Preview

Bgp Problems & Solutions

Powerful Essays
Open Document
Open Document
20649 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bgp Problems & Solutions
1

A Survey of BGP Security Issues and Solutions
Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford

Abstract The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol of the Internet. Although the performance of BGP has been historically acceptable, there are continuing concerns about its ability to meet the needs of the rapidly evolving Internet. A major limitation of BGP is its failure to adequately address security. Recent outages and security analyses clearly indicate that the Internet routing infrastructure is highly vulnerable. Moreover, the design and ubiquity of BGP has frustrated past efforts at securing interdomain routing. This paper considers the vulnerabilities currently existing within interdomain routing and surveys works relating to BGP security. The limitations and advantages of proposed solutions are explored, and the systemic and operational implications of their designs considered. We note that no current solution has yet found an adequate balance between comprehensive security and deployment cost. This work calls not only for the application of ideas described within this paper, but also for further investigation into the problems and solutions of BGP security. Index Terms authentication, authorization, BGP, border gatewa protocol, integrity, interdomain routing, network security, networks, routing

I. I NTRODUCTION The Internet is a global, decentralized network comprised of many smaller interconnected networks. Networks are largely comprised of end systems, referred to as hosts, and intermediate systems, called routers. Information travels through a network on one of many paths, which are selected through a routing process. Routing protocols communicate reachability information (how to locate other hosts and routers) and ultimately perform path selection. A network under the administrative control of a single organization is called an autonomous system (AS) [1]. The process of routing within an AS is

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Reiter, A. (2008, 2 5). Internet Evolution. Retrieved 12 5, 2010, from Internet Evolution: http://www.internetevolution.com/author.asp?section_id=526&doc_id=144810…

    • 879 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Privacy. What do you think the average American would say if you told them they have no Constitutional Right to Privacy, as privacy is never mentioned anywhere in the Constitution? That the information they share over the World Wide Web has little if any protection by or from the government. Of course our government is hard at work to modernize the form of weeding out the unsanitary to which some cenacles might call censorship. But the main question still stands, do we have a right to privacy and is the government violating our natural freedoms, or do we need someone to monitor the actions of our society to keep order. The question is as old as government; to what extent should the government influence our lives. When you get down to it, privacy is the protection from influence, privacy is freedom, and in the following argument, influence will be wielded as a powerful epitome.…

    • 4864 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Network 320

    • 979 Words
    • 3 Pages

    First, I have to define the term RFC. The acronym "RFC" stands for "Request for Comment". This refers to a description of a standard for new or modified internet or networking protocols. When standards are proposed, they are made available for public comment so that they can be refined and agreed upon. The document which details the proposed standards is called a "request for comment" document, or RFC. When the standards are finalized, they keep the same "RFC" Three organizations under the Internet Society are responsible for the actual work of standards development and publication: Three organizations under the Internet Society are responsible for the actual work of standards development and publication:name. Now a Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet. Request for Comments documents were invented by Steve Crocker in 1969 to help record unofficial notes on the development of ARPANET. RFCs have since become official documents of Internet specifications, communications protocols, procedures, and events. Today, it is the official publication channel for the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), and — to some extent — the global community of computer network researchers in general. A new model was proposed in 2008, refined, and published in August 2009, splitting the task into several roles, including the RFC Series Advisory Group (RSAG). (The model was updated in 2012. The RFC series contains three sub-series for IETF RFCs. Not all RFCs are standards. Each RFC is assigned a designation with regard to status within the Internet standardization process. This is a partial list of RFCs (request for comments memoranda). I wasn 't aware of how many RFC 's there are, and found to my…

    • 979 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    Chasser, J. M. (2010). Security Concerns in IPv6 and Transition Networks. Information Security Journal: A Global Perspective, 19(5), 282-293. doi:10.1080/19393555.2010.514653.…

    • 2617 Words
    • 11 Pages
    Best Essays
  • Best Essays

    Software Defined Networks

    • 4078 Words
    • 17 Pages

    Evolution of computer networks has traditionally been much slower than other fields of computer engineering. The primary reason for this trend has been the vertical integration of current network equipment. Almost all of today’s routers, switches and other network equipment consists of a fast switching hardware controlled by an operating system and applications built on top of it. Most network equipment vendors have their own proprietary operating system and implementation of various processes like Open Shortest Path First (OSFP), DHCP Snooping, etc and other router management functions. This vendor lock-in stifles innovation, as any implementations of new algorithms have to be approved by the vendors before it can be implemented on a commercial scale.…

    • 4078 Words
    • 17 Pages
    Best Essays
  • Best Essays

    Linden, G., Smith, B., & York, J. (2003, January/February). Internet computing, IEEE. Retrieved October 31, 2011, from ieeexplore digital library: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1167344…

    • 1890 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Routers are specialized devices that links and routes everyone 's information over networks and the Internet through thousands of pathways. The main processes of the router include locating a pathway to create a link to and transmitting packets through this path. This process is done by routing data from a computer to a LAN through any number of routers to reach its destination. The router has proven itself to be one of the main components in the success of the Internet. Routers make networking possible by connecting large groups of people in a unified environment. (McGraw)The router is the one device that oversees all the data delivered over a network. The router uses a tool called the configuration table to determine the path to send the packet. A configuration table contains information on which connections lead to particular groups of addresses, priorities for connections to be used, and rules for handling both routing and special cases of traffic. Configuration tables will vary in the number of lines depending on how big the capability of the router is. (McGraw)Data transmitted over the Internet, travels over the system of the packet-switching network. This system breaks down data and information files into packages of about 1500 bytes. The data package carries the sender 's IP address, the receivers IP address, information on how many packets the data is broken down to, and the information on rebuilding the package. Each packet also contains the data of the Transmission Control Protocol/Internet Protocol (TCP/IP) for using the Internet. The packet is then sent off through the network using routers to find the best available route. Since each packet is sent separately, all the packets may end up taking different routes to reach its destination. The main advantages of using this method compared to sending all the packets over one dedicated line is that the network can balance the load across various parts of the network and avoid congesting certain areas.…

    • 1172 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Leave Management System

    • 2393 Words
    • 10 Pages

    The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.…

    • 2393 Words
    • 10 Pages
    Powerful Essays