The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time

Size: px
Start display at page:

Download "The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time"

Transcription

1 The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time Je-kuk Yun 1, Beomseok Hong 2, and Yanggon Kim 3 1 Information Technology, Towson University, Towson, MD, U.S.A. 2 Information Technology, Towson University, Towson, MD, U.S.A. 3 Computer Science, Towson University, Towson, MD, U.S.A. Abstract - As the number of IP hijacking incidents has increased, many IP hijacking monitoring tools have been implemented. However, none of the monitoring tools can directly control the data plane of BGP routers. Therefore, network administrators should protect their routers by using command line interface when the network administrator receives any warning from BGP hijacking monitoring tools. As the number of routers and prefixes continuously increased, checking the routing information in their routers manually is one of the big burdens on the administrators. In addition, when IP hijacking occurs, it is very important for the administrator to quickly block the bogus prefixes. Otherwise, thousands of traffic will be transferred to the wrong way within a very short moment. In this paper, we extended Quagga-SRx so that the Quagga-SRx can send a BGP update message including an opaque extend community to other ibgp peers for notifying bogus IP prefixes after detecting abnormal IP prefixes. As a result of this, the other ibgp peers can recognize bogus IP prefixes by accepting the BGP update message that includes the opaque extend community, and automatically blocks the bogus prefixes if the ibgp routers have an ability to process the opaque extend community. Therefore, when IP hijacking occurs, the bogus prefixes can be blocked automatically and quickly, which makes the ASes more secure. Keywords: BGP, border gateway protocol, interdomain routing, network security, networks, routing 1 Introduction The BGP is an Inter-domain routing protocol, and is the routing protocol that enables large networks to form a single Internet. The main functionality of BGP is to exchange Network Layer Reachability Information (NLRI) between Autonomous Systems (ASes) so that a BGP speaker can communicate with other BGP routers and ultimately can reach a destination of a certain router [1]. However, when the BGP was designed, its vulnerabilities were hardly considered [2]. Unfortunately, the lack of consideration of BGP vulnerabilities occasionally causes severe failure of Internet service provision. Such a failure called prefix hijacking causes attacks on the routing infrastructure or the control plane of the Internet. The prefix hijacking occurred on the 25th of April in 1997 by a misconfigured router that advertised incorrect prefixes and announced AS 7007 as an origin of them. As a result, it created a routing black hole for almost two hours [3]. Similar events occurred on the 22nd January in 2006, when Con Edison (AS 27506) stole several important prefixes by misconfiguring them [4], and on Christmas Eve 2004 TTNet in Turkey (AS 9121) advertised the entire prefixes on the Internet so that every route came to them rather than to the correct destinations [5]. The most well-known incident of prefix hijacking was the YouTube hijacking by Pakistan Telecom on the 24th of February in 2008, when in response to government order to block YouTube access within their country, Pakistan Telecom advertised a more specific prefix than the YouTube prefix. One router believes the Pakistan Telecom regarded the incorrect prefix as a more specific prefix and advertised it to the others. As a result, YouTube was not accessible from some ASes for a while [6]. Furthermore, Google was affected by a hijacking on the 9th of July in The reason of this hijacking was revealed as a copy and paste mistake by a network administrator. Next month Google was affected by another hijacking because AS30890 (EVOLVA Evolva Telecom s.r.l.), a provider from Romania announced the same prefix as Google's prefix which is /24 [7]. Such a prefix hijacking happens constantly on the Internet by mis-announcement or intentionally advertising malicious prefixes. In order to deal with the prefix hijacking and mis-announced prefix in a faster way, several monitoring tools have been developed such as PHAS, BGPmon, Cyclops, and Argus. However, none of the monitoring tools directly handle the data plane of BGP routers. Every time the malicious prefixes are found, the tools could only warn an administrator about the hijacking. In addition, the manual configuration would be a matter. Since the number of BGP routers and prefixes has increased steadily over the past years, we expect that the administrators need to check and manually block prefixes

