Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols

被引:1
|
作者
Sriram, Vinay K. [1 ]
Montgomery, Doug [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] NIST, Gaithersburg, MD 20899 USA
关键词
Routing security; Border Gateway Protocol security; BGPSEC; Performance optimization; Route processor efficiency;
D O I
10.1016/j.comcom.2017.03.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router. Published by Elsevier B.V.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 50 条
  • [41] Analysis of optimization algorithms for stability and convergence for natural language processing using deep learning algorithms
    Gangadhar C.
    Moutteyan M.
    Vallabhuni R.R.
    Vijayan V.P.
    Sharma N.
    Theivadas R.
    [J]. Measurement: Sensors, 2023, 27
  • [42] ANALYSIS AND DESIGN OF OPTIMIZATION ALGORITHMS VIA INTEGRAL QUADRATIC CONSTRAINTS
    Lessard, Laurent
    Recht, Benjamin
    Packard, Andrew
    [J]. SIAM JOURNAL ON OPTIMIZATION, 2016, 26 (01) : 57 - 95
  • [43] Analysis of Some Global Optimization Algorithms for Space Trajectory Design
    Vasile, M.
    Minisci, E.
    Locatelli, M.
    [J]. JOURNAL OF SPACECRAFT AND ROCKETS, 2010, 47 (02) : 334 - 344
  • [44] Performance analysis of three heuristic algorithms for airfoil design optimization
    Lian, Bo
    Yan, Hongxin
    Wang, Junye
    [J]. INTERNATIONAL JOURNAL OF GREEN ENERGY, 2022, 19 (04) : 349 - 364
  • [45] Application of Swarm Intelligence Optimization Algorithms in Image Processing: A Comprehensive Review of Analysis, Synthesis, and Optimization
    Xu, Minghai
    Cao, Li
    Lu, Dongwan
    Hu, Zhongyi
    Yue, Yinggao
    [J]. BIOMIMETICS, 2023, 8 (02)
  • [46] Stability Analysis and Convergence Control of Iterative Algorithms for Reliability Analysis and Design Optimization
    Yang, Dixiong
    Xiao, Hui
    [J]. JOURNAL OF MECHANICAL DESIGN, 2013, 135 (03)
  • [47] Design of Social Security Data Processing and Analysis Platform Based on Spark
    Yuan Tianwei
    Xie Xiaolan
    Zhou Xiao
    [J]. ICIIP'18: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING, 2018, : 172 - 177
  • [48] Design and Optimization of Reversible Information Hiding Image Encryption Algorithms in the Context of Electronic Information Security
    Zhang, Li
    Shan, Keke
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1275 - 1284
  • [49] A diagnosis optimization system for grain processing based on multiple data analysis algorithms
    Fang, Haocheng
    Zhou, Kang
    Zou, Yilin
    Deng, Weilin
    He, Xin
    Zhou, Jiapeng
    [J]. SYSTEMS SCIENCE & CONTROL ENGINEERING, 2019, 7 (02) : 96 - 107
  • [50] Determination of factors that affect the design of cryptographic algorithms by a cybernetic meta-model, validated with Q-analysis
    Norouzzadeh-GilMolk, Ali
    Ramazani-Khorshiddoust, Reza
    Aref, Mohammad
    [J]. INGENIERIA UC, 2020, 27 (01): : 29 - 41