BGP Origin Authentication

نویسنده

  • Tony Li
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addressing Security Issues in the Border Gateway Protocol

The Internet is a critical component in today’s society. This makes it ever so important to have a secure routing protocol. In the current Internet routing protocol, BGP, security was only an afterthought as it was designed on the basis of trust. With trust, misconfigurations and attacks can disrupt the Internet easily. Therefore, many proposals have been made to make BGP more secure. In this p...

متن کامل

Network Protocol Attacks on BGP and Potential Solutions

BGP, the Internet’s de facto interdomain routing protocol, is well known to have many security vulnerabilities due to the very nature of its underlying assumptions of trust among independently operated networks. As more and more critical services become dependent on the Internet, the risks posed by malicious autonomous systems (ASes) are becoming increasingly worrisome. Over the last decade, re...

متن کامل

Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP

Researchers have studied a number of control and data plane attacks on BGP, the Internet’s interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is...

متن کامل

Measures of Self-similarity of BGP Updates and Implications for Securing BGP

Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate the contents of the BGP update message. The additional task of validation of these credentials when processing BGP messages will entail significant additional processing overheads. If the BGP validation process is prepared to a...

متن کامل

Rfc 7454 Bgp Opsec

This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP commun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999