首页> 外文期刊>Dependable and Secure Computing, IEEE Transactions on >Invalidating Idealized BGP Security Proposals and Countermeasures
【24h】

Invalidating Idealized BGP Security Proposals and Countermeasures

机译:使理想化的BGP安全提议无效和对策

获取原文
获取原文并翻译 | 示例
           

摘要

Border Gateway Protocol (BGP) is vulnerable to routing attacks because of the lack of inherent verification mechanism. Several secure BGP schemes have been proposed to prevent routing attacks by leveraging cryptographic verification of BGP routing updates. In this paper, we present a new type of attacks, called TIGER, which aims to invalidate the “proven” security of these secure BGP schemes and allow ASes to announce forged routes even under full deployment of any existing secure BGP proposal. By launching TIGER attacks, malicious ASes can easily generate and announce forged routes which can be successfully verified by the existing secure BGP schemes. Furthermore, TIGER attacks can evade existing routing anomaly detection schemes by guaranteeing routing data-plane availability and consistency of control- and data-plane. Toward a new securing BGP scheme, we propose Anti-TIGER to detect and defend against TIGER attacks. Anti-TIGER enables robust TIGER detection by collaborations between ASes. In particular, we leverage Spread Spectrum Communication technique to watermark certain special probing packets, which manifest the existence of TIGER attacks. Anti-TIGER does not require any modifications in routing data-plane, therefore it is easy to deploy and incrementally deployable. We evaluate the effectiveness of TIGER and Anti-TIGER by experiments with real AS topologies of the Internet. Our experiment results show that TIGER attacks can successfully hijack a considerable number of prefixes. In the meanwhile, Anti-TIGER can achieve 100 percent detection ratio of TIGER attacks.
机译:边界网关协议(BGP)由于缺乏固有的验证机制而容易受到路由攻击。已经提出了几种安全的BGP方案,以通过利用BGP路由更新的密码验证来防止路由攻击。在本文中,我们提出了一种新型的攻击,称为TIGER,旨在使这些安全BGP方案的“经过验证的”安全性失效,并允许ASes在完全部署任何现有安全BGP提议的情况下宣布伪造的路由。通过发起TIGER攻击,恶意AS可以轻松生成和宣布伪造路由,这些伪造路由可以通过现有安全BGP方案成功验证。此外,TIGER攻击可以通过保证路由数据平面可用性以及控制平面和数据平面的一致性来规避现有的路由异常检测方案。对于一种新的安全BGP方案,我们建议使用Anti-TIGER来检测和防御TIGER攻击。 Anti-TIGER通过AS之间的协作实现强大的TIGER检测。特别是,我们利用扩频通信技术对某些特殊的探测数据包加水印,这表明存在TIGER攻击。 Anti-TIGER不需要在路由数据平面上进行任何修改,因此易于部署和可增量部署。我们通过对Internet的真实AS拓扑进行实验来评估TIGER和Anti-TIGER的有效性。我们的实验结果表明,TIGER攻击可以成功劫持大量前缀。同时,TIGER可以实现TIGER攻击的100%检测率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号