+ All Categories
Home > Documents > Securing BGP – A LITERATURE SURVEY

Securing BGP – A LITERATURE SURVEY

Date post: 22-Feb-2016
Category:
Upload: decima
View: 34 times
Download: 0 times
Share this document with a friend
Description:
Presented by: Tony Reveldez. Securing BGP – A LITERATURE SURVEY. GEOFF HUSTON B.Sc., M.Sc. Australian National University. MATTIA ROSSI B. Eng .,M.Sc. Leopold- Franzens - Universitaet. GEOFF ARMITAGE B.Sc., PhD. Swinburne University of Technology. Border Gateway Protocol. What is it? - PowerPoint PPT Presentation
Popular Tags:
8
SECURING BGP – A LITERATURE SURVEY Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australia n National Universit y MATTIA ROSSI B.Eng.,M.S c. Leopold- Franzens- Universita et GEOFF ARMITAGE B.Sc., PhD. Swinburne Universit y of Technolog y 1
Transcript
Page 1: Securing BGP –  A LITERATURE SURVEY

1

SECURING BGP – A LITERATURE SURVEY Presented by:

Tony Reveldez

GEOFF HUSTON

B.Sc., M.Sc.Australian National

University

MATTIA ROSSI

B.Eng.,M.Sc.Leopold-

Franzens-Universitaet

GEOFF ARMITAGE B.Sc., PhD.Swinburne

University of Technology

Page 2: Securing BGP –  A LITERATURE SURVEY

2

Border Gateway Protocol

What is it? iBGP vs eBGP TCP/IP Distant Vector Routing

Path Vector Routing Route Selection Process Messages

AS Path

Page 3: Securing BGP –  A LITERATURE SURVEY

3

BGP Threat Model Securing the BGP Session

Injection, eavesdropping, delay messages, replay Verifying BGP Identity

Are you really who you claim to be? Verifying BGP Information

Is your information complete? Verifying Forwarding Paths

Is my information accurate?

Page 4: Securing BGP –  A LITERATURE SURVEY

4

Consequences of Attacks on the Routing System

Denial of Service

the potential to masquerade Address Stealing

The ability to eavesdrop

www.fireblog.com

Page 5: Securing BGP –  A LITERATURE SURVEY

5

Securing BGP The Security Toolset Security Requirements

Securing the data payload and semanticsPiecemeal incremental deployment

Approaches to Securing BGPsBGP, soBGP, psBGP, pgBGP, IRV

Page 6: Securing BGP –  A LITERATURE SURVEY

6

Approaches to Securing BGP

Securing the operation of BGPTCP sessionGTSMTCP MD5IPSEC

Security in the Data Level

Page 7: Securing BGP –  A LITERATURE SURVEY

7

Securing the Integrity of BGP Data

sBGP soBGP

psBGP

IRV pgBGP

Page 8: Securing BGP –  A LITERATURE SURVEY

8

State of BGP Security

As the table shows, of all proposals, only a few have been implemented and mostly not deployed


Recommended