Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP

被引:4
|
作者
Song, Yang [1 ]
Venkataramani, Arun [1 ]
Gao, Lixin [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
关键词
D O I
10.1109/ICDCS.2013.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers have studied a number of control and data plane attacks on BGP, the Internet's interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane-to ensure reachability and enable ASes to pick routes according to their policies-despite the presence of S-BGP- like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet's AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
引用
收藏
页码:550 / 559
页数:10
相关论文
共 50 条
  • [21] A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks
    Babu, E. Suresh
    Nagaraju, C.
    Prasad, M. H. M. Krishna
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 339 - 344
  • [22] SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    Madria, Sanjay
    Yin, Jian
    [J]. AD HOC NETWORKS, 2009, 7 (06) : 1051 - 1063
  • [23] HB++:: a lightweight authentication protocol secure against some attacks
    Bringer, Julien
    Chabanne, Herve
    Dottax, Emmanuelle
    [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 28 - +
  • [24] An efficient identification protocol secure against concurrent-reset attacks
    Wu, J.
    Stinson, D. R.
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (04) : 339 - 352
  • [25] A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs
    Padmanabhan, Jayashree
    Subramaniam, Tamil Selvan Raman
    Prakasam, Kumaresh
    Ponpandiyan, Vigneswaran
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 541 - 548
  • [26] A Group-Key Agreement Protocol Secure against The Malleability Attacks
    Arita, Seiko
    Sakuma, Akihiko
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 525 - 530
  • [27] A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
    Saxena, Amitabh
    Soh, Ben
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 4 - +
  • [28] Design of Secure Network Protocol to Defend against Fragmented Packet Attacks
    Lee, Daesung
    Kim, Kuinam J.
    Kim, Ki Chang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3759 - 3771
  • [29] A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments
    Yu, Ming
    Zhou, Mengchu
    Su, Wei
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (01) : 449 - 460
  • [30] Identifying BGP routing table transfers
    Cheng, Pei-chun
    Zhang, Beichuan
    Massey, Daniel
    Zhang, Lixia
    [J]. COMPUTER NETWORKS, 2011, 55 (03) : 636 - 649