Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP

被引:4
|
作者
Song, Yang [1 ]
Venkataramani, Arun [1 ]
Gao, Lixin [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
关键词
D O I
10.1109/ICDCS.2013.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers have studied a number of control and data plane attacks on BGP, the Internet's interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane-to ensure reachability and enable ASes to pick routes according to their policies-despite the presence of S-BGP- like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet's AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
引用
收藏
页码:550 / 559
页数:10
相关论文
共 50 条
  • [1] Identifying and Addressing Reachability and Policy Attacks in "Secure" BGP
    Song, Yang
    Venkataramani, Arun
    Gao, Lixin
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2986 - 2999
  • [2] Finding Protocol Manipulation Attacks
    Kothari, Nupur
    Mahajan, Ratul
    Millstein, Todd
    Govindan, Ramesh
    Musuvathi, Madanlal
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 26 - 37
  • [3] Secure Border Gateway Protocol (S-BGP)
    Kent, S
    Lynn, C
    Seo, K
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 582 - 592
  • [4] Identifying flaws in the Secure Routing Protocol
    Marshall, J
    Thakur, V
    Yasinsac, A
    [J]. 2003 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE PROCEEDINGS, 2003, : 167 - 174
  • [5] Beware of BGP attacks
    Nordström, O
    Dovrolis, C
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 1 - 8
  • [6] Credible BGP - Extensions to BGP for Secure Networking
    Israr, Junaid
    Guennoun, Mouhcine
    Mouftah, Hussein T.
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 212 - 216
  • [7] B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
    Sankar, A. U. Prem
    Poornachandran, Prabaharan
    Ashok, Aravind
    Manu, R. K.
    Hrudya, P.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 767 - 775
  • [8] Credible-BGP: A Hybrid Cryptosystem to Secure BGP
    Israr, Junaid
    Guennoun, Mouhcine
    Mouftah, Hussein T.
    Rahman, Sk Md Mizanur
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [9] BGP with BGPsec: Attacks and Countermeasures
    Li, Qi
    Liu, Jiajia
    Hu, Yih-Chun
    Xu, Mingwei
    Wu, Jianping
    [J]. IEEE NETWORK, 2019, 33 (04): : 194 - 200
  • [10] SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks
    Arora, Sanidhay
    Li, Yingjiu
    Feng, Yebo
    Xu, Jiahua
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1394 - 1405