2 more than they do now. On the other hand, when IP hijacking occurs, it is very important for the administrator to quickly block the bogus prefixes. Otherwise, thousands of network traffic will be transferred to the wrong way within a very short moment. In this paper, we extended the previous work [8] to automatically protect their ibgp peers by sending an update message that includes an opaque extended community as well as monitor bogus prefixes. Therefore, ibgp peers can be protected without the network administrator s manual configuration. We describe two main problems of BGP and a solution in Section 3. In section 4, we explain how the BGPMAPS works. In addition, we discuss the implementation of BGPMAPS and the result of BGPMAPS performance test in section 5. Lastly, we conclude the paper in section 6. 2 RELATED RESEARCH 2.1 Monitoring tools Prefix Hijack Alert System (PHAS) is a system that detects an attempt to hijack prefixes, owned by other BGP routers, with BGP routing data collected by BGP collectors and it notifies prefix owners of the hijack attempt through a reliable manner. However, PHAS does not guarantee to detect anomaly advertisements [9]. BGPmon is designed to collect a large number of data and provides real-time access with clients for real-time analysis [10]. The collected data is consolidated into a single XML steam that can be extended by clients for their purposes. Cyclops is a system that collects real-time updates of hundreds of routers and displays a graphic view of how the routers are connected to each other [11]. As a result, network administrators can use the tool to detect and diagnose BGP misconfigurations or BGP hijacking. Argus is an agile system that receives real-time updates from BGPmon and daily updates from CAIDA iplane. Based on the updates, Argus checks whether the update has an anomalous origin according to its local routing information database [12]. After finding the suspicious prefixes, Argus makes a final decision by computing the fingerprint for the suspicious prefixes. 2.2 BGP-SRx BGP-SRx, developed by the National Institute of Standards and Technology (NIST), consists of the SRx Server, the SRx API, and the Quagga SRx [13]. SRx provides a proxy with APIs, which allows the proxy to be embedded on the router and communicate with the SRx Server. The Quagga SRx is a software router on which the proxy is embedded. The SRx Server is connected to the RPKI validation cache, so the SRx Server can validate BGP announcements by comparing the BGP announcements to ROAs in the RPKI validation cache. 3 BGP THEATS AND SOLUTION 3.1 IP hijacking Once BGP routers are connected to each other, the BGP routers fully trust each other. If a BGP router intentionally originates a bogus prefix to neighbors, the neighbors that receive the announcement trust the prefix and their traffic is hijacked by the hijacking router. Fig. 1 shows that AS 500 is trying to hijack the traffic heading for AS 600. AS 600 announces /16 to neighbors and traffic heading for /16 is transferred to AS 600. However, if AS 500 announces a bogus prefix, /16, to AS 100, then the traffic in AS 100 goes to AS 500 because the number of hops to AS 500 is shorter than AS 600 s hops. As a result, AS 100 takes AS 500 as the destination for the /16. Fig. 1. IP prefix hijacking 3.2 Mis-announced route BGP doesn t validate announcements, so if an AS administrator unintentionally mis-types the length of a prefix or IP address, then any routers that receive the announcements trust the mis-typed length of the prefix or IP address. As a result of this, traffic in the routers that received the wrong announcements goes to the wrong destination. 3.3 Origin Validation Many studies have been conducted to solve IP hijacking, such as Secure BGP (S-BGP) [14], Secure Origin BGP (SO- BGP) [15], Pretty Secure BGP (psbgp) [16], Pretty Good BGP (pgbgp) [17], and so on. Secure Inter-Domain Routing (SIDR) working group completed Resource Public Key Infrastructure (RPKI) [18]. In order to prevent IP hijacking, the only BGP speaker that has been authorized by the IANA

3 should originate its prefixes. Therefore, BGP speakers should be authorized by the IANA. The IANA manages an officially verifiable database of the authorized IP prefixes and AS numbers. Therefore, BGP routers need to periodically retrieve the collection of the IP prefixes and AS numbers called Route Origin Authorizations (ROAs) [19] that consist of IP prefix, ASN, and maxlength. When a BGP router originates its prefix, the length of the accompanying prefix must be an integer less than or equal to the maxlength. Otherwise, the prefix is considered invalid. For example, if the IP prefix is /16 and the maxlength is 19, then the BGP speaker is authorized to originate /17, /18, or 10,30,0.0/19, not but /20. 4 IV. DESIGN OF THE BGPMAPS 4.1 Overview Fig. 2 depicts the simple architecture of the BGPMAPS. The ex-quagga-srx is connected to a BGP router with ebgp connection and learns routes from the BGP peers of other ASes. The ex-quagga-srx forwards the routes to the internal BGP routers and announces the internal routes of the AS to the BGP peers of other ASes. peers of the bogus prefix quickly and automatically when a bogus prefix is forwarded from BGP peers of other ASes, and (3) it should be a long living process. In the past decade, network administrators were worrying about the growth of the number of routes in the Internet because network routers have a limited memory capacity of storing many prefixes in the routing table. The router may need an extra space to save additional routing information for preventing IP hijacking. As the number of prefixes is increased, the results of the validation are saved in the local database instead of the main memory of the router. It is very important for network administrators to block bogus prefixes as soon as they detect the bogus prefixes. In case of a big company such as Google, YouTube, Amazon, and so on, a considerable number of Internet packets come and go every single second. However, the network administrators cannot keep paying attention to their routing table. Even though the administrators subscribe IP hijacking alarm service [10] and receive an alarm message through , it takes time for the network administrators to block the bogus prefixes by using command line interface. In order to detect the bogus prefixes and notify ibgp peers of the bogus prefixes, the opaque extended community attribute, which is including validation state, is added to the update message and the update message is forwarded to ibgp peers. 4.3 The architecture of the BGPMAPS Fig. 3 shows the architecture of the BGPMAPS. The BGPMAPS consists of the Extended Quagga SRx (ex- Quagga-SRx), Data Agent (DA), Alarm Server, and Web Service Agent (WSA). The ex-quagga-srx sends an update message to BGP peers and receives update messages from BGP peers through a BGP connection. Then, the ex-quagga- SRx sends update message information such as ASN, prefix, and maxlength to the SRx Server. Fig. 2. The simple architecture of the BGPMAPS In order to learn new routes from ebgp peers, the BGPMAPS is required to establish a BGP connection to the ebgp peers. Whenever the BGPMAPS receives a BGP update message, the ex-quagga-srx saves the result of the RPKI validation to the Data Agent as well as the routing table, such as ASN, PREFIX, AS_PATH, NEXTHOP, etc. In addition, the ex-quagga-srx forwards the update message that includes a new attribute of the opaque extended community to the ibgp peers for notifying the ibgp peers of the validation state of the update message. 4.2 Operational requirements In the design of the BGPMAPS, we consider three requirements: (1) it should store a large amount of prefixes history, (2) it should detect the bogus prefix and notify ibgp Fig. 3. The architecture of the BGPMAPS.

