메뉴 건너뛰기




Volumn 98, Issue 1, 2010, Pages 100-122

A survey of BGP security issues and solutions

Author keywords

Authentication; Authorization; BGP; Border gateway protocol; Integrity; Interdomain routing; Network security; Networks; Routing

Indexed keywords

AUTHENTICATION; BORDER GATEWAY PROTOCOL; GATEWAYS (COMPUTER NETWORKS); NETWORK PROTOCOLS; NETWORKS (CIRCUITS); ROUTING PROTOCOLS; SURVEYS;

EID: 72949118871     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2009.2034031     Document Type: Article
Times cited : (251)

References (130)
  • 5
    • 64049086532 scopus 로고    scopus 로고
    • How prevalent is prefix hijacking on the Internet?
    • Feb. [Online]
    • P. Boothe, J. Hiebert, and R. Bush, "How prevalent is prefix hijacking on the Internet?'' in Proc. NANOG 36, Feb. 2006 [Online]. Available: http://www.nanog.org/ mtg-0602/boothe.html-net.shtml
    • (2006) Proc. NANOG , vol.36
    • Boothe, P.1    Hiebert, J.2    Bush, R.3
  • 7
    • 84875608233 scopus 로고    scopus 로고
    • [Online]
    • Rensys Blog, Pakistan Hijacks YouTube. [Online]. Available: http://www.renesys.com/blog/2008/02/pakistan-hijacks-youtube-1.shtml%
    • Rensys Blog, Pakistan Hijacks YouTube
  • 8
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Aug.
    • A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, Aug. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 9
    • 36949014918 scopus 로고    scopus 로고
    • A study of prefix hijacking and interception in the Internet
    • Aug.
    • H. Ballani, P. Francis, and X. Zhang, BA study of prefix hijacking and interception in the Internet," in Proc. ACM SIGCOMM, Aug. 2007.
    • (2007) Proc. ACM SIGCOMM
    • Ballani, H.1    Francis, P.2    Zhang, X.3
  • 11
    • 72949087509 scopus 로고    scopus 로고
    • [Online]
    • Secure Inter-Domain Routing. [Online]. Available: http://www.ietf.org/ html.charters/sidr-charter.html.
    • Secure Inter-Domain Routing
  • 12
    • 72949101194 scopus 로고    scopus 로고
    • North American Network Operators Group. [Online]
    • North American Network Operators Group. [Online]. Available: www.nanog.org.
  • 13
    • 1642408605 scopus 로고    scopus 로고
    • Measuring ISP topologies with Rocketfuel
    • Feb.
    • N. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP topologies with Rocketfuel," IEEE/ACM Trans. Networking, vol. 12, no. 1, pp. 2-16, Feb. 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.1 , pp. 2-16
    • Spring, N.1    Mahajan, R.2    Wetherall, D.3
  • 17
    • 33645361020 scopus 로고    scopus 로고
    • BGP routing policies in ISP networks
    • Nov.-Dec.
    • M. Caesar and J. Rexford, "BGP routing policies in ISP networks," IEEE Network, vol.19, no.6, pp. 5-11, Nov.-Dec. 2005.
    • (2005) IEEE Network , vol.19 , Issue.6 , pp. 5-11
    • Caesar, M.1    Rexford, J.2
  • 20
    • 0035699394 scopus 로고    scopus 로고
    • Stable Internet routing without global coordination
    • Dec.
    • L. Gao and J. Rexford, "Stable Internet routing without global coordination," IEEE/ACM Trans. Networking, Dec. 2001.
    • (2001) IEEE/ACM Trans. Networking
    • Gao, L.1    Rexford, J.2
  • 21
    • 0003828107 scopus 로고
    • Ph.D. dissertation, Massachusetts Inst. Technol., Cambridge, Oct. MIT/LCS/TR-429
    • R. Perlman, "Network layer protocols with Byzantine robustness," Ph.D. dissertation, Massachusetts Inst. Technol., Cambridge, Oct. 1988. MIT/LCS/TR-429.
