Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing
- 1 November 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The Border Gateway Protocol (BGP), and hence the Internet, remains critically vulnerable to a range of prefix forgery attacks. In this paper, we address these attacks by proposing a non-cryptographic, incrementally deployable mechanism to probabilistically detect forged BGP origin advertisements. Upon receiving an advertisement from a "suspicious" origin, the receiving domain intelligently probes other ASes about the received information. Any dissenting information indicates potential forgery or error, and is reported by the polled ASes to the true origin and processed appropriately. In this design, we exploit the fact that the highly connected AStopology makes it difficult to block the dissemination of information as it traverses the Internet. We evaluate the effectiveness of our probing mechanism via simulation on realistic Internet topologies. The experiments show that 98% of forgeries can be detected even when as few as 10% of the ASes participate in the protocol under a naive polling stratagem. Moreover, we show that judicious node selection can further improve detection rates while minimizing the number of probes.Keywords
This publication has 12 references indexed in Scilit:
- Pretty Good BGP: Improving BGP by Cautiously Adopting RoutesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain RoutingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Beware of BGP attacksACM SIGCOMM Computer Communication Review, 2004
- Detection of invalid routing announcement in the InternetPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Characterizing the Internet hierarchy from multiple vantage pointsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Topology-Based Detection of Anomalous BGP MessagesLecture Notes in Computer Science, 2003
- Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Understanding BGP misconfigurationACM SIGCOMM Computer Communication Review, 2002
- An analysis of BGP multiple origin AS (MOAS) conflictsPublished by Association for Computing Machinery (ACM) ,2001
- Secure Border Gateway Protocol (S-BGP)IEEE Journal on Selected Areas in Communications, 2000