BGP Origin Authentication
نویسنده
چکیده
منابع مشابه
Addressing Security Issues in the Border Gateway Protocol
The Internet is a critical component in today’s society. This makes it ever so important to have a secure routing protocol. In the current Internet routing protocol, BGP, security was only an afterthought as it was designed on the basis of trust. With trust, misconfigurations and attacks can disrupt the Internet easily. Therefore, many proposals have been made to make BGP more secure. In this p...
متن کاملNetwork Protocol Attacks on BGP and Potential Solutions
BGP, the Internet’s de facto interdomain routing protocol, is well known to have many security vulnerabilities due to the very nature of its underlying assumptions of trust among independently operated networks. As more and more critical services become dependent on the Internet, the risks posed by malicious autonomous systems (ASes) are becoming increasingly worrisome. Over the last decade, re...
متن کاملIdentifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
Researchers have studied a number of control and data plane attacks on BGP, the Internet’s interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is...
متن کاملMeasures of Self-similarity of BGP Updates and Implications for Securing BGP
Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate the contents of the BGP update message. The additional task of validation of these credentials when processing BGP messages will entail significant additional processing overheads. If the BGP validation process is prepared to a...
متن کاملRfc 7454 Bgp Opsec
This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP commun...
متن کامل