    • (1988) Network Layer Protocols with Byzantine Robustness
    • Perlman, R.1
  • 23
    • 0003629990 scopus 로고    scopus 로고
    • U.S. National Bureau of Standards Aug.
    • U.S. National Bureau of Standards, Secure Hash Standard, FIPS PUB 180-182, Aug. 2002.
    • (2002) Secure Hash Standard, FIPS PUB , pp. 180-182
  • 25
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 26
    • 1942508030 scopus 로고    scopus 로고
    • On the complexity of the discrete logarithm and Diffie-Hellman problems
    • Apr.-Jun.
    • I. F. Blake and T. Garefalakis, "On the complexity of the discrete logarithm and Diffie-Hellman problems," J. Complexity, vol.20, no.2-3, pp. 148-170, Apr.-Jun. 2004.
    • (2004) J. Complexity , vol.20 , Issue.2-3 , pp. 148-170
    • Blake, I.F.1    Garefalakis, T.2
  • 29
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Apr.
    • S. M. Bellovin, "Security problems in the TCP/IP protocol suite," Comput. Commun. Rev., vol.2, no.19, pp. 32-48, Apr. 1989.
    • (1989) Comput. Commun. Rev. , vol.2 , Issue.19 , pp. 32-48
    • Bellovin, S.M.1
  • 30
    • 72949114246 scopus 로고    scopus 로고
    • BGP security update: Is the sky falling?
    • Jun.
    • B. Green, "BGP security update: Is the sky falling?'' in Proc. NANOG 25, Jun. 2002.
    • (2002) Proc. NANOG , vol.25
    • Green, B.1
  • 32
    • 0013002936 scopus 로고    scopus 로고
    • Securing the border gateway routing protocol
    • London, U.K., Nov.
    • B. Smith and J. Garcia-Luna-Aceves, "Securing the border gateway routing protocol," in Global Internet '96, London, U.K., Nov. 1996.
    • (1996) Global Internet '96
    • Smith, B.1    Garcia-Luna-Aceves, J.2
  • 33
    • 0032026162 scopus 로고    scopus 로고
    • Efficient security mechanisms for the border gateway routing protocol
    • B. Smith and J. Garcia-Luna-Aceves "Efficient security mechanisms for the border gateway routing protocol," Comput. Commun., vol. 21, no. 3, pp. 203-210, 1998.
    • (1998) Comput. Commun. , vol.21 , Issue.3 , pp. 203-210
    • Smith, B.1    Garcia-Luna-Aceves, J.2
  • 46
  • 49
    • 72949096094 scopus 로고    scopus 로고
    • Routing Policy Specification Language Next Generation (RPSLng)
    • Mar.
    • L. Blunk, J. Damas, F. Parent, and A. Robachevsky, Routing Policy Specification Language Next Generation (RPSLng), RFC 4012, Mar. 2005.
    • (2005) RFC , vol.4012
    • Blunk, L.1    Damas, J.2    Parent, F.3    Robachevsky, A.4
  • 50
    • 0035704351 scopus 로고    scopus 로고
    • On inferring autonomous system relationships in the Internet
    • Dec.
    • L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans. Networking, vol.9, no.6, pp. 733-745, Dec. 2001.
    • (2001) IEEE/ACM Trans. Networking , vol.9 , Issue.6 , pp. 733-745
    • Gao, L.1
  • 51
    • 0036346301 scopus 로고    scopus 로고
    • Characterizing the Internet hierarchy from multiple vantage points
    • New York, Jun.
    • L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet hierarchy from multiple vantage points," in IEEE INFOCOM 2002, New York, Jun. 2002.
    • (2002) IEEE INFOCOM 2002
    • Subramanian, L.1    Agarwal, S.2    Rexford, J.3    Katz, R.4
  • 54
    • 72949090575 scopus 로고    scopus 로고
    • A Profile for Route Origin Authorizations (ROAs)
    • Jul.
    • M. Lepinksi, S. Kent, and D. Kong, A Profile for Route Origin Authorizations (ROAs), Internet Draft, Jul. 2009.