4 The SRx compares the update message information to the ROAs and returns the result of validation to the ex- Quagga-SRx. In case of ebgp peers, the Data Agent receives the result of the BGP update message from the ex-bgp-srx. If the result is invalid, the Alarm Server notifies the Alarm System of the invalid update message. Then, the Alarm System makes an alarm sound, and BGP router administrators can check the invalid update message through the web interface. The Quagga-SRx is connected to a BGP router via ibgp. Once the Quagga-SRx receives update messages, the Quagga-SRx sends a query to the SRx server and receives the result of the update messages. We extended the existing Quagga-SRx so that the Quagga-SRx saves the validation results of the update messages in the database. The Data Agent maintains and manages the validation results of update messages. When an invalid prefix is detected in the database, the Alarm Server makes an alarm sound through the Alarm System to warn AS administrators. The Alarm server sends signal to the Alarm System through TCP by using the IP address and port. The WSA provides AS administrators with a web interface that displays the validation result of update messages. The Alarm System is required to be installed in the AS that wants to receive the alarm service. When an invalid message is detected by the BGPMAPS, the Alarm System receives a signal from the Alarm Server. As a result, the AS administrator doesn t need to monitor a BGP routing table all the time to protect from IP hijacking. 5 IMPLEMENTATION AND PERFORMANCE TEST 5.1 Creating the Opaque Extended Community BGP speakers keep updating their routing table by sharing their routing through an update message. Fig. 4 shows the update message consists Withdrawn Routes Length, Withdrawn Routes, Total Path Attribute Length, Path Attributes, and Network Layer Reachability Information. The path attributes includes a number of attributes such as ORIGIN, AS_PATH, NEXT_HOP, COMMUNITY, EXTENDED COMMUNITY, and so on. The EXTENDED COMMUNITY attribute will contain opaque extended community to carry the validation state of the update message between ibgp peers. The opaque extended community is a work in progress by Secure Inter-Domain Routing working group and may be standardized on March An update message can include a number of Path Attributes. So if a BGP speaker receives an update message that includes a bogus prefix, then the BGP speaker adds the opaque extended community to the update message and forwards the update message to ibgp peers. The ibgp peers can know whether the prefix is hijacked by checking the opaque extended community. Fig. 4. The update message format 5.2 Notifying functions with update message An operation of notifying function is as follows (see Fig. 5) The ebgp peer announces an update message The Ex-Quagga SRx sends a query to the SRX Server for an update validation The SRX server requests ROAs to the RPKI Validation Cache The RPKI Validation Cache provides ROAs The SRx Server conducts RPKI validation by comparing a prefix and an ASN to ROAs The SRx Server returns the result of validation to the Ex-Quagga SRx The Ex-Quagga SRx saves the result of validation to the Data Agent The Alarm Server sends notification to the Alarm System according to database in the Data Agent The Web Server Agent provides web interface service by using the validation information provided by the Data Agent The Ex-Quagga SRx adds the opaque extended community to the update message The Ex-Quagga SRx forwards the update message to ibgp peers ibgp peers update their control plane according to the update message

5 Fig. 5. Sequence of detecting and preventing functions 5.3 Simulation of the BGPMAPS Fig. 6 shows a topology that includes four ASes and 6 BGP routers. AS 200, AS 300, and AS 400 include one router that doesn't have RPKI capability. AS 100 includes two routers that doesn't have RPKI capability and one software router that has RPKI capability, called Ex-Quagga-SRx. Through this topology, we explain how the Ex-Quagga-SRx automatically notifies ibgp peers of an invalid update message when the Ex-Quagga-SRx detects a bogus message. AS 200 originates /24 and the announcement is forwarded to neighbors. AS 300 originates /24, /24, and /24. Then, the announcements are forwarded to the neighbors, AS 200, AS 100, and AS 400. Suppose AS 400 hijacks the traffic heading for AS 300 by originating /17 to AS 200. Then, Ex-Quagga-SRx receives the bogus announcement and sends a query to the SRx Server to validate the bogus announcement. After detecting the bogus announcement, the Ex-Quagga-SRx creates the opaque extended community attribute, adds the opaque extended community attribute to the update message, and sends the update message to the ibgp peers. Then the ibgp peers can recognize bogus prefixes and will not select the AS 400 as the destination of /24. Furthermore, the Ex-Quagga-SRx saves the bogus announcement in the database. The Server monitors the database and automatically makes an alarm sound when the bogus announcement is discovered in the database. Once the sound of the alarm is made in AS 200, the AS 200 network administrator can realize that there is a bogus prefix in the BGP router. In addition, the AS 200 administrator can check the bogus prefix through the webpage that is provided by the BGPMAPS. As a result of this, the AS 200 administrator can ignore the bogus prefix in a short time. Fig. 7 shows the BGP table on the Ex-Quagga-SRx. The SRxVal shows the results of validation after the SRx Server validates the update messages. We created an eval column on the table to show the opaque extended community value. Fig. 6. Topology for simulation First, RPKI validation Cache includes 3 ROAs which are /24 300, /24 300, and / Fig. 7. Ex-Quagga-SRx BGP table

