scispace - formally typeset
Open Access

BGP Security Vulnerabilities Analysis

Sandra L. Murphy
- Vol. 4272, pp 1-22
Reads0
Chats0
TLDR
This document discusses some of the security issues with BGP routing data dissemination and provides information for the Internet community.
Abstract
Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior. This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Computer Networking: A Top-Down Approach

TL;DR: Computer Networking: A Top-Down Approach Featuring the Internet explains the engineering problems that are inherent in communicating digital information from point to point, and presents the mathematics that determine the best path, show some code that implements those algorithms, and illustrate the logic by using excellent conceptual diagrams.
Journal ArticleDOI

A Survey of Man In The Middle Attacks

TL;DR: This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
Journal ArticleDOI

A Survey of BGP Security Issues and Solutions

TL;DR: This paper considers the current vulnerabilities of the interdomain routing system and surveys both research and standardization efforts relating to BGP security, exploring the limitations and advantages of proposed security extensions to B GP, and explaining why no solution has yet struck an adequate balance between comprehensive security and deployment cost.

A Survey of BGP Security Issues and Solutions The Border Gateway Protocol (BGP) controls much of Internet traffic, but is vulnerable to communications interruptions and failures; finding suitable improved security measures with acceptable costs is difficult.

TL;DR: The limitations and advantages of proposed security extensions to BGP, and why no solution has yet struck an adequate balance betweencomprehensive security anddeployment cost as discussed by the authors.
Proceedings ArticleDOI

BlindBox: Deep Packet Inspection over Encrypted Traffic

TL;DR: The approach of BlindBox is to perform the deep-packet inspection directly on the encrypted traffic, and its core encryption scheme is 3-6 orders of magnitude faster than existing relevant cryptographic schemes.
References
More filters

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).

A Border Gateway Protocol 4 (BGP-4)

Yakov Rekhter, +1 more
TL;DR: This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter- autonomous system routing protocol for the Internet.
Proceedings ArticleDOI

An analysis of BGP convergence properties

TL;DR: This work presents an abstract model of BGP and uses it to define several global sanity conditions on routing policies that are related to BGP convergence/divergence, and shows that the complexity of statically checking it is either NP-complete or NP-hard.

Protection of BGP Sessions via the TCP MD5 Signature Option

A. Heffernan
TL;DR: This memo describes a TCP extension to enhance security for BGP that defines a new TCP option for carrying an MD5 [RFC1321] digest in a TCP segment that acts like a signature for that segment, incorporating information known only to the connection end points.

Secure Border Gateway Protocol (Secure-BGP)

TL;DR: A secure, scalable, deployable architecture (S-BGP) for an authorization and authentication system that addresses most of the security problems associated with BGP is described.