    • (2009) Internet Draft
    • Lepinksi, M.1    Kent, S.2    Kong, D.3
  • 55
    • 72949111149 scopus 로고    scopus 로고
    • APNIC Nov [Online]
    • APNIC. (2006, Nov.). The APNIC Resource Certification Page. [Online]. Available: http://mirin.apnic.net/resourcecerts/
    • (2006) The APNIC Resource Certification Page
  • 59
    • 72949083481 scopus 로고    scopus 로고
    • Lack of priority queueing considered harmful
    • Nov.
    • V. Gill, "Lack of priority queueing considered harmful," ACM Qeue, vol.2, no.8, pp. 64-69, Nov. 2004.
    • (2004) ACM Qeue , vol.2 , Issue.8 , pp. 64-69
    • Gill, V.1
  • 60
    • 70449418120 scopus 로고    scopus 로고
    • A survey of security techniques for the border gateway protocol (BGP)
    • M. O. Nicholes and B. Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," IEEE Comm. Surveys & Tutorials, vol.11, no.1, Q1 2009.
    • (2009) IEEE Comm. Surveys & Tutorials , vol.11 , Issue.1
    • Nicholes, M.O.1    Mukherjee, B.2
  • 61
    • 0033743163 scopus 로고    scopus 로고
    • Secure Border Gateway Protocol (S-BGP)
    • Apr.
    • S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (S-BGP)," IEEE J. Sel. Areas Commun., vol.18, no.4, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4
    • Kent, S.1    Lynn, C.2    Seo, K.3
  • 62
    • 33746235595 scopus 로고    scopus 로고
    • The performance impact of BGP security
    • Nov./Dec.
    • M. Zhao, S. W. Smith, and D. M. Nicol, "The performance impact of BGP security," IEEE Network, vol.19, no.6, pp. 42-48, Nov./Dec. 2005.
    • (2005) IEEE Network , vol.19 , Issue.6 , pp. 42-48
    • Zhao, M.1    Smith, S.W.2    Nicol, D.M.3
  • 64
    • 3042699520 scopus 로고    scopus 로고
    • Evaluation of efficient security for BGP route announcements using parallel simulation
    • Jul.
    • D. M. Nicol, S. W. Smith, and M. Zhao, "Evaluation of efficient security for BGP route announcements using parallel simulation," Simul. Model. Prac. Theor., vol.12, no.3-4, pp. 187-216, Jul. 2004.
    • (2004) Simul. Model. Prac. Theor. , vol.12 , Issue.3-4 , pp. 187-216
    • Nicol, D.M.1    Smith, S.W.2    Zhao, M.3
  • 65
    • 72949111150 scopus 로고    scopus 로고
    • SBGPVSecure BGP
    • Jun.
    • S. Bellovin, "SBGPVSecure BGP," in NANOG 28, Jun. 2003.
    • (2003) NANOG , vol.28
    • Bellovin, S.1
  • 66
    • 2442631758 scopus 로고    scopus 로고
    • Extensions to BGP to support Secure Origin BGP (soBGP)
    • Apr.
    • J. Ng, Extensions to BGP to Support Secure Origin BGP (soBGP), Internet Draft, Apr. 2004.
    • (2004) Internet Draft
    • Ng, J.1
  • 68
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • San Diego, CA, Feb.
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy of interdomain routing," in Proc. ISOC NDSS'03, San Diego, CA, Feb. 2003, pp. 75-85.
    • (2003) Proc. ISOC NDSS'03 , pp. 75-85
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 70
    • 0001569845 scopus 로고
    • Gossips and telephones
    • B. Baker and R. Shostak, "Gossips and telephones," Discrete Math., no.2, pp. 191-193, 1972.
    • (1972) Discrete Math. , vol.2 , pp. 191-193
    • Baker, B.1    Shostak, R.2
  • 71
    • 33747891596 scopus 로고    scopus 로고
    • Origin authentication in interdomain routing
    • Nov.