6 Fig. 8 shows the normal BGP table in case that the opaque extended community doesn t exist in the BGP update message. The normal BGP table indicates that the router will select AS 400 as the destination of /24 because the prefix /25 announced by AS 400 has longer prefix than /24 announced by AS 300. In that case, the AS 300 is hijacked and the traffic for will be transferred to the AS 400. TABLE I. THE NUMBER OF PREFIXES IN WHOLE AS Minimum Maximum Average Prefix(IPv4) Prefix(IPv6) Total We varied the number of prefixes and Fig. 10 illustrates the result of the performance test. When a router originates 1000 prefixes and the Ex-Quagga-SRx receives the prefixes, it takes 7.54 seconds. As the number of prefixes is increased, the time it takes increases linearly. Therefore, we can say it takes a reasonable time to notify ibgp peers of invalid prefixes. Fig. 8. Normal BGP table Fig. 9 shows R1-1 BGP table after the R1-1 receives the opaque extended community from the Ex-Quagga-SRx. Even though the R1-1 doesn t have a capability of validating update messages, the R1-1 can recognize the invalid prefix by accepting the opaque extended community. The BGP table includes the eval to show the validation state. As a result, the R1-1 will not select AS 400 as a destination of /24. Fig. 9. R1-1 BGP table 5.4 Environment and the result of performance test We set up a topology that is the same as figure 6 where each router runs on a 3.40 GHz i machine with 1 GB of memory running CentOS 6.3 and the SRx Server runs on a 3.40 GHz i machine with 1 GB of memory running CentOS 6.3. Because it is important to quickly notify ibgp peers of bogus prefixes, we measured the duration from the moment that Ex-Quagga-SRx receives an update message to the moment that the Ex-Quagga-SRx forwards the update message, which includes the opaque extended community, to ibgp peers. We stored 8000 ROAs in the RPKI validation Cache because the number of ROAs in the RPKI validation Cache affects the performance and there are around 8000 ROAs in the real world. We collected the number of prefixes that originated from each AS the 25th of May in According to TABLE 1, the BGP router originates, on average, prefixes and at most 5230 prefixes. Fig. 10. Result of performance test 6 CONCLUSION As the number of IP hijacking incidents is increased, many IP hijacking monitoring tools are implemented, but network administrators still should pay attention to their routing table to protect their routers by using command line interface when the network administrator receives any warning from BGP hijacking monitoring tools because none of the monitoring tools can directly access the data plane of BGP routers. As the number of ASes and prefixes continuously increase, checking the routing information in their routers manually is one of the big burdens on the administrators. In addition, when IP hijacking occurs, it is very important for the administrator to quickly block the bogus prefixes. Through our performance test, we showed ibgp peers can recognize the invalid prefixes in a reasonable time by accepting the opaque extended community even though the ibgp peer doesn t have a capability of validating update messages. As a result, when IP hijacking occurs, the bogus prefixes can be blocked in a timely manner, which makes the ASes more secure. We automatically prevent IP hijacking within ibgp peers, though ebgp should still be monitored in person.

7 7 References [1] Rekhter, Y A Border Gateway Protocol 4 (BGP- 4). RFC [2] Murphy, S BGP Security Vulnerabilities Analysis. RFC [3] "7007 Explanation and Apology," Apr 1997, [4] Rensys Blog, Con-Ed Steals the Net. [Online]. Available: html [5] Rensys Blog, Internet-Wide Catastrophe Last Year [Online]. Available: trophela.shtml [6] Rensys Blog, Pakistan hijacks YouTube [Online]. Available: be_1.shtml [14] Kent, S., Lynn, C., and Seo, K Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications. 18, 4 (Apr. 2000) [15] White, R Securing BGP through secure origin BGP. Internet Protocol Journal. 6, 3 (September 2003). [16] Karlin, J., Forrest, S., and Rexford, J Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. In IEEE International Conference on Network Protocols. [17] Van Oorschot, P., Wan T., and Kranakis, E On Interdomain Routing Security and Pretty Secure BGP (psbgp). ACM Transactions on Information and System Security. 10, 3(July 2007). [18] Manderson, T., Vegoda, L., and Kent, S Resource Public Key Infrastructure (RPKI) Objects Issued by IANA(Feb. 2012). [Online]. Available: [19] Lepinski, M., Kent, S., and Kong, D A Profile for Route Origin Authorizations (ROAs). Work in progress (Internet Draft), Feb [7] BGPmon, Google s services redirected to Romania and Austria [Online]. Available: [8] J. Yun, B. Hong, Y. Kim, "The BGP Monitoring and Alarming System to Detect and Prevent Anomaly IP Prefix Advertisement", Research in Applied Computation Symposium (RACS 2013), Montreal, QC, Canada, 1-4 October [9] Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., and Zhang, L PHAS: A prefix hijack alert system. In Proceedings of the 15th conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06), Vol. 15. [10] D. Matthews, Y. Chen, H. Yan, and D. Massey. BGP Monitoring System. Available from: [11] Y.-J. Chi, R. Oliveira, and L. Zhang. Cyclops: The ASlevel connectivity observatory. ACM SIGCOMM Computer Communication Review, pages 7 16, [12] Xingang Shi, Yang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu. Detecting Prefix Hijackings in the Internet with Argus. In Proc. of ACM IMC [13] BGP Secure Routing Extension (BGP-SRx) by NIST ]Online]. Availble:

