Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP

被引:4
|
作者
Song, Yang [1 ]
Venkataramani, Arun [1 ]
Gao, Lixin [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
关键词
D O I
10.1109/ICDCS.2013.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers have studied a number of control and data plane attacks on BGP, the Internet's interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane-to ensure reachability and enable ASes to pick routes according to their policies-despite the presence of S-BGP- like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet's AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
引用
收藏
页码:550 / 559
页数:10
相关论文
共 50 条
  • [31] Temporal Representations for Detecting BGP Blackjack Attacks
    Copstein, Rafael
    Zincir-Heywood, Nur
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [32] HEAP: Reliable Assessment of BGP Hijacking Attacks
    Schlamp, Johann
    Holz, Ralph
    Jacquemart, Quentin
    Carle, Georg
    Biersack, Ernst W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (06) : 1849 - 1861
  • [33] OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Xu, Jiayu
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 456 - 486
  • [34] A new secure routing protocol to defend Byzantine attacks for ad hoc networks
    Yu, M
    Kulkarni, S
    Lau, P
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1126 - 1131
  • [35] A hierarchical secure routing protocol against black hole attacks in sensor networks
    Yin, Jian
    Madria, Sanjay Kumar
    [J]. IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 376 - +
  • [36] Design and simulation of a supplemental protocol for BGP
    Yeh, JH
    Zhang, W
    Hu, WC
    Lee, CW
    [J]. COMPUTER NETWORKS, 2005, 49 (02) : 172 - 200
  • [37] The state of affairs in BGP security: A survey of attacks and defenses
    Mitseva, Asya
    Panchenko, Andriy
    Engel, Thomas
    [J]. COMPUTER COMMUNICATIONS, 2018, 124 : 45 - 60
  • [38] A Study on a Secure Protocol against Tampering and Replay Attacks Focused on Data Field of CAN
    Araki, Shunsuke
    Tashiro, Akiyoshi
    Kakizaki, Ken'ichi
    Uehara, Satoshi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [39] Multi-party quantum key agreement protocol secure against collusion attacks
    Ping Wang
    Zhiwei Sun
    Xiaoqiang Sun
    [J]. Quantum Information Processing, 2017, 16
  • [40] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002