메뉴 건너뛰기




Volumn 11, Issue 1, 2009, Pages 52-65

A survey of security techniques for the Border Gateway Protocol (BGP)

Author keywords

Bgp routing; Bgp security; Border gateway protocol (bgp); Index terms internet; Survey

Indexed keywords

AUTONOMOUS SYSTEMS; BGP ROUTING; BGP SECURITY; BORDER GATEWAY PROTOCOL; BORDER GATEWAY PROTOCOL (BGP); CORE INTERNET; DATA-PLANE TESTING; INDEX TERMS-INTERNET; INTERNET APPLICATION; LOCAL NETWORKS; NETWORK-CONTROLLED; ROUTING INFORMATION; WEB SURFING;

EID: 70449418120     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2009.090105     Document Type: Article
Times cited : (32)

References (52)
  • 2
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • B. Kumar, "Integration of security in network routing protocols," ACM SIGSAC Review, vol.11, no.2, pp. 18-25, 1993.
    • (1993) ACM SIGSAC Review , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 6
    • 0342446307 scopus 로고    scopus 로고
    • Protection of BGP sessions via the TCP MD5 signature option
    • A. Heffernan, "Protection of BGP sessions via the TCP MD5 signature option," IETF, RFC 2385, 1998.
    • (1998) IETF, RFC 2385
    • Heffernan, A.1
  • 8
    • 70449458187 scopus 로고    scopus 로고
    • Validation of the multiple origin ASes conflicts through BGP community attribute
    • X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "Validation of the multiple origin ASes conflicts through BGP community attribute," IETF Draft, 2001.
    • (2001) IETF Draft
    • Zhao, X.1    Pei, D.2    Wang, L.3    Massey, D.4    Mankin, A.5    Wu, S.F.6    Zhang, L.7
  • 9
    • 34548765292 scopus 로고    scopus 로고
    • Extensions to BGP to support Secure Origin BGP (soBGP)
    • Oct.
    • J. Ng, "Extensions to BGP to Support Secure Origin BGP (soBGP)," IETF ID draft-ng-sobgp-bgp-extensions-00, Oct., 2002.
    • (2002) IETF ID Draft-ng-sobgp-bgp-extensions-00
    • Ng, J.1
  • 12
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • G. Goodell, W Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy of interdomain routing," in Proc. NDSS, 2003.
    • (2003) Proc. NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 15
    • 21844463097 scopus 로고    scopus 로고
    • SPV: Secure path vector routing for securing BGP
    • Y. C. Hu, A. Perrig, and M. Sirbu, "SPV: secure path vector routing for securing BGP," in Proc. ACM SIGCOMM, 2004, pp. 179-192.
    • (2004) Proc. ACM SIGCOMM , pp. 179-192
    • Hu, Y.C.1    Perrig, A.2    Sirbu, M.3
  • 21
    • 38549165399 scopus 로고    scopus 로고
    • Efficient techniques for detecting false origin advertisements in inter-domain routing
    • S. Y Qiu, F. Monrose, A. Terzis, and P. D. McDaniel, "Efficient techniques for detecting false origin advertisements in inter-domain routing," in Proc. NPSEC, 2006.
    • (2006) Proc. NPSEC
    • Qiu, S.Y.1    Monrose, F.2    Terzis, A.3    McDaniel, P.D.4
  • 24
    • 70449454698 scopus 로고    scopus 로고
    • Don't secure routing protocols, secure data delivery
    • Online
    • D. Wendlandt, Avramopoulos, D. Andersen, and J. Rexford, "Don't secure routing protocols, secure data delivery," ACM SIGCOMM HotNets Workshop, vol.2006. [Online], Available: http://www.cs.princeton.edu/ jrex/papers/acr.pdf
    • ACM SIGCOMM HotNets Workshop , vol.2006
    • Wendlandt, D.1    Andersen, A.D.2    Rexford, J.3
  • 28
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • X. Hu and Z. Mao, "Accurate Real-time Identification of IP Prefix Hijacking," IEEE Symposium on Security and Privacy, pp. 3-17, 2007.
    • (2007) IEEE Symposium on Security and Privacy , pp. 3-17
    • Hu, X.1    Mao, Z.2
  • 29
    • 70449406157 scopus 로고    scopus 로고
    • G. Huston, http://www.potaroo.net/tools/asn32/, 2007.
    • (2007)
    • Huston, G.1
  • 30
    • 0003247246 scopus 로고
    • Border Gateway Protocol 4
    • SRI Network Information Center
    • Y. Rekhter and T. Li, "Border Gateway Protocol 4," RFC 1771, SRI Network Information Center, 1995.
    • (1995) RFC 1771
    • Rekhter, Y.1    Li, T.2
  • 32
    • 33746235598 scopus 로고    scopus 로고
    • BGP Security Vulnerabilities Analysis
    • Online
    • S. Murphy, "BGP Security Vulnerabilities Analysis," IETF, RFC 4272, 2006. [Online], Available: http://www.ietf.org/rfc/rfc4272.txt
    • (2006) IETF, RFC , vol.4272
    • Murphy, S.1
  • 36
    • 70449443940 scopus 로고    scopus 로고
    • NANOG mail archives
    • A. Misel, "Wow, AS70071" NANOG mail archives, 1997.
    • (1997) Wow, AS70071
    • Misel, A.1
  • 38
    • 34250672241 scopus 로고    scopus 로고
    • Pretty Secure BGP (psBGP)
    • W Tao and K. PC, "Pretty Secure BGP (psBGP)," Proc. of NDSS, 2005.
    • (2005) Proc. of NDSS
    • Tao, W.1    Pc, K.2
  • 43
    • 51349120643 scopus 로고    scopus 로고
    • Detecting bogus BGP route information: Going beyond prefix hijacking
    • J. Qiu, L. Gao, S. Ranjan, and A. Nucci, "Detecting bogus BGP route information: Going beyond prefix hijacking," in Proc. IEEE SecureComm, 2007.
    • (2007) Proc. IEEE SecureComm
    • Qiu, J.1    Gao, L.2    Ranjan, S.3    Nucci, A.4
  • 47
    • 36949024396 scopus 로고    scopus 로고
    • The generalized TTL security mechanism (GTSM)
    • V. Gill, J. Heasley, and D. Meyer, "The generalized TTL security mechanism (GTSM)," IETF, RFC 3682, 2004.
    • (2004) IETF, RFC , vol.3682
    • Gill, V.1    Heasley, J.2    Meyer, D.3
  • 49
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detectingIP prefix hijacks in realtime
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detectingIP prefix hijacks in realtime," in Proc. ACM SIGCOMM, 2007.
    • (2007) Proc. ACM SIGCOMM
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5
  • 52
    • 33746235595 scopus 로고    scopus 로고
    • The performance impact of BGP security
    • M. Zhao, S. W. Smith, and D. M. Nicol, "The performance impact of BGP security," IEEE Network, vol.19, no.6, pp. 42-48, 2005.
    • (2005) IEEE Network , vol.19 , Issue.6 , pp. 42-48
    • Zhao, M.1    Smith, S.W.2    Nicol, D.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.