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

Securing BGP Networks using Consistent Check Algorithm

Securing BGP Networks using Consistent Check Algorithm Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.

More information

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage. BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University

More information

bgpand - Architecting a modular BGP4 Attack & Anomalies Detection Platform

bgpand - Architecting a modular BGP4 Attack & Anomalies Detection Platform bgpand - Architecting a modular BGP4 Attack & Anomalies Detection Platform Mayank Bhatnagar TechMahindra Limited, SDF B-1, NSEZ, Noida-201305, India E-mail : mayank.bhatnagar2@techmahindra.com Abstract

More information

BGP Security via Enhancements of Existing Practices

BGP Security via Enhancements of Existing Practices IEEE International Conference on Communications 2009 1 BGP Security via Enhancements of Existing Practices Xiaoliang Zhao, David T. Kao * Abstract Border Gateway Protocol (BGP) is the de-facto inter-domain

More information

A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP

A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP Stephen Brako Oti Isaac Bansah Tonny M. Adegboyega ABSTRACT Cloud IaaS service providers

More information

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System School of Computer,

More information

CNT Computer and Network Security: BGP Security

CNT Computer and Network Security: BGP Security CNT 5410 - Computer and Network Security: BGP Security Professor Kevin Butler Fall 2015 Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means

More information

Internet Engineering Task Force (IETF) Category: Informational ISSN: February 2012

Internet Engineering Task Force (IETF) Category: Informational ISSN: February 2012 Internet Engineering Task Force (IETF) G. Huston Request for Comments: 6483 G. Michaelson Category: Informational APNIC ISSN: 2070-1721 February 2012 Abstract Validation of Route Origination Using the

More information

Inter-domain Routing(BGP) Security [IP Prefix Hijacking] Akmal Khan

Inter-domain Routing(BGP) Security [IP Prefix Hijacking] Akmal Khan Inter-domain Routing(BGP) Security [IP Hijacking] Akmal Khan [raoakhan@mmlab.snu.ac.kr] 4-15-2010 2 Outline Introduction Types of IP Hijacking Internet Routing Data Sources Tools of the Trade Past Research

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Janno? Administrivia Midterm moved up from 3/17 to 3/15 IP

More information

Securing the Internet at the Exchange Point Fernando M. V. Ramos

Securing the Internet at the Exchange Point Fernando M. V. Ramos Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 There are vulnerabilities in the Internet architecture

More information

Towards A Practical and Effective BGP Defense System

Towards A Practical and Effective BGP Defense System Towards A Practical and Effective BGP Defense System Douglas Comer, Parmjeet Singh, and Subramanian Vasudevan Abstract At the center of the Internet, major ISPs use the Border Gateway Protocol (BGP) to

More information

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics: Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background

More information

Measuring and Analyzing on Effection of BGP Session Hijack Attack

Measuring and Analyzing on Effection of BGP Session Hijack Attack Measuring and Analyzing on Effection of BGP Session Hijack Attack ZHAO JINJING 1,2, LI YUANLING 1,2, LIU LI 1,2 1 National Key Laboratory of Science and Technology on Information System Security 2 Beijing

More information

Evaluation of BGP Anomaly Detection and Robustness Algorithms

Evaluation of BGP Anomaly Detection and Robustness Algorithms Trustworthy Networking Program Evaluation of BGP Anomaly Detection and Robustness Algorithms Kotikapaludi Sriram, Doug Montgomery, Oliver Borchert, Okhee Kim, and Patrick Gleichmann National Institute

More information

Secure Routing with RPKI. APNIC44 Security Workshop

Secure Routing with RPKI. APNIC44 Security Workshop Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

Balanced Peer Lists: Towards a Collusion-Resistant BGP

Balanced Peer Lists: Towards a Collusion-Resistant BGP Balanced Peer Lists: Towards a Collusion-Resistant BGP Yan Li Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712 Email: yanli@cs.utexas.edu Mohamed G. Gouda Department

More information

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Janno? Today Last time: Intra-Domain Routing (IGP) RIP distance

More information

Rapid Detection of BGP Anomalies

Rapid Detection of BGP Anomalies Rapid Detection of BGP Anomalies Bahaa Al-Musawi, Philip Branch and Grenville Armitage balmusawi, pbranch, garmitage@swin.edu.au Internet for Things (I4T) Research Group Swinburne University of Technology

More information

CSE 461 Interdomain routing. David Wetherall

CSE 461 Interdomain routing. David Wetherall CSE 461 Interdomain routing David Wetherall djw@cs.washington.edu Interdomain routing Focus: Routing across internetworks made up of different parties Route scaling Application Route policy Transport The

