Deakin University
Browse

File(s) under permanent embargo

An operational approach to validate the path of BGP

journal contribution
posted on 2008-01-01, 00:00 authored by Ping Li, Wanlei Zhou, Ke Li
BGP (Border Gateway Protocol) is a fundamental component of the current Internet infrastructure. However, BGP is vulnerable to a variety of attacks, since it cannot ensure the authenticity of the path attributes announced by BGP routers. Despite several solutions have been proposed to address this vulnerability, none of them is operational in real-world due to their immense impact on original BGP. In this paper, we propose a Deployable Path Validation Authentication scheme, which can effectively validate the path of BGP. Through analysis and simulation we show that this scheme has little impact on the performance and memory usage for the original BGP, and can be adopted in practice as an operational approach.

History

Journal

Lecture notes in computer science

Volume

5022

Pagination

133 - 143

Publisher

Springer

Location

Berlin, Germany

ISSN

0302-9743

Language

eng

Publication classification

C1 Refereed article in a scholarly journal

Copyright notice

2008, Springer-Verlag Berlin Heidelberg

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC