The state of affairs in BGP security: A survey of attacks and defenses

被引:33
|
作者
Mitseva, Asya [1 ]
Panchenko, Andriy [1 ]
Engel, Thomas [1 ]
机构
[1] Univ Luxembourg, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
关键词
Border Gateway Protocol (BGP); Internet routing; Security; ROUTING ANOMALIES; INTERDOMAIN; ANNOUNCEMENTS; TRACEROUTE; SIGNATURES; ISSUES;
D O I
10.1016/j.comcom.2018.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP) is the de facto standard interdomain routing protocol. Despite its critical role on the Internet, it does not provide any security guarantees. In response to this, a large amount of research has proposed a wide variety BGP security extensions and detection-recovery systems in recent decades. Nevertheless, BGP remains vulnerable to many types of attack. In this work, we conduct an up-to-date review of fundamental BGP threats and present a methodology for evaluation of existing BGP security proposals. Based on this, we introduce a comprehensive and up-to-date survey of proposals intended to make BGP secure and methods for detection and mitigation of routing instabilities. Last but not least, we identify gaps in research, and pinpoint open issues and unsolved challenges.
引用
收藏
页码:45 / 60
页数:16
相关论文
共 50 条
  • [21] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [22] EM Side Channels in Hardware Security: Attacks and Defenses
    He, Jiaji
    Guo, Xiaolong
    Tehranipoor, Mark
    Vassilev, Apostol
    Jin, Yier
    [J]. IEEE DESIGN & TEST, 2022, 39 (02) : 100 - 111
  • [23] Security of Online Reputation Systems The evolution of attacks and defenses
    Sun, Yan
    Liu, Yuhong
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (02) : 87 - 97
  • [24] Intelligent Connected Vehicle Security: Threats, Attacks and Defenses*
    Wang, Xifeng
    Sun, Limin
    Wang, Chao
    Zhu, Hongsong
    Zhao, Lian
    Yang, Shujie
    Xu, Changqiao
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (06) : 1265 - 1303
  • [25] State affairs - Survey
    Munter, D
    [J]. DEUTSCHE MEDIZINISCHE WOCHENSCHRIFT, 1912, 38 : 1744 - 1745
  • [26] State of the art on adversarial attacks and defenses in graphs
    Zhengli Zhai
    Penghui Li
    Shu Feng
    [J]. Neural Computing and Applications, 2023, 35 : 18851 - 18872
  • [27] State of the art on adversarial attacks and defenses in graphs
    Zhai, Zhengli
    Li, Penghui
    Feng, Shu
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (26): : 18851 - 18872
  • [28] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    [J]. INFORMATION FUSION, 2024, 107
  • [29] Security Attacks inIoT: A Survey
    Deogirikar, Jyoti
    Vidhate, Amarsinh
    [J]. 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 32 - 37
  • [30] A Survey of Security Techniques for the Border Gateway Protocol (BGP)
    Nicholes, Martin O.
    Mukherjee, Biswanath
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 52 - 65