1 / 8

Securing BGP – A LITERATURE SURVEY

Presented by: Tony Reveldez. Securing BGP – A LITERATURE SURVEY. GEOFF HUSTON B.Sc., M.Sc. Australian National University. MATTIA ROSSI B. Eng .,M.Sc. Leopold- Franzens - Universitaet. GEOFF ARMITAGE B.Sc., PhD. Swinburne University of Technology. Border Gateway Protocol. What is it?

decima
Download Presentation

Securing BGP – A LITERATURE SURVEY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented by: Tony Reveldez Securing BGP – A LITERATURE SURVEY GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold-Franzens-Universitaet GEOFF ARMITAGE B.Sc., PhD. Swinburne University of Technology

  2. Border Gateway Protocol • What is it? • iBGPvseBGP • TCP/IP • Distant Vector Routing • Path Vector Routing • Route Selection Process • Messages • AS Path

  3. BGP Threat Model • Securing the BGP Session • Injection, eavesdropping, delay messages, replay • Verifying BGP Identity • Are you really who you claim to be? • Verifying BGP Information • Is your information complete? • Verifying Forwarding Paths • Is my information accurate?

  4. Consequences of Attacks on the Routing System The ability to eavesdrop Denial of Service the potential to masquerade Address Stealing www.fireblog.com

  5. Securing BGP • The Security Toolset • Security Requirements • Securing the data payload and semantics • Piecemeal incremental deployment • Approaches to Securing BGP • sBGP, soBGP, psBGP, pgBGP, IRV

  6. Approaches to Securing BGP • Securing the operation of BGP • TCP session • GTSM • TCP MD5 • IPSEC • Security in the Data Level

  7. Securing the Integrity of BGP Data • sBGP • soBGP • psBGP • IRV • pgBGP

  8. State of BGP Security As the table shows, of all proposals, only a few have been implemented and mostly not deployed

More Related