Securing BGP – A LITERATURE SURVEY
description
Transcript of Securing BGP – A LITERATURE SURVEY
![Page 1: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/1.jpg)
1
SECURING BGP – A LITERATURE SURVEY Presented by:
Tony Reveldez
GEOFF HUSTON
B.Sc., M.Sc.Australian National
University
MATTIA ROSSI
B.Eng.,M.Sc.Leopold-
Franzens-Universitaet
GEOFF ARMITAGE B.Sc., PhD.Swinburne
University of Technology
![Page 2: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/2.jpg)
2
Border Gateway Protocol
What is it? iBGP vs eBGP TCP/IP Distant Vector Routing
Path Vector Routing Route Selection Process Messages
AS Path
![Page 3: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/3.jpg)
3
BGP Threat Model Securing the BGP Session
Injection, eavesdropping, delay messages, replay Verifying BGP Identity
Are you really who you claim to be? Verifying BGP Information
Is your information complete? Verifying Forwarding Paths
Is my information accurate?
![Page 4: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/4.jpg)
4
Consequences of Attacks on the Routing System
Denial of Service
the potential to masquerade Address Stealing
The ability to eavesdrop
www.fireblog.com
![Page 5: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/5.jpg)
5
Securing BGP The Security Toolset Security Requirements
Securing the data payload and semanticsPiecemeal incremental deployment
Approaches to Securing BGPsBGP, soBGP, psBGP, pgBGP, IRV
![Page 6: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/6.jpg)
6
Approaches to Securing BGP
Securing the operation of BGPTCP sessionGTSMTCP MD5IPSEC
Security in the Data Level
![Page 7: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/7.jpg)
7
Securing the Integrity of BGP Data
sBGP soBGP
psBGP
IRV pgBGP
![Page 8: Securing BGP – A LITERATURE SURVEY](https://reader036.fdocuments.in/reader036/viewer/2022062222/568160ff550346895dd04022/html5/thumbnails/8.jpg)
8
State of BGP Security
As the table shows, of all proposals, only a few have been implemented and mostly not deployed