+ All Categories
Home > Documents > Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI...

Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI...

Date post: 05-Jan-2016
Category:
Upload: may-hall
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
8
SECURING BGP – A LITERATURE SURVEY Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australia n National Universit y MATTIA ROSSI B.Eng.,M.S c. Leopold- Franzens- Universita et GEOFF ARMITAGE B.Sc., PhD. Swinburne Universit y of Technolog y 1
Transcript
Page 1: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

1

SECURING BGP – A LITERATURE SURVEY Presented by:

Tony Reveldez

GEOFF HUSTON

B.Sc., M.Sc.Australian National

University

MATTIA ROSSI

B.Eng.,M.Sc.Leopold-

Franzens-Universitaet

GEOFF ARMITAGE B.Sc., PhD.Swinburne

University of Technology

Page 2: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

2

Border Gateway Protocol

What is it? iBGP vs eBGP TCP/IP Distant Vector Routing

Path Vector Routing

Route Selection Process Messages

AS Path

Page 3: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

3

BGP Threat Model

Securing the BGP Session Injection, eavesdropping, delay messages, replay

Verifying BGP Identity Are you really who you claim to be?

Verifying BGP Information Is your information complete?

Verifying Forwarding Paths Is my information accurate?

Page 4: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

4

Consequences of Attacks on the Routing System

Denial of Service

the potential to masquerade Address Stealing

The ability to eavesdrop

www.fireblog.com

Page 5: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

5

Securing BGP

The Security Toolset Security Requirements

Securing the data payload and semanticsPiecemeal incremental deployment

Approaches to Securing BGPsBGP, soBGP, psBGP, pgBGP, IRV

Page 6: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

6

Approaches to Securing BGP

Securing the operation of BGPTCP sessionGTSMTCP MD5IPSEC

Security in the Data Level

Page 7: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

7

Securing the Integrity of BGP Data

sBGP soBGP

psBGP

IRV pgBGP

Page 8: Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

8

State of BGP Security

As the table shows, of all proposals, only a few have been implemented and mostly not deployed


Recommended