首页> 外文期刊>Networks, IET >Effective border gateway protocol protection that does not require universal adoption of a public key infrastructure
【24h】

Effective border gateway protocol protection that does not require universal adoption of a public key infrastructure

机译:有效的边界网关协议保护,不需要普遍采用公钥基础结构

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Although it is fundamental to inter-domain routing in the Internet, the border gateway protocol (BGP) is susceptible to both misconfiguration and malicious attacks. Prefix-hijacking problems arise when an Internet service provider incorrectly advertises a route to one or more prefixes, and path hijacking problems arise when an advertisement contains an incorrect path. Several proposals have been made for ways to avoid or at least ameliorate catastrophic outcomes (such as black holes and man-in-the-middle attacks) that can occur as the result of a hijack. The techniques can be divided into two broad categories: those that use an external authority to validate incoming BGP information and those that validate incoming BGP messages against a historical record of past BGP advertisements. The study begins by defining terms, reviewing the existing methods, and explaining approaches used for external validation. It considers the effectiveness of each mechanism. The study then proposes a hybrid scheme that combines the use of an external authority and historical validation to improve effectiveness. It discusses the difference between our approach and validation using certificates plus a public key infrastructure. We show that it is possible to construct a hybrid hijack deterrent scheme that does not depend on a public key infrastructure and yet remains as effective as schemes that rely on the resource public key infrastructure and certificates to validate path origins. We present measurements that show the cost of maintaining a local cache of registry information and a local cache of historical data as well as the effectiveness of our approach.
机译:尽管这是Internet中域间路由的基础,但边界网关协议(BGP)容易受到配置错误和恶意攻击的影响。当Internet服务提供商错误地向一个或多个前缀发布路由时,会出现前缀劫持问题,而当广告包含不正确的路径时,就会出现路径劫持问题。对于如何避免或至少减轻劫机事件可能导致的灾难性后果(例如黑洞和中间人攻击),已经提出了一些建议。这些技术可以分为两大类:使用外部权限验证传入的BGP信息的技术,以及根据过去BGP通告的历史记录验证传入的BGP消息的技术。该研究首先定义术语,回顾现有方法并解释用于外部验证的方法。它考虑了每种机制的有效性。然后,研究提出了一种混合方案,该方案将外部权限的使用和历史验证相结合,以提高有效性。它讨论了我们的方法与使用证书和公钥基础结构进行验证之间的区别。我们表明,有可能构建一个不依赖公钥基础结构,但仍与依赖资源公钥基础结构和证书来验证路径来源的方案一样有效的混合劫持威慑方案。我们提供的度量表明维护注册表信息的本地缓存和历史数据的本地缓存的成本,以及我们方法的有效性。

著录项

  • 来源
    《Networks, IET》 |2012年第4期|p.217-228|共12页
  • 作者

    Comer D.; Singh P.; Vasudevan S.;

  • 作者单位

    Computer Science Department, Purdue University, West Lafayette, IN 47907, USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号