The state of affairs in BGP security: A survey of attacks and defenses

被引:33
|
作者
Mitseva, Asya [1 ]
Panchenko, Andriy [1 ]
Engel, Thomas [1 ]
机构
[1] Univ Luxembourg, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
关键词
Border Gateway Protocol (BGP); Internet routing; Security; ROUTING ANOMALIES; INTERDOMAIN; ANNOUNCEMENTS; TRACEROUTE; SIGNATURES; ISSUES;
D O I
10.1016/j.comcom.2018.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP) is the de facto standard interdomain routing protocol. Despite its critical role on the Internet, it does not provide any security guarantees. In response to this, a large amount of research has proposed a wide variety BGP security extensions and detection-recovery systems in recent decades. Nevertheless, BGP remains vulnerable to many types of attack. In this work, we conduct an up-to-date review of fundamental BGP threats and present a methodology for evaluation of existing BGP security proposals. Based on this, we introduce a comprehensive and up-to-date survey of proposals intended to make BGP secure and methods for detection and mitigation of routing instabilities. Last but not least, we identify gaps in research, and pinpoint open issues and unsolved challenges.
引用
收藏
页码:45 / 60
页数:16
相关论文
共 50 条
  • [1] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [2] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [3] Physical security devices for computer subsystems: A survey of attacks and defenses
    Weingart, SH
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 302 - 317
  • [4] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [5] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [6] A Survey of BGP Security Issues and Solutions
    Butler, Kevin
    Farley, Toni R.
    McDaniel, Patrick
    Rexford, Jennifer
    [J]. PROCEEDINGS OF THE IEEE, 2010, 98 (01) : 100 - 122
  • [7] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [8] Survey of Attacks and Defenses against SGX
    Zhang, Yahui
    Zhao, Min
    Li, Tingquan
    Han, Huan
    [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496
  • [9] Cyber Security of Smart Grid: Attacks and Defenses
    Nguyen, Tu N.
    Liu, Bing-Hong
    Nguyen, Nam P.
    Chou, Jung-Te
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [10] Market Manipulation as a Security Problem: Attacks and Defenses
    Mavroudis, Vasilios
    [J]. PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,