Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.3.003

AS-PATH Authentication algorithm for BGP Security  

Kim, Jeom Goo (남서울대학교 컴퓨터소프트웨어학과)
Publication Information
Abstract
BGP is the most important protocol among routing protocols that exchange routing information to create routing tables and update changed information so that users on the Internet can send information to destination systems. This paper analyzes how to prevent malicious attacks and problems caused by network administrator's mistakes by using vulnerabilities in BGPv4 that are currently used. We analyzed the attack methods by performing the actual attack experiment on the AS-PATH attack, which is the attack method for BGP's representative security vulnerability, and proposed the algorithm to identify the AS-PATH attack.
Keywords
Internet; BGP; router; AS-PATH; Vulnerability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Paul Watson, "Slipping In The window: TCP Reset Attacks", CanSecWest conference, 2014
2 R White, "Securing BGP through secure origin BGP (soBGP)", BUSINESS COMMUNICATIONS REVIEW, 2013
3 E, Kranakis, P.C. van Oorschot, and Tao Wan, "Security Issues in the Border Gateway Protocol (BGP)" , Technical Report 05-07, Carleton University, Ottawa, Canada, Mar. 19, 2005.
4 O. Nordstrom, C. Dovrolis, "Beware of BGP Attacks", ACM SIGCOMM Computer Communications Review, Vol 34, No 2, April 2014.
5 S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (Secure-BGP)", IEEE Journal on Selected Areas in Communications (JSAC), Vol. 18, No. 4, Apr. 2010, pp. 582-592.   DOI
6 Yih-Chun Hu , Adrian Perrig , Marvin Sirbu, "SPV: secure path vector routing for securing BGP", In Proc. of ACM SIGCOMM Internet Measurement Workshop, August 30-September 03, 2004, Portland, Oregon, USA
7 James Ng, "Extensions to BGP to Support Secure Origin BGP (soBGP)", Internet Draft, draft-ngsobgp-bgp-extensions-01, June 2003.
8 S. Gibson, DRDoS(Distributed Reflection Denial of Service), Gibson Research Corporation, Feb 22 nd, 2012
9 R White, "Securing BGP through secure origin BGP (soBGP)", BUSINESS COMMUNICATIONS REVIEW, 2003
10 J. Karlin, J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes", In Proc. of the 2006 IEEE International Conference on Network Protocols (ICNP), Santa Barbara, CA, USA, Nov. 12-15, 2006, pp. 290-299.
11 Selma Yilmaz, "An adaptive policy management approach to BGP convergence" , Boston University Graduate school of Arts and Science Docter of Philosophy , 2016
12 Y. Rekhter, T. Li, and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, Jan. 2016.
13 T. Wan, E. Kranakis, P. van Oorschot, "Pretty secure BGP(psBGP)", In Proc. NDSS (2005)
14 윤종호, "라우터와 라우팅 프로토콜", 교학사, 2003
15 김점구 "안전한 BGP를 위한 Fakr IP 식별방법", 한꾸차세대컴퓨팅학회 논문지, 2018
16 http://www.zdnet.co.kr/ArticleView.asp?artice_id=20090729112938
17 http://www.juniper.net/techpubs/software/erx/erx50x/swconfig-routing-vol2/html/bgp-config9.html