The state of affairs in BGP security: A survey of attacks and defenses

被引:33
|
作者
Mitseva, Asya [1 ]
Panchenko, Andriy [1 ]
Engel, Thomas [1 ]
机构
[1] Univ Luxembourg, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
关键词
Border Gateway Protocol (BGP); Internet routing; Security; ROUTING ANOMALIES; INTERDOMAIN; ANNOUNCEMENTS; TRACEROUTE; SIGNATURES; ISSUES;
D O I
10.1016/j.comcom.2018.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP) is the de facto standard interdomain routing protocol. Despite its critical role on the Internet, it does not provide any security guarantees. In response to this, a large amount of research has proposed a wide variety BGP security extensions and detection-recovery systems in recent decades. Nevertheless, BGP remains vulnerable to many types of attack. In this work, we conduct an up-to-date review of fundamental BGP threats and present a methodology for evaluation of existing BGP security proposals. Based on this, we introduce a comprehensive and up-to-date survey of proposals intended to make BGP secure and methods for detection and mitigation of routing instabilities. Last but not least, we identify gaps in research, and pinpoint open issues and unsolved challenges.
引用
收藏
页码:45 / 60
页数:16
相关论文
共 50 条
  • [31] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127
  • [32] Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
    Jakub Szefer
    [J]. Journal of Hardware and Systems Security, 2019, 3 (3) : 219 - 234
  • [33] A survey on cybersecurity attacks and defenses for unmanned aerial systems
    Wang, Zhaoxuan
    Li, Yang
    Wu, Shihao
    Zhou, Yuan
    Yang, Libin
    Xu, Yuan
    Zhang, Tianwei
    Pan, Quan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [34] A survey on blockchain systems: Attacks, defenses, and privacy preservation
    Chen, Yourong
    Chen, Hao
    Zhang, Yang
    Han, Meng
    Siddula, Madhuri
    Cai, Zhipeng
    [J]. HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [35] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401
  • [36] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu, Ai-Shan
    Guo, Jun
    Li, Si-Min
    Xiao, Yi-Song
    Liu, Xiang-Long
    Tao, Da-Cheng
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [37] A Survey of Exploitation Techniques and Defenses for Program Data Attacks
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 154
  • [38] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    [J]. IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [39] Visual privacy attacks and defenses in deep learning: a survey
    Guangsheng Zhang
    Bo Liu
    Tianqing Zhu
    Andi Zhou
    Wanlei Zhou
    [J]. Artificial Intelligence Review, 2022, 55 : 4347 - 4401
  • [40] A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses
    Liu, Peidong
    He, Longtao
    Li, Zhoujun
    [J]. IEEE ACCESS, 2023, 11 : 26033 - 26047