Topology-Based Detection of Anomalous BGP Messages

作者: Christopher Kruegel , Darren Mutz , William Robertson , Fredrik Valeur

DOI: 10.1007/978-3-540-45248-5_2

关键词:

摘要: The Border Gateway Protocol (BGP) is a fundamental component of the current Internet infrastructure. Due to inherent trust relationship between peers, control BGP router could enable an attacker redirect traffic allowing man-in-the-middle attacks or launch large-scale denial service. It known that has weaknesses are protocol design. Many solutions these have been proposed, but most require resource intensive cryptographic operations and modifications existing software. For this reason, none them widely adopted. However, threat necessitates effective, immediate solution.

参考文章(25)
Charles Lynn, Karen Seo, Stephen T. Kent, Joanne Mikkelson, Secure Border Gateway Protocol (S-BGP) — Real World Performance and Deployment Issues network and distributed system security symposium. ,(2000)
C. Labovitz, A. Ahuja, F. Jahanian, Experimental study of Internet stability and backbone failures ieee international symposium on fault tolerant computing. pp. 278- 285 ,(1999) , 10.1109/FTCS.1999.781062
R. Chandra, T. Li, P. Traina, BGP Communities Attribute RFC. ,vol. 1997, pp. 1- 5 ,(1996)
William Aiello, John Ioannidis, Patrick D. McDaniel, Aviel D. Rubin, Timothy Griffin, Geoffrey Goodell, Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. network and distributed system security symposium. ,(2003)
Y.F. Jou, F. Gong, C. Sargor, X. Wu, S.F. Wu, H.C. Chang, F. Wang, Design and implementation of a scalable intrusion detection system for the protection of network infrastructure darpa information survivability conference and exposition. ,vol. 2, pp. 69- 83 ,(2000) , 10.1109/DISCEX.2000.821510
Ratul Mahajan, David Wetherall, Tom Anderson, Understanding BGP misconfiguration Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '02. ,vol. 32, pp. 3- 16 ,(2002) , 10.1145/633025.633027
Michalis Faloutsos, Petros Faloutsos, Christos Faloutsos, On power-law relationships of the Internet topology acm special interest group on data communication. ,vol. 29, pp. 251- 262 ,(1999) , 10.1145/316188.316229
S. Kent, C. Lynn, K. Seo, Secure Border Gateway Protocol (S-BGP) IEEE Journal on Selected Areas in Communications. ,vol. 18, pp. 582- 592 ,(2000) , 10.1109/49.839934
B.R. Smith, S. Murthy, J.J. Garcia-Luna-Aceves, Securing distance-vector routing protocols network and distributed system security symposium. pp. 85- 92 ,(1997) , 10.1109/NDSS.1997.579225