Internet Hardening via Routing Registries

نویسندگان

  • Larry Blunk
  • Manish Karir
چکیده

The Internet in its current form relies on extensive cooperation between network operators to ensure the integrity and security of its core infrastructure. Here we describe how routing registries can be used to improve the security of the Internet infrastructure in general and the BGP routing protocol in particular. Routing registries can be used to generate accurate prefix filter lists as well as detect and protect against anomalous routes that can disrupt the flow of Internet traffic. In addition, when used with a hierarchical and distributed authority model, routing registries can be used to implement a scalable solution to the problem of hardening the Internet. Due to the smaller number of existing prefixes, IPv6 can serve as an ideal testbed to demonstrate the ideas, which when proven can also be implemented in IPv4. The success of the proposed approach lies in ensuring that the data in the routing registries is valid and accurate. Merit Networks, which manages the Routing Assets Database (RADB), is developing a suite of tools to enable users to easily view, analyze and update their routing assets information. Merit operates the largest IP network in Michigan, and manages the North American Network Operators Group (NANOG), the leading forum for information sharing and collaboration among network service providers. It is clear that any effort to harden the Internet infrastructure will require extensive cooperation among network service providers, and it will need to be implemented in an incremental fashion. There is no single solution to security. Security needs to be added to the Internet at all levels. Here we describe the role routing registries can play in helping to secure the Internet infrastructure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Security and Robustness of Internet Routing: What Can We Do Today?

Attacks at the control and routing plane may be the next generation of threats for the Internet. Manipulation of the routing layer could originate from profiteering, malice, or simply human error. The community has recognized this danger and several promising approaches have been proposed. Most of these approaches attempt to capture and block routing anomalies. In practice, the difficulty of de...

متن کامل

Large Scale Weakly Consistent Replication using Multicast

In today s Internet there exist several repositories of resource allocation information Speci cally these registries contain information about IP address space delegations name space allocations and inter ISP routing policies Such registries are useful for coordinating allocation of Internet names and addresses and for debugging network routing For performance and availability reasons there is ...

متن کامل

Internet routing registries, data governance, and security

Routing is fundamental to the workings of the internet, yet the basic routing protocol, Border Gateway Protocol (BGP), is known to be insecure. This paper uses institutional economics to examine internet routing registries, which are used by network operators to mitigate the security flaws in BGP. Secure routing of internet traffic is characterised as a problem in the distributed governance of ...

متن کامل

Representation of IP Routing Policies in a Routing Registry (ripe-81++)

This document was originally published as a RIPE document known as ripe-181 but is also being published as an Informational RFC to reach a larger audience than its original scope. It has received community wide interest and acknowledgment throughout the Internet service provider community and will be used as the basic starting point for future work on Internet Routing Registries and routing pol...

متن کامل

Advanced operations research techniques for multi-constraint QoS routing in internet

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005