Open Access
BGP Security Vulnerabilities Analysis
Sandra L. Murphy
- Vol. 4272, pp 1-22
Reads0
Chats0
TLDR
This document discusses some of the security issues with BGP routing data dissemination and provides information for the Internet community.Abstract:
Border Gateway Protocol 4 (BGP-4), along with a host of other
infrastructure protocols designed before the Internet environment
became perilous, was originally designed with little consideration for
protection of the information it carries. There are no mechanisms
internal to BGP that protect against attacks that modify, delete,
forge, or replay data, any of which has the potential to disrupt
overall network routing behavior. This document discusses some of the
security issues with BGP routing data dissemination. This document
does not discuss security issues with forwarding of packets. This memo
provides information for the Internet community.read more
Citations
More filters
Book
Computer Networking: A Top-Down Approach
James F. Kurose,Keith W. Ross +1 more
TL;DR: Computer Networking: A Top-Down Approach Featuring the Internet explains the engineering problems that are inherent in communicating digital information from point to point, and presents the mathematics that determine the best path, show some code that implements those algorithms, and illustrate the logic by using excellent conceptual diagrams.
Journal ArticleDOI
A Survey of Man In The Middle Attacks
TL;DR: This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
Journal ArticleDOI
A Survey of BGP Security Issues and Solutions
TL;DR: This paper considers the current vulnerabilities of the interdomain routing system and surveys both research and standardization efforts relating to BGP security, exploring the limitations and advantages of proposed security extensions to B GP, and explaining why no solution has yet struck an adequate balance between comprehensive security and deployment cost.
A Survey of BGP Security Issues and Solutions The Border Gateway Protocol (BGP) controls much of Internet traffic, but is vulnerable to communications interruptions and failures; finding suitable improved security measures with acceptable costs is difficult.
TL;DR: The limitations and advantages of proposed security extensions to BGP, and why no solution has yet struck an adequate balance betweencomprehensive security anddeployment cost as discussed by the authors.
Proceedings ArticleDOI
BlindBox: Deep Packet Inspection over Encrypted Traffic
TL;DR: The approach of BlindBox is to perform the deep-packet inspection directly on the encrypted traffic, and its core encryption scheme is 3-6 orders of magnitude faster than existing relevant cryptographic schemes.
References
More filters
Security Architecture for the Internet Protocol
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
A Border Gateway Protocol 4 (BGP-4)
Yakov Rekhter,T. Li +1 more
TL;DR: This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter- autonomous system routing protocol for the Internet.
Proceedings ArticleDOI
An analysis of BGP convergence properties
TL;DR: This work presents an abstract model of BGP and uses it to define several global sanity conditions on routing policies that are related to BGP convergence/divergence, and shows that the complexity of statically checking it is either NP-complete or NP-hard.
Protection of BGP Sessions via the TCP MD5 Signature Option
TL;DR: This memo describes a TCP extension to enhance security for BGP that defines a new TCP option for carrying an MD5 [RFC1321] digest in a TCP segment that acts like a signature for that segment, incorporating information known only to the connection end points.
Secure Border Gateway Protocol (Secure-BGP)
TL;DR: A secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP is described.