2018
DOI: 10.26599/tst.2018.9010025
|View full text |Cite
|
Sign up to set email alerts
|

RISP: An RPKI-based inter-AS source protection mechanism

Abstract: IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (IETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a united trust anchor t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…TrueNet mechanism deploys trusted computing module (TCB) in each node of the network, and determines malicious links through multi-node security information negotiation [18] centralization of control SDN architecture is usually adopted, such as VeriDP algorithm, which verifies whether the data is transmitted normally through control plane policy, thus improving the accuracy of network behavior detection [19]. DFL mechanism collects the verification information of nodes in the transmission path in a centralized way, but it is difficult to avoid a single point of failure [20] collaborative filtering RISP uses RPKI to protect the inter-domain communication of source address, and completes traffic filtering through the cooperation of server, alliance center and AS border router [21] New technology Using blockchain to build a distributed trust framework can be used for inter-domain routing protocol to realize IP address prefix authentication [22] 2…”
Section: Identification Inspectionmentioning
confidence: 99%
“…TrueNet mechanism deploys trusted computing module (TCB) in each node of the network, and determines malicious links through multi-node security information negotiation [18] centralization of control SDN architecture is usually adopted, such as VeriDP algorithm, which verifies whether the data is transmitted normally through control plane policy, thus improving the accuracy of network behavior detection [19]. DFL mechanism collects the verification information of nodes in the transmission path in a centralized way, but it is difficult to avoid a single point of failure [20] collaborative filtering RISP uses RPKI to protect the inter-domain communication of source address, and completes traffic filtering through the cooperation of server, alliance center and AS border router [21] New technology Using blockchain to build a distributed trust framework can be used for inter-domain routing protocol to realize IP address prefix authentication [22] 2…”
Section: Identification Inspectionmentioning
confidence: 99%
“…RPKI uses digital signature and certificate to authenticate routing source, which can effectively prevent route hijacking 16 ; due to the limited deployment of RPKI infrastructure, Tomas and others put forward DISCO, which is based on distributed trust architecture to authenticate routing 17 Trusted hardware TrueNet mechanism deploys TCB(Trusted Computing Base) in each node of the network, and determines malicious links through multi-node security information negotiation 18 Centralization of control SDN architecture is usually adopted, such as VeriDP algorithm, which verifies whether the data is transmitted normally through control plane policy, thus improving the accuracy of network behavior detection 19 . DFL mechanism collects the verification information of nodes in the transmission path in a centralized way, but it is difficult to avoid a single point of failure 20 Collaborative filtering RISP uses RPKI to protect the inter-domain communication of source address, and completes traffic filtering through the cooperation of server, alliance center and AS border router 21 New technology Using blockchain to build a distributed trust framework can be used for inter-domain routing protocol to realize IP address prefix authentication 22 …”
Section: Related Workmentioning
confidence: 99%
“…Literature [12][13][14][15][16][17][18][19][20][21][22] puts forward a variety of mainstream routing security mechanisms, summarized into 6 categories in this paper, as shown in Table 2. These mechanisms did not consider the label and source routing characteristics of the SR network, and could not directly migrate to the SR scene, nor did they consider and deal with the threats they faced as a whole, so their universality was limited.…”
Section: Related Workmentioning
confidence: 99%