DocumentCode :
652905
Title :
Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
Author :
Yang Song ; Venkataramani, Arun ; Lixin Gao
Author_Institution :
Univ. of Massachusetts, Amherst, MA, USA
fYear :
2013
fDate :
8-11 July 2013
Firstpage :
550
Lastpage :
559
Abstract :
Over more than a decade, researchers have studied a number of control and data plane attacks on BGP, the Internet´s interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane -- to ensure reachability and enable ASes to pick routes according to their routing policies -- despite the presence of S-BGP-like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet´s AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
Keywords :
Internet; computer network security; cryptography; internetworking; reachability analysis; routing protocols; telecommunication network topology; Internet interdomain routing protocol; S-BGP-like mechanisms; authentication mechanism; border gateway protocol; commodity router implementations; cryptographic mechanisms; integrity mechanism; malicious ASes; protocol manipulation attack address; protocol manipulation attack identification; reachability; secure BGP control plane; Authentication; Erbium; Routing; Routing protocols; Steady-state;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on
Conference_Location :
Philadelphia, PA
ISSN :
1063-6927
Type :
conf
DOI :
10.1109/ICDCS.2013.32
Filename :
6681624
Link To Document :
بازگشت