presented by tony reveldez
Download
Skip this Video
Download Presentation
Securing BGP – A LITERATURE SURVEY

Loading in 2 Seconds...

play fullscreen
1 / 8

Securing BGP – A LITERATURE SURVEY - PowerPoint PPT Presentation


  • 55 Views
  • Uploaded on

Presented by: Tony Reveldez. Securing BGP – A LITERATURE SURVEY. GEOFF HUSTON B.Sc., M.Sc. Australian National University. MATTIA ROSSI B. Eng .,M.Sc. Leopold- Franzens - Universitaet. GEOFF ARMITAGE B.Sc., PhD. Swinburne University of Technology. Border Gateway Protocol. What is it?

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Securing BGP – A LITERATURE SURVEY' - decima


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
presented by tony reveldez
Presented by:

Tony Reveldez

Securing BGP – A LITERATURE SURVEY

GEOFF HUSTON B.Sc., M.Sc.

Australian National University

MATTIA ROSSI

B.Eng.,M.Sc.

Leopold-Franzens-Universitaet

GEOFF ARMITAGE B.Sc., PhD.

Swinburne University of Technology

border gateway protocol
Border Gateway Protocol
  • What is it?
  • iBGPvseBGP
  • TCP/IP
  • Distant Vector Routing
    • Path Vector Routing
  • Route Selection Process
  • Messages
    • AS Path
bgp threat model
BGP Threat Model
  • Securing the BGP Session
    • Injection, eavesdropping, delay messages, replay
  • Verifying BGP Identity
    • Are you really who you claim to be?
  • Verifying BGP Information
    • Is your information complete?
  • Verifying Forwarding Paths
    • Is my information accurate?
consequences of attacks on the routing system
Consequences of Attacks on the Routing System

The ability to eavesdrop

Denial of Service

the potential to masquerade

Address Stealing

www.fireblog.com

securing bgp
Securing BGP
  • The Security Toolset
  • Security Requirements
    • Securing the data payload and semantics
    • Piecemeal incremental deployment
  • Approaches to Securing BGP
    • sBGP, soBGP, psBGP, pgBGP, IRV
approaches to securing bgp
Approaches to Securing BGP
  • Securing the operation of BGP
    • TCP session
    • GTSM
    • TCP MD5
    • IPSEC
  • Security in the Data Level
state of bgp security
State of BGP Security

As the table shows, of all proposals, only a few have been implemented and mostly not deployed

ad