    • P. McDaniel, W. Aiello, K. Butler, and J. Ioannidis, "Origin authentication in interdomain routing," Comput. Networks, vol.50, no.16, pp. 2953-2980, Nov. 2006.
    • (2006) Comput. Networks , vol.50 , Issue.16 , pp. 2953-2980
    • McDaniel, P.1    Aiello, W.2    Butler, K.3    Ioannidis, J.4
  • 72
    • 0009554659 scopus 로고
    • Protocols for public key cryptosystems
    • Oakland, CA, Apr.
    • R. Merkle, "Protocols for public key cryptosystems," in IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1980.
    • (1980) IEEE Symp. Security and Privacy
    • Merkle, R.1
  • 73
    • 0033733822 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Apr.
    • M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE J. Sel. Areas Commun., vol.18, no.4, pp. 561-570, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4 , pp. 561-570
    • Naor, M.1    Nissim, K.2
  • 75
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure path vector routing for securing BGP
    • Portland, OR, Aug.
    • Y.-C. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," in Proc. ACM SIGCOMM, Portland, OR, Aug. 2004.
    • (2004) Proc. ACM SIGCOMM
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 76
    • 0003157491 scopus 로고    scopus 로고
    • On-line/off-line digital signatures
    • S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," J. Cryptol., vol.9, no.1, pp. 35-67, 1996.
    • (1996) J. Cryptol. , vol.9 , Issue.1 , pp. 35-67
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 77
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Aug.
    • C. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Networking, vol.7, no.4, pp. 502-513, Aug. 1999.
    • (1999) IEEE/ACM Trans. Networking , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.1    Lam, S.2
  • 79
    • 0012881303 scopus 로고
    • ESIGN: An efficient digital signature implementation for smart cards
    • Brighton, U.K., Apr.
    • A. Fujioka, T. Okamoto, and S. Miyaguchi, "ESIGN: An efficient digital signature implementation for smart cards," in Proc. EUROCYPT, Brighton, U.K., Apr. 1991.
    • (1991) Proc. EUROCYPT
    • Fujioka, A.1    Okamoto, T.2    Miyaguchi, S.3
  • 81
    • 33745769875 scopus 로고    scopus 로고
    • Evaluating the performance impact of PKI on BGP security
    • Gaithersburg, MD, Feb.
    • M. Zhao, S. W. Smith, and D. M. Nicol, "Evaluating the performance impact of PKI on BGP security," in Proc. 4th Annu. PKI R&D Workshop, Gaithersburg, MD, Feb. 2005.
    • (2005) Proc. 4th Annu. PKI R&D Workshop
    • Zhao, M.1    Smith, S.W.2    Nicol, D.M.3
  • 84
    • 0041296839 scopus 로고
    • Integrating security in inter-domain routing protocols
    • Oct.
    • B. Kumar and J. Crowcroft, "Integrating security in inter-domain routing protocols," ACM SIGCOMM Comput. Commun. Rev., vol.23, no.5, pp. 36-51, Oct. 1993.
    • (1993) ACM SIGCOMM Comput. Commun. Rev. , vol.23 , Issue.5 , pp. 36-51
    • Kumar, B.1    Crowcroft, J.2
  • 96
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • Oakland, CA, May
    • X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2007.
    • (2007) Proc. IEEE Symp. Security and Privacy
    • Hu, X.1    Mao, Z.M.2
  • 99
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. M. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, no.2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.M.3
  • 101
    • 72949098279 scopus 로고    scopus 로고
    • BGP security, availability, and operator needs
    • Jun.
    • C. Meyer and A. Partan, "BGP security, availability, and operator needs," in Proc. NANOG 28, Jun. 2003.
    • (2003) Proc. NANOG 28
    • Meyer, C.1    Partan, A.2
  • 102
    • 0038734643 scopus 로고    scopus 로고
    • Efficient protocols for signing routing messages
    • San Diego, CA, Mar.
    • K. Zhang, "Efficient protocols for signing routing messages," in Proc. ISOC NDSS'98, San Diego, CA, Mar. 1998.
