Title :
Use of Distributed Trustworthy Node to Secure AS_PATH
Author :
Lingjing Kong ; Huaxin Zeng
Author_Institution :
Sch. of Inf. Sci. & Technol., Southwest Jiaotong Univ., Chengdu, China
Abstract :
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive solution, S-BGP is always a hot topic in all of countermeasures against BGP attacks. Having analyzed the inadequacy of S-BGP, this paper proposes a method of secure AS_PATH - SAP, which can simplify route validation process, reduce the computational overhead and storage. Basis on three components -- Key generator (KG), Trustworthy Node (TN) and Evaluation Mechanism (EM) the essay specifies the principle of SAP. Finally, this paper gives comparison of these two methods and shows a better scenario.
Keywords :
Internet; computer network security; telecommunication network routing; trusted computing; BGP attacks; EM; Internet; KG; S-BGP; TN; computational overhead reduction; crucial interdomain protocol; distributed trustworthy node; evaluation mechanism; key generator; multidomain networks; network attackers; route validation process; routing information exchange; secure AS-PATH-SAP; troublesome thing; trustworthy node; IP networks; Internet; Peer to peer computing; Protocols; Public key; Routing; BGP; Routing; S-BGP; Security;
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-3093-0
DOI :
10.1109/MINES.2012.247