Deployable BGP Security

نویسنده

  • Josh Karlin
چکیده

The routing protocol that connects the Autonomous Systems, BGP, is vulnerable to a number of potentially crippling attacks because it trusts unverified control plane information received from external networks. Within the last year we have seen ConEdison hijack Panix’s /16 [1], TTNET hijack several /8’s including 1247 more specifics of AT&T’s 12/8 [2], NW Network Cable announce several /8’s including nearly 2800 more specifics [3], multiple ASs (8437, 16215) announce the entirety of published dark space [4], and AS 22773 announced 128/1. We know that these events are bogus because they are so severe. Smaller attacks and misconfigurations are not so easily identified and there are likely hundreds of hijacks that we have not been able to verify. However, it has been difficult to convince the operator community to adopt any of several proposed security solutions. The draft RFC for soBGP [5] has expired, and the community has not even started distributing AS number certificates, a prerequisite to complete verification. In this paper I discuss some of the deployment difficulties that BGP security enhancements have faced, suggest directions for future research, and propose an initial framework for a simple yet effective security improvement for BGP that can be rapidly deployed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing BGP - A Literature Survey

The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack. This paper examines the Internet’s routing architecture and the design of BGP in particular, and surveys the work to date on sec...

متن کامل

Secure Border Gateway Protocol (Secure-BGP)

The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems (ASes), is a critical component of the Internet’s routing infrastructure. It is highly vulnerable to a variety of malicious attacks, due to the lack of a secure means of verifying the authenticity and legitimacy of BGP control traffic. This document describes a secure, scalable, deploya...

متن کامل

Bootstrapping Accountability in the Internet We Have

Lack of accountability makes the Internet vulnerable to numerous attacks, including prefix hijacking, route forgery, source address spoofing, and DoS flooding attacks. This paper aims to bring accountability to the Internet with low-cost and deployable enhancements. We present IPA, a design that uses the readily available toplevel DNSSEC infrastructure and BGP to bootstrap accountability. We sh...

متن کامل

Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes

The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks primarily due to operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP. Until such a large proposal is adopted, networks will remain vulnerable to false information injected into BGP. However, BGP rout...

متن کامل

Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes

The Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, is vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public-key infrastructure and accurate routing registries or (ii) detect attacks only after they have spread throughout the network. However, BGP routers could avoid selecting and propagating malicious routes if they were cautious...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006