DocumentCode :
3478246
Title :
Securing the border gateway routing protocol
Author :
Smith, Bradley R. ; Garcia-Luna-Aceves, J.J.
Author_Institution :
Comput. Sci., California Univ., Santa Cruz, CA, USA
fYear :
1996
fDate :
18-22 Nov 1996
Firstpage :
81
Lastpage :
85
Abstract :
We analyze the security of the border gateway routing protocol and identify a number of vulnerabilities in its design and the corresponding threats. We then present a set of proposed modifications to the protocol which minimize or eliminate the most significant threats. The innovation we introduce is the protection of the second-to-last information contained in the autonomous path attributes by the digital signatures, and the use of techniques developed for detecting loops in path-finding protocols to verify the selected route´s path information. With these techniques we are able to secure full path information in near constant space, and avoid the recursive protection mechanisms previously assumed necessary
Keywords :
Internet; data privacy; internetworking; security of data; telecommunication network routing; transport protocols; Internet; autonomous path attributes; border gateway routing protocol; digital signatures; loops detection; path finding protocols; protocol modifications; route path information; second to last information protection; security; threats; transport protocol; vulnerabilities; Computer architecture; Computer security; Data security; IP networks; Information security; Instruction sets; Internet; Protection; Routing protocols; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 1996. GLOBECOM '96. 'Communications: The Key to Global Prosperity
Conference_Location :
London
Print_ISBN :
0-7803-3336-5
Type :
conf
DOI :
10.1109/GLOCOM.1996.586129
Filename :
586129
Link To Document :
بازگشت