DOI QR코드

DOI QR Code

BGP 보안을 위한 AS-PATH 식별 방법

AS-PATH Authentication algorithm for BGP Security

  • 김점구 (남서울대학교 컴퓨터소프트웨어학과)
  • 투고 : 2019.08.27
  • 심사 : 2019.09.21
  • 발행 : 2019.09.30

초록

인터넷 상의 사용자가 목적지 시스템으로 정보를 전송할 수 있도록 라우팅 정보를 서로 교환하여 라우팅 테이블을 생성하고 변화된 정보를 업데이트 해주는 라우팅 프로토콜 중 가장 중요한 프로토콜이 BGP 이다. 본 논문은 현재 사용되고 있는 BGPv4의 취약성을 이용하여 악의적인 공격과 네트워크 관리자의 실수로 발생할 수 있는 문제점을 사전에 차단하는 방법과 BGP의 대표적인 보안 취약점에 대한 공격기법인 AS-PATH 공격에 대한 실제 공격실험을 수행하여 공격기법들을 분석하고, AS-PATH 공격을 식별하는 알고리즘을 제안하였다.

BGP is the most important protocol among routing protocols that exchange routing information to create routing tables and update changed information so that users on the Internet can send information to destination systems. This paper analyzes how to prevent malicious attacks and problems caused by network administrator's mistakes by using vulnerabilities in BGPv4 that are currently used. We analyzed the attack methods by performing the actual attack experiment on the AS-PATH attack, which is the attack method for BGP's representative security vulnerability, and proposed the algorithm to identify the AS-PATH attack.

키워드

참고문헌

  1. Paul Watson, "Slipping In The window: TCP Reset Attacks", CanSecWest conference, 2014
  2. R White, "Securing BGP through secure origin BGP (soBGP)", BUSINESS COMMUNICATIONS REVIEW, 2013
  3. E, Kranakis, P.C. van Oorschot, and Tao Wan, "Security Issues in the Border Gateway Protocol (BGP)" , Technical Report 05-07, Carleton University, Ottawa, Canada, Mar. 19, 2005.
  4. O. Nordstrom, C. Dovrolis, "Beware of BGP Attacks", ACM SIGCOMM Computer Communications Review, Vol 34, No 2, April 2014.
  5. S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (Secure-BGP)", IEEE Journal on Selected Areas in Communications (JSAC), Vol. 18, No. 4, Apr. 2010, pp. 582-592. https://doi.org/10.1109/49.839934
  6. Yih-Chun Hu , Adrian Perrig , Marvin Sirbu, "SPV: secure path vector routing for securing BGP", In Proc. of ACM SIGCOMM Internet Measurement Workshop, August 30-September 03, 2004, Portland, Oregon, USA
  7. James Ng, "Extensions to BGP to Support Secure Origin BGP (soBGP)", Internet Draft, draft-ngsobgp-bgp-extensions-01, June 2003.
  8. R White, "Securing BGP through secure origin BGP (soBGP)", BUSINESS COMMUNICATIONS REVIEW, 2003
  9. J. Karlin, J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes", In Proc. of the 2006 IEEE International Conference on Network Protocols (ICNP), Santa Barbara, CA, USA, Nov. 12-15, 2006, pp. 290-299.
  10. S. Gibson, DRDoS(Distributed Reflection Denial of Service), Gibson Research Corporation, Feb 22 nd, 2012
  11. Selma Yilmaz, "An adaptive policy management approach to BGP convergence" , Boston University Graduate school of Arts and Science Docter of Philosophy , 2016
  12. Y. Rekhter, T. Li, and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, Jan. 2016.
  13. T. Wan, E. Kranakis, P. van Oorschot, "Pretty secure BGP(psBGP)", In Proc. NDSS (2005)
  14. 윤종호, "라우터와 라우팅 프로토콜", 교학사, 2003
  15. 김점구 "안전한 BGP를 위한 Fakr IP 식별방법", 한꾸차세대컴퓨팅학회 논문지, 2018
  16. http://www.zdnet.co.kr/ArticleView.asp?artice_id=20090729112938
  17. http://www.juniper.net/techpubs/software/erx/erx50x/swconfig-routing-vol2/html/bgp-config9.html