt a destination’s network availability. Proposals to secure BGP have existed for nearly a decade (s-BGP ...
متن کاملA Novel Approach for Secure Routing through Bgp Using Symmetric Key
The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The traditional BGP protocol is not sufficient to provide security and authentication for AS path and verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various ty...
متن کاملPretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and that a single misconfigured or malicious BGP speaker could result in large scale service disruption. We first summarize a set of security goals for BGP, and then propose Pretty Secure BGP (psBGP) as a new security prot...
متن کامل