Application of Logarithmic Keying for securing AS - PATH in Inter-Domain Routing

被引:0
|
作者
Vidya, K. [1 ]
Uthariaraj, Rhymend, V [2 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Chennai 600025, Tamil Nadu, India
[2] Anna Univ, Ramanujan Comp Ctr, Madras, Tamil Nadu, India
关键词
BGP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current day Internet is vulnerable to a variety of attacks during routing between Autonomous Systems (ASes). Routing between ASes in the internet is taken care of by standard de-facto inter-domain protocol called Border Gateway Protocol (BGP). BGP generally performs the hearsay technique for propagating the route for an IP prefix. Each BGP speaker advertises the AS-PATH through UPDATE messages for an IP prefix. The receiving BGP speaker of the neighboring AS append its own AS Number (ASN) in the existing AS-PATH and advertises it. But there is no guarantee in BGP that the received AS-PATH would have been modified, inserted or deleted. Hence AS path falsification is not detected by BGP. Various Security proposals were suggested by many researchers but none of them was deployed, due to various reasons. There exists a tradeoff between security, efficiency and performance in those proposals [1]. Due to their performance overheads and lack of proper security, we propose using Symmetric Key approaches for achieving perfect security. We consider the internet to be a combination of acyclic networks and star networks, where acyclic network is formed by the peer to peer ASes and customer-provider ASes [14] and star network is formed by an ISP providing services to many stub ASes. We apply a technique called logarithmic keying [2] to that combination of networks. The grand parent AS of each AS is trusted to identify the falsification of AS-Path. Also a temporal database is proposed to maintain historical advertisements at the Regional Internet Registry (RIR).
引用
收藏
页码:86 / +
页数:3
相关论文
共 50 条
  • [1] Hierarchical Origin and Path Verification for Securing Inter-domain Routing Protocol
    Sharma, Gaurav
    Ragha, Lata
    2011 IEEE 5TH INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS), 2011,
  • [2] Path Diversity for Inter-Domain Routing Security
    Basit, Abdul
    Ahmed, Naveed
    PROCEEDINGS OF 2017 14TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2017, : 384 - 391
  • [3] Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
    He, Guobiao
    Su, Wei
    Gao, Shuai
    Yue, Jiarui
    2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), 2020, : 504 - 508
  • [4] Decentralised Internet Infrastructure: Securing Inter-Domain Routing (DEMO)
    Galmes, Miguel Ferriol
    Cabellos-Aparicio, Albert
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [5] PSP: Path State Protocol for Inter-Domain Routing
    Avin, Chen
    Giladi, Ran
    Guy, Dotan
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [6] ROAchain: Securing Route Origin Authorization With Blockchain for Inter-Domain Routing
    He, Guobiao
    Su, Wei
    Gao, Shuai
    Yue, Jiarui
    Das, Sajal K.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1690 - 1705
  • [7] A new path probing strategy for inter-domain multicast routing
    Costa, A
    Nicolau, MJ
    Santos, A
    Freitas, V
    2005 NEXT GENERATION INTERNET NETWORKS, 2005, : 9 - 15
  • [8] Path-Preserving Anonymization for Inter-domain Routing Policies
    Shao, Xiaozhe
    Pishro-Nik, Hossein
    Gao, Lixin
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 121 - 136
  • [9] AS Alliance in Inter-Domain Routing
    Hu Xiangjiang
    Zhu Peidong
    Cai Kaiyu
    Gong Zhenghu
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 151 - 156
  • [10] A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing
    Siddiqui, M. S.
    Montero, D.
    Serral-Gracia, R.
    Masip-Bruin, X.
    Yannuzzi, M.
    COMPUTER NETWORKS, 2015, 80 : 1 - 26