Beware of BGP attacks
- 1 April 2004
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGCOMM Computer Communication Review
- Vol. 34 (2), 1-8
- https://doi.org/10.1145/997150.997152
Abstract
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.Keywords
This publication has 9 references indexed in Scilit:
- Internet infrastructure security: a taxonomyIEEE Network, 2002
- Securing the Internet routing infrastructureIEEE Communications Magazine, 2002
- Route flap damping exacerbates internet routing convergencePublished by Association for Computing Machinery (ACM) ,2002
- Understanding BGP misconfigurationPublished by Association for Computing Machinery (ACM) ,2002
- Observation and analysis of BGP behavior under stressPublished by Association for Computing Machinery (ACM) ,2002
- An analysis of BGP multiple origin AS (MOAS) conflictsPublished by Association for Computing Machinery (ACM) ,2001
- Delayed Internet routing convergencePublished by Association for Computing Machinery (ACM) ,2000
- Secure Border Gateway Protocol (S-BGP)IEEE Journal on Selected Areas in Communications, 2000
- Efficient security mechanisms for the border gateway routing protocolComputer Communications, 1998