More information

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Jannotti Today Last time: Intra-Domain Routing (IGP) RIP distance

More information

Border Gateway Protocol - BGP

Border Gateway Protocol - BGP BGP Fundamentals Border Gateway Protocol - BGP Runs over TCP (port 179) TCP connection required before BGP session Need to be reachable! Path vector routing protocol Best path selection based on path attributes

More information

Misdirection / Hijacking Incidents

Misdirection / Hijacking Incidents Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks

Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks Mohit Lad Ricardo Oliveira Beichuan Zhang Lixia Zhang Abstract A prefix hijack attack involves an attacker announcing victim

More information

Internet Engineering Task Force (IETF) Updates: 6811 September 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Updates: 6811 September 2018 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) R. Bush Request for Comments: 8481 Internet Initiative Japan Updates: 6811 September 2018 Category: Standards Track ISSN: 2070-1721 Abstract Clarifications to BGP

More information

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing CSCD 433/533 Network Programming Fall 2012 Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing 1 Topics Interdomain Routing BGP Interdomain Routing Benefits vs. Link State Routing

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

Jumpstarting BGP Security. Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira

Jumpstarting BGP Security. Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira Jumpstarting BGP Security Yossi Gilad Joint work with: Avichai Cohen, Amir Herzberg, and Michael Schapira Prefix hijacking Victim Path: 111 AS X AS 111 Boston University BGP Ad. AS 666 Data flow 2 Prefix

More information

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example

More information

End-To-End Signaling and Routing for Optical IP Networks

End-To-End Signaling and Routing for Optical IP Networks End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering

More information

PART III. Implementing Inter-Network Relationships with BGP

PART III. Implementing Inter-Network Relationships with BGP PART III Implementing Inter-Network Relationships with BGP ICNP 2002 Routing Protocols Autonomous System BGP-4 BGP = Border Gateway Protocol Is a Policy-Based routing protocol Is the de facto EGP of today

More information

Internet Engineering Task Force (IETF) Request for Comments: Google K. Patel Cisco Systems August 2015

Internet Engineering Task Force (IETF) Request for Comments: Google K. Patel Cisco Systems August 2015 Internet Engineering Task Force (IETF) Request for Comments: 7607 Updates: 4271 Category: Standards Track ISSN: 2070-1721 W. Kumari R. Bush Internet Initiative Japan H. Schiller K. Patel Cisco Systems

More information

Introduction to BGP ISP/IXP Workshops

Introduction to BGP ISP/IXP Workshops Introduction to BGP ISP/IXP Workshops 1 Border Gateway Protocol Routing Protocol used to exchange routing information between networks exterior gateway protocol RFC1771 work in progress to update draft-ietf-idr-bgp4-18.txt

More information

Deploying RPKI An Intro to the RPKI Infrastructure

Deploying RPKI An Intro to the RPKI Infrastructure Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)

More information

RPKI and Internet Routing Security ~ The regional ISP operator view ~

RPKI and Internet Routing Security ~ The regional ISP operator view ~ RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may

More information

APNIC elearning: BGP Basics. 30 September :00 PM AEST Brisbane (UTC+10) Revision: 2.0

APNIC elearning: BGP Basics. 30 September :00 PM AEST Brisbane (UTC+10) Revision: 2.0 APNIC elearning: BGP Basics 30 September 2015 1:00 PM AEST Brisbane (UTC+10) Issue Date: 07 July 2015 Revision: 2.0 Presenter Nurul Islam (Roman) Senior Training Specialist, APNIC Nurul maintains the APNIC

More information

Cyclops: The AS-level Connectivity Observatory

Cyclops: The AS-level Connectivity Observatory Cyclops: The AS-level Connectivity Observatory Ying-Ju Chi, Ricardo Oliveira, and Lixia Zhang University of California, Los Angeles {yjchi,rveloso,lixia}@cs.ucla.edu ABSTRACT In this paper we present Cyclops,

More information

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences CS 204: BGP Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Overview AS relationships Inter-AS routing BGP Example Paper discussion

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 11, 2008 General ideas behind BGP Background Providers, Customers and Peers External

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 15 Spring 2012 March 19, 2012 Announcements HW7 due this week HW8 due 3/28 Exam 2 on 4/23 HW7 RIP (Rou)ng Informa)on Protocol) Components Forwarding Rou)ng

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.9, 2012/03/14 10:21:22) Monday, March 12, 2012 General ideas behind BGP Background Providers,

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 1.5, 2011/03/06 13:35:28) Monday, March 7, 2011 General ideas behind BGP Background Providers,

More information

Introduction to BGP. ISP/IXP Workshops

Introduction to BGP. ISP/IXP Workshops Introduction to BGP ISP/IXP Workshops 1 Border Gateway Protocol A Routing Protocol used to exchange routing information between different networks Exterior gateway protocol Described in RFC4271 RFC4276

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks More on BGP Jianping Pan Summer 2007 7/4/07 csc485b/586b/seng480b 1 Review: BGP Border Gateway Protocol path vector routing prefix: AS-path policy-based routing import/export

