Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP

被引:4
|
作者
Song, Yang [1 ]
Venkataramani, Arun [1 ]
Gao, Lixin [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
关键词
D O I
10.1109/ICDCS.2013.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers have studied a number of control and data plane attacks on BGP, the Internet's interdomain routing protocol, in the presence of malicious ASes. These prior efforts have largely focused on attacks that can be addressed using traditional cryptographic mechanisms to ensure authentication or integrity (e.g., S-BGP). Although augmenting BGP with authentication and integrity mechanisms is critical, it is far from sufficient to prevent attacks based on manipulating the complex BGP protocol itself. In this paper, we identify two serious protocol manipulation attacks that undermine the two most fundamental goals of the BGP control plane-to ensure reachability and enable ASes to pick routes according to their policies-despite the presence of S-BGP- like mechanisms. Our key contributions are to (1) formalize two critical security properties, (2) experimentally validate using commodity router implementations that BGP fails to achieve them, (3) quantify the extent of the resulting vulnerabilities in the Internet's AS topology, and (4) design and implement simple modifications to provably ensure that those properties are satisfied. Our experiments show that, a single malicious AS can cause thousands of other ASes to become disconnected from thousands of other ASes for arbitrarily long, while our proposed modifications almost completely eliminates such attacks.
引用
收藏
页码:550 / 559
页数:10
相关论文
共 50 条
  • [41] Detection and Avoidance of Unified Attacks on MANET using Trusted Secure AODV Routing Protocol
    Singh, Upendra
    Samvatsar, Makrand
    Sharma, Ashish
    Jain, Ashish Kumar
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [42] A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 754 - 765
  • [43] Multi-party quantum key agreement protocol secure against collusion attacks
    Wang, Ping
    Sun, Zhiwei
    Sun, Xiaoqiang
    [J]. QUANTUM INFORMATION PROCESSING, 2017, 16 (07)
  • [44] A Deep-Learning-Based Secure Routing Protocol to Avoid Blackhole Attacks in VANETs
    Amalia, Amalia
    Pramitarini, Yushintia
    Perdana, Ridho Hendra Yoga
    Shim, Kyusung
    An, Beongku
    [J]. SENSORS, 2023, 23 (19)
  • [45] Construction of a hybrid HIBE protocol secure against adaptive attacks - (Without random oracle)
    Sarkar, Palash
    Chatterjee, Sanjit
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 51 - +
  • [46] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    [J]. 2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [47] SICO: Surgical Interception Attacks by Manipulating BGP Communities
    Birge-Lee, Henry
    Wang, Liang
    Rexford, Jennifer
    Mittal, Prateek
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 431 - 448
  • [48] On interdomain routing security and pretty secure BGP (psBGP)
    van Oorschot, P. C.
    Wan, Tao
    Kranakis, Evangelos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [49] SPV: Secure Path Vector routing for securing BGP
    Hu, YC
    Perrig, A
    Sirbu, M
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 179 - 192
  • [50] Path stability in partially deployed secure BGP routing
    Yang, Yan
    Shi, Xingang
    Ma, Qiang
    Li, Yahui
    Yin, Xia
    Wang, Zhiliang
    [J]. COMPUTER NETWORKS, 2022, 206