Blockchain-based Validation Method for Inter-domain Routing Policy Compliance

被引:0
|
作者
Chen D. [1 ,2 ,3 ]
Qiu H. [1 ,2 ]
Zhu J.-H. [1 ,2 ]
Wang Q.-X. [1 ,2 ]
Fan S.-W. [4 ]
机构
[1] Information Engineering University, Zhengzhou
[2] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou
[3] State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, Luoyang
[4] School of Software, Zhengzhou University, Zhengzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 09期
关键词
blockchain; inter-domain routing security; route attestation; routing policy compliance;
D O I
10.13328/j.cnki.jos.006660
中图分类号
学科分类号
摘要
Various business relationships and routing policies exist among the autonomous systems (ASes) in an inter-domain routing system. Routing propagation violating the export policy agreements among the ASes is likely to cause route leaks, ultimately leading to serious consequences such as network interruption, traffic eavesdropping, and link overload. Verifying routing policy compliance is thus essential for ensuring the security and stability of the inter-domain routing system. However, the dual requirements of ASes for the autonomous configuration and privacy protection of local routing policies increase the difficulty in verifying routing policy compliance and consequently pose a hard problem that remains to be settled properly in the field of inter-domain routing security. This study proposes a blockchain-based verification method for inter-domain routing policy compliance. With blockchain and the cryptographic technology as trust endorsements, this method enables ASes to publish, interact, verify, and execute routing policy expectations in a safe and private manner. The authenticity of the routing propagation process is ensured by generating route attestations corresponding to routing updates. Thus, the verification of routing policy compliance is completed by multi-domain cooperation. A prototype system is implemented, and experiments and analyses are carried out on real routing data. The results show that the proposed method offers traceable verification of export policy compliance of routing propagation without leaking the business relationships and local routing policies among ASes, suppresses policy-violating routing propagation effectively with reasonable overhead, and maintains a remarkable ability to suppress policy-violating routing even in partial deployment scenarios. © 2023 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:4336 / 4350
页数:14
相关论文
共 37 条
  • [1] Rekhter Y, Li T, Hares S., A border gateway protocol 4 (BGP-4), (2006)
  • [2] Nordstrom O, Dovrolis C., Beware of BGP attacks, ACM SIGCOMM Computer Communication Review, 34, 2, pp. 1-8, (2004)
  • [3] Kent S, Lynn C, Seo K., Secure border gateway protocol (S-BGP), IEEE Journal on Selected Areas in Communications, 18, 4, pp. 582-592, (2000)
  • [4] White R., Securing BGP through secure origin BGP (soBGP), Business Communications Review, 33, 5, pp. 47-53, (2003)
  • [5] Goodell G, Aiello W, Griffin T, Ioannidis J, McDanial PD, Rubin AD., Working around BGP: An incremental approach to improving security and accuracy in interdomain routing, Proc. of the 2003 Network and Distributed System Security Symp, (2003)
  • [6] Lepinski M, Kent S., An infrastructure to support secure internet routing, (2012)
  • [7] Lepinski M, Sriram K., BGPSEC protocol specification, RFC 8205, (2017)
  • [8] Gill P, Schapira M, Goldberg S., A survey of interdomain routing policies, ACM SIGCOMM Computer Communication Review, 44, 1, pp. 28-34, (2014)
  • [9] Gao LX, Rexford J., Stable Internet routing without global coordination, IEEE/ACM Trans. on Networking, 9, 6, pp. 681-692, (2001)
  • [10] Griffin TG, Shepherd FB, Wilfong G., The stable paths problem and interdomain routing, IEEE/ACM Trans. on Networking, 10, 2, pp. 232-243, (2002)