More information

2011, Sushile Tejwani

2011, Sushile Tejwani BGP (Border Gateway Protocol) By Sushil Tejwani Bobby.b. Lyle school of Engineering Southern Methodist University Smu id- 37060014 What is BGP? Index :- Path Vector Routing Message Formats Path Attributes

More information

ISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks

More information

Network Working Group. Category: Standards Track Cisco Systems. D. Katz Juniper Networks Y. Rekhter. Cisco Systems. February 1998

Network Working Group. Category: Standards Track Cisco Systems. D. Katz Juniper Networks Y. Rekhter. Cisco Systems. February 1998 Network Working Group Request for Comments: 2283 Category: Standards Track T. Bates Cisco Systems R. Chandra Cisco Systems D. Katz Juniper Networks Y. Rekhter Cisco Systems February 1998 Multiprotocol

More information

Introduction to BGP. ISP Workshops. Last updated 30 October 2013

Introduction to BGP. ISP Workshops. Last updated 30 October 2013 Introduction to BGP ISP Workshops Last updated 30 October 2013 1 Border Gateway Protocol p A Routing Protocol used to exchange routing information between different networks n Exterior gateway protocol

More information

Internet Routing Protocols Lecture 03 Inter-domain Routing

Internet Routing Protocols Lecture 03 Inter-domain Routing Internet Routing Protocols Lecture 03 Inter-domain Routing Advanced Systems Topics Lent Term, 2008 Timothy G. Griffin Computer Lab Cambridge UK Autonomous Routing Domains A collection of physical networks

More information

Network Security: Routing security. Aapo Kalliola T Network security Aalto University, Nov-Dec 2012

Network Security: Routing security. Aapo Kalliola T Network security Aalto University, Nov-Dec 2012 Network Security: Routing security Aapo Kalliola T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Structure of internet 2. Routing basics 3. Security issues 4. Attack 5. Solutions

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

BGP. Autonomous system (AS) BGP version 4

BGP. Autonomous system (AS) BGP version 4 BGP Border Gateway Protocol (an introduction) dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.3, 2010/03/10 20:05:02) Monday, March 8, 2010 General ideas behind BGP Background

More information

Internet Routing Protocols Lecture 01 & 02

Internet Routing Protocols Lecture 01 & 02 Internet Routing Protocols Lecture 01 & 02 Advanced Systems Topics Lent Term, 2010 Timothy G. Griffin Computer Lab Cambridge UK Internet Routing Outline Lecture 1 : Inter-domain routing architecture, the

More information

Analysis of BGP Prefix Origins During Google s May 2005 Outage

Analysis of BGP Prefix Origins During Google s May 2005 Outage Analysis of BGP Prefix Origins During Google s May 2005 Outage Tao Wan Paul C. van Oorschot School of Computer Science Carleton University, Ottawa, Canada {twan, paulv}@scs.carleton.ca Abstract Google

More information

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System)

BGP. Autonomous system (AS) BGP version 4. Definition (AS Autonomous System) BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 310, 2014/03/11 10:50:06) Monday, March 10, 2014 General ideas behind BGP Background Providers,

More information

BGP Origin AS Validation

BGP Origin AS Validation The feature helps prevent network administrators from inadvertently advertising routes to networks they do not control. This feature uses a Resource Public Key Infrastructure (RPKI) server to authenticate

More information

Resource Public Key Infrastructure

Resource Public Key Infrastructure Resource Public Key Infrastructure A pilot for the Internet2 Community to secure the global route table Andrew Gallo The Basics The Internet is a self organizing network of networks. How do you find your

More information

BGP Configuration. BGP Overview. Introduction to BGP. Formats of BGP Messages. Header

BGP Configuration. BGP Overview. Introduction to BGP. Formats of BGP Messages. Header Table of Contents BGP Configuration 1 BGP Overview 1 Introduction to BGP 1 Formats of BGP Messages 1 BGP Path Attributes 4 BGP Route Selection 8 Configuring BGP 8 Configuration Prerequisites 8 Configuration

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u

More information

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016 CS 457 Networking and the Internet Fall 2016 The Global Internet (Then) The tree structure of the Internet in 1990 The Global Internet (And Now) A simple multi-provider Internet 1 The Global Internet Some

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

Better Interdomain Path Diversity with BGP Path Splicing

Better Interdomain Path Diversity with BGP Path Splicing Better Interdomain Path Diversity with BGP Path Splicing Murtaza Motiwala, Nick Feamster, Santosh Vempala College of Computing, Georgia Tech 1. Introduction Today s interdomain routing protocol, Border

More information

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak Accurate Real-time Identification of IP Hijacking Presented by Jacky Mak Outline Problem and Objectives Interdomain Routing and BGP Basics Attack Model of IP Hijacking Real-time Detection Techniques Implementation

More information

Internetworking: Global Internet and MPLS. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Internetworking: Global Internet and MPLS. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 Internetworking: Global Internet and MPLS Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 10/19/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Internet Engineering Task Force (IETF) Category: Informational. D. Ward Cisco Systems August 2014

Internet Engineering Task Force (IETF) Category: Informational. D. Ward Cisco Systems August 2014 Internet Engineering Task Force (IETF) Request for Comments: 7353 Category: Informational ISSN: 2070-1721 S. Bellovin Columbia University R. Bush Internet Initiative Japan D. Ward Cisco Systems August

