Title :
Securing the Global Information Grid Routing Control Plane
Author :
Chao, Victor ; Christou, Christios A. ; Tarr, Julie
Author_Institution :
Booz, Allen & Hamilton Inc.
Abstract :
The GIG is a complex ubiquitous network compromised of military, government research, and intelligence community (IC) user networks characterized by vastly differing network topologies. Interconnecting GIG networks and nodes, while supporting DoD´s ongoing commitment towards IA, requires securing the peering sessions and routing information exchanges within the GIG routing control plane. Based on large-scale incidents on the Internet, elements within the routing control plane are particularly susceptible to vulnerabilities given insufficient preventive measures. A combination of adopting best common industry practices for hardening routing protocols, utilizing inherent routing protocol security features and leveraging additional next-generation network security measures will prevent the GIG from both intended and inadvertent insider and outsider attacks. Because the GIG network topology differs vastly from those based on Internet-like conditions, routing protocols will encounter the severest of network conditions. The advent of network mobility within the tactical regions of the GIG presents newfound challenges in terms of the operational costs and complexity of traditional routing security mechanisms. Robustness of the routing control flows under any condition or under any network attack is placed at the forefront of operational concerns. An in-depth security analysis of GIG inter-and intra-domain routing protocols in consideration is provided, thus allowing GIG network architects the capability to design their networks according to recommendations for maintaining message confidentiality and integrity, performing route peer authentication and authorization, utilizing adequate route policy and filtering mechanisms, and ensuring route origin authentication and path validity
Keywords :
Internet; computer network reliability; filtering theory; government; military communication; routing protocols; telecommunication network topology; telecommunication security; ubiquitous computing; DoD; GIG routing control plane; Global Information Grid; Internet; filtering mechanism; government research; in-depth security analysis; information exchange; intelligence community; network interconnection; network topology; routing protocol; tactical region; ubiquitous network; vulnerability; Authentication; Government; Information security; Intelligent networks; Internet; Large-scale systems; Network topology; Particle measurements; Peer to peer computing; Routing protocols;
Conference_Titel :
Military Communications Conference, 2006. MILCOM 2006. IEEE
Conference_Location :
Washington, DC
Print_ISBN :
1-4244-0617-X
Electronic_ISBN :
1-4244-0618-8
DOI :
10.1109/MILCOM.2006.302100