首页> 外文期刊>Computer communication review >How Secure are Secure Interdomain Routing Protocols?
【24h】

How Secure are Secure Interdomain Routing Protocols?

机译:安全的域间路由协议的安全性如何?

获取原文
获取原文并翻译 | 示例
           

摘要

In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which variant should be deployed in the Internet, we quantify the ability of the main protocols (origin authentication, soBGP, S-BGP, and data-plane verification) to blunt traffic-attraction attacks; i.e., an attacker that deliberately attracts traffic to drop, tamper, or eavesdrop on packets.rnIntuition suggests that an attacker can maximize the traffic he attracts by widely announcing a short path that is not flagged as bogus by the secure protocol. Through simulations on an empirically-determined AS-level topology, we show that this strategy is surprisingly effective, even when the network uses an advanced security solution like S-BGP or data-plane verification. Worse yet, we show that these results underestimate the severity of attacks. We prove that finding the most damaging strategy is NP-hard, and show how counterintuitive strategies, like announcing longer paths, announcing to fewer neighbors, or triggering BGP loop-detection, can be used to attract even more traffic than the strategy above. These counterintuitive examples are not merely hypothetical; we searched the empirical AS topology to identify specific ASes that can launch them. Finally, we find that a clever export policy can often attract almost as much traffic as a bogus path announcement. Thus, our work implies that mechanisms that police export policies (e.g., defensive filtering) are crucial, even if S-BGP is fully deployed.
机译:响应于高调的Internet中断,已提出BGP安全性变体,以防止虚假路由信息的传播。为了让人们讨论应该在Internet中部署哪种变体,我们量化了主要协议(原始身份验证,soBGP,S-BGP和数据平面验证)抑制流量吸引攻击的能力。也就是说,攻击者故意吸引流量以丢弃,篡改或窃听数据包.rnIntuition表示,攻击者可以通过广泛宣布安全协议未将其标记为虚假的短路径来最大化其吸引的流量。通过在经验上确定的AS级拓扑上进行仿真,我们表明,即使网络使用高级安全解决方案(如S-BGP或数据平面验证),该策略也出奇地有效。更糟糕的是,我们表明这些结果低估了攻击的严重性。我们证明找到最具破坏力的策略是NP困难的,并展示了违反直觉的策略(例如,宣布更长的路径,宣布给更少的邻居或触发BGP环路检测)可以比上述策略吸引更多的流量。这些违反直觉的例子不仅是假设的;我们搜索了经验性AS拓扑,以识别可以启动它们的特定AS。最后,我们发现,聪明的出口政策通常可以吸引到几乎与虚假道路公告一样多的交通。因此,我们的工作表明,即使S-BGP已完全部署,监管出口策略(例如防御性过滤)的机制也至关重要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号