    • (1998) Proc. ISOC NDSS'98
    • Zhang, K.1
  • 104
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, H. Shacham, and B. Lynn, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Eurocrypt 2003, 2003, vol.LNCS 2656, pp. 416-432.
    • (2003) Proc. Eurocrypt 2003 , vol.LNCS , Issue.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 105
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Sep.
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 106
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Advances in CryptologyVCRYPTO '99 Proc., 1999, vol.LNCS 1666, pp. 431-438.
    • (1999) Advances in CryptologyVCRYPTO '99 Proc. , vol.LNCS , Issue.1666 , pp. 431-438
    • Bellare, M.1    Miner, S.2
  • 107
    • 12744279165 scopus 로고    scopus 로고
    • On the performance, feasibility, and use of forward-secure signatures
    • Washington, DC, Oct.
    • E. Cronin, S. Jamin, T. Malkin, and P. McDaniel, "On the performance, feasibility, and use of forward-secure signatures," in Proc. ACM CCS'03, Washington, DC, Oct. 2003.
    • (2003) Proc. ACM CCS'03
    • Cronin, E.1    Jamin, S.2    Malkin, T.3    McDaniel, P.4
  • 108
  • 112
    • 0041513348 scopus 로고    scopus 로고
    • A framework for incremental deployment strategies for router-assisted services
    • San Francisco, CA, Apr.
    • X. He and C. Papadopoulos, "A framework for incremental deployment strategies for router-assisted services," in IEEE INFOCOM 2003, San Francisco, CA, Apr. 2003.
    • (2003) IEEE INFOCOM 2003
    • He, X.1    Papadopoulos, C.2
  • 115
    • 2342453262 scopus 로고    scopus 로고
    • BA framework for resilient Internet routing protocols
    • Mar.-Apr.
    • D. Pei, D. Massey, and L. Zhang, BA framework for resilient Internet routing protocols," IEEE Network, vol. 18, no. 2, pp. 5-12, Mar.-Apr. 2003.
    • (2003) IEEE Network , vol.18 , Issue.2 , pp. 5-12
    • Pei, D.1    Massey, D.2    Zhang, L.3
  • 117
    • 0038647019 scopus 로고    scopus 로고
    • BAn efficient algorithm for malicious update detection & recovery in distance vector protocols
    • Anchorage, AK, May
    • A. Chakrabarti and G. Manimaran, BAn efficient algorithm for malicious update detection & recovery in distance vector protocols," in IEEE Int. Conf. Communications, Anchorage, AK, May 2003.
    • (2003) IEEE Int. Conf. Communications
    • Chakrabarti, A.1    Manimaran, G.2
  • 121
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • Jan.
    • V. Padmanabhan and D. Simon, "Secure traceroute to detect faulty or malicious routing," ACM SIGCOMM Comput. Commun. Rev., vol.33, no.1, pp. 77-82, Jan. 2003.
    • (2003) ACM SIGCOMM Comput. Commun. Rev. , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.1    Simon, D.2
  • 122
    • 4544363839 scopus 로고    scopus 로고
    • Towards an accurate AS-level traceroute tool
    • Karlsruhe, Germany, Aug.
    • Z. Mao, J. Rexford, J. Wang, and R. Katz, "Towards an accurate AS-level traceroute tool," in Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, Aug. 2003.
    • (2003) Proc. ACM SIGCOMM 2003
    • Mao, Z.1    Rexford, J.2    Wang, J.3    Katz, R.4
  • 127
    • 72949087508 scopus 로고    scopus 로고
    • Deployment Considerations for Secure Origin BGP (soBGP)
    • Jun.
    • R. White, Deployment Considerations for Secure Origin BGP (soBGP), Internet Draft, Jun. 2006
    • (2006) Internet Draft
    • White, R.1
  • 129
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • C. Ellison and B. Schneier, "Ten risks of PKI: What you're not being told about public key infrastructure," Comput. Security J., vol.16, no.1, 2000.
    • (2000) Comput. Security J. , vol.16 , Issue.1
    • Ellison, C.1    Schneier, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.