2010
DOI: 10.1109/jproc.2009.2034031
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of BGP Security Issues and Solutions

Abstract: The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol of the Internet. Although the performance of BGP has been historically acceptable, there are continuing concerns about its ability to meet the needs of the rapidly evolving Internet. A major limitation of BGP is its failure to adequately address security. Recent outages and security analyses clearly indicate that the Internet routing infrastructure is highly vulnerable. Moreover, the design and ubiquity of BGP has frustrated past ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
261
0
1

Year Published

2012
2012
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 278 publications
(263 citation statements)
references
References 103 publications
1
261
0
1
Order By: Relevance
“…We compare our hash-based verification with the signaturebased verification adopted in most of the prefix attestation proposals [9]. We consider the protocol to be the same in both approaches (i.e., both issue an Interest Update that will be verified at each router).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…We compare our hash-based verification with the signaturebased verification adopted in most of the prefix attestation proposals [9]. We consider the protocol to be the same in both approaches (i.e., both issue an Interest Update that will be verified at each router).…”
Section: Discussionmentioning
confidence: 99%
“…Prefix attestation has also been proposed to prevent IP prefix hijacking in inter-domain [9,19,20,28,31] and intra-domain [25,29] IP routing. A widely used approach for achieving address attestation exploits digital signatures and certificates.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Attracting extra traffic enables the AS to increase revenue from customers, or drop, tamper, or snoop on the packets [1,2,3]. While the proposed extensions to BGP prevent many attacks (see [4] for a survey), even these secure protocols are susceptible to a strategic manipulator who deliberately exploits their weaknesses to attract large volumes of traffic to its network. Given the difficulty of upgrading the Internet to a new secure routing protocol, it is crucial to understand how well these protocols blunt the impact of traffic attraction attacks.…”
Section: Introductionmentioning
confidence: 99%