Are BGP Routers Open to Attack? An Experiment - Open Research Problems in Network Security
Conference Papers Year : 2011

Are BGP Routers Open to Attack? An Experiment

Ludovico Cavedon
  • Function : Author
  • PersonId : 1015551
Christopher Kruegel
  • Function : Author
  • PersonId : 1003327
Giovanni Vigna
  • Function : Author
  • PersonId : 1003328

Abstract

The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been some catastrophic incidents in the past, due to relatively simple router misconfigurations. In addition, unused network addresses are being silently stolen for spamming purposes. A relevant corpus of literature investigated threats in which a trusted BGP router injects malicious or wrong routes and some security improvement to the BGP protocol have also being proposed to make these attacks more difficult to perform. In this work, we perform a large-scale study to explore the validity of the hypothesis that it is possible to mount attacks against the BGP infrastructure without already having the control of a “trusted” BGP router. Even though we found no real immediate threat, we observed a large number of BGP routers that are available to engage in BGP communication, exposing themselves to potential Denial-of-Service attacks.
Fichier principal
Vignette du fichier
978-3-642-19228-9_8_Chapter.pdf (240.43 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01581336 , version 1 (04-09-2017)

Licence

Identifiers

Cite

Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna. Are BGP Routers Open to Attack? An Experiment. 1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.88-103, ⟨10.1007/978-3-642-19228-9_8⟩. ⟨hal-01581336⟩
89 View
299 Download

Altmetric

Share

More