More information

Inter-domain routing validator based spoofing defence system

Inter-domain routing validator based spoofing defence system University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Inter-domain routing validator based spoofing defence system Lei

More information

Border Gateway Protocol (an introduction) Karst Koymans. Monday, March 10, 2014

Border Gateway Protocol (an introduction) Karst Koymans. Monday, March 10, 2014 .. BGP Border Gateway Protocol (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 3.10, 2014/03/11 10:50:06) Monday, March 10, 2014 Karst Koymans (UvA) BGP Monday, March

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala October 9, 2018 (a) October 18 October 9,

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala October 9, 2018 (a) October 18 October 9, CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 9, 2018 (a) October 18 October 9, 2018 1 host Message, Segment, Packet, and Frame host HTTP HTTP message HTTP TCP TCP segment

More information

SECURE BORDER GATEWAY PROTOCOL USING TIGER ATTACKS

SECURE BORDER GATEWAY PROTOCOL USING TIGER ATTACKS SECURE BORDER GATEWAY PROTOCOL USING TIGER ATTACKS P.GIRIJA 1, G.SARANYA 2, S.KOUSALYA 3 1,2,3 ASSISTANT PROFESSOR-CSE A.S.L PAULS COLLEGE OF ENGINEERING AND TECHNOLOGY, Coimbatore Abstract Border Gateway

More information

Autonomous Security for Autonomous Systems

Autonomous Security for Autonomous Systems Autonomous Security for Autonomous Systems Josh Karlin, Stephanie Forrest, and Jennifer Rexford Abstract The Internet s interdomain routing protocol, BGP, supports a complex network of Autonomous Systems

More information

BGP Origin Validation (RPKI)

BGP Origin Validation (RPKI) University of Amsterdam System & Network Engineering BGP Origin Validation (RPKI) July 5, 2013 Authors: Remy de Boer Javy de Koning Supervisors: Jac Kloots

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga

More information

Interdomain Routing. Networked Systems (H) Lecture 11

Interdomain Routing. Networked Systems (H) Lecture 11 Interdomain Routing Networked Systems (H) Lecture 11 Lecture Outline Interdomain routing Autonomous systems and the Internet AS-level topology BGP and Internet routing 2 Interdomain Unicast Routing Tier-1

More information

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Routing Security Professor Patrick McDaniel Spring 2009 1 Routing 101 Network routing exists to provide hosts desirable paths from the source

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Introducción al RPKI (Resource Public Key Infrastructure)

Introducción al RPKI (Resource Public Key Infrastructure) Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to

More information

Topic 3 part 2 Traffic analysis; Routing Attacks &Traffic Redirection Fourth Stage

Topic 3 part 2 Traffic analysis; Routing Attacks &Traffic Redirection Fourth Stage 3-2 Routing attack To understand hoe the router works, click on http://www.mustbegeek.com/types-of-router-attacks/ Types of Router Attacks 1. Denial of Service attacks: The DoS attack is done by the attacker

More information

FiberstoreOS BGP Configuration

FiberstoreOS BGP Configuration FiberstoreOS BGP Configuration Contents 1 Configure BGP...1 1.1 Overview... 1 1.2 Basic Topology (EBGP)... 2 1.2.2 Configuration... 2 1.2.3 Validation... 4 1.3 Basic topology(ibgp)... 5 1.3.2 Configuration...

More information

Routing Security We can do better!

Routing Security We can do better! Routing Security We can do better! And how MANRS can help Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 90 60 Hijack Leak 30 0 1/5/17 1/16/17 1/27/17

More information

VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes

VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes Symposium on Visualization for Cyber Security (VizSec 2012) 15th October 2012, Seattle, WA, USA VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes Fabian Fischer 1, J. Fuchs

More information

Detection of Invalid Routing Announcement in the Internet Λ

Detection of Invalid Routing Announcement in the Internet Λ Detection of Invalid Routing Announcement in the Internet Λ Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu,Lixia Zhang y Abstract Network measurement has shown that a specific

More information

Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material.

Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring * Thanks to Steve Bellovin for slide source material. Routing Security* CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 * Thanks to Steve Bellovin for slide source material. 1 Routing 101 Network routing exists to provide hosts desirable

More information

Enhancing the Trust of Internet Routing with Lightweight Route Attestation

Enhancing the Trust of Internet Routing with Lightweight Route Attestation 1 Enhancing the Trust of Internet Routing with Lightweight Route Attestation Qi Li, Student Member, IEEE, Mingwei Xu, Member, IEEE, Jianping Wu, Fellow, IEEE, Xinwen Zhang, Member, IEEE, Patrick P. C.

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

AS-CRED: Reputation Service for Trustworthy Inter-domain Routing

AS-CRED: Reputation Service for Trustworthy Inter-domain Routing AS-CRED: Reputation Service for Trustworthy Inter-domain Routing Krishna Venkatasubramanian Computer and Information Science University of Pennsylvania ONR MURI N00014-07-1-0907 Review Meeting June 10,

More information

A Survey of BGP Security: Issues and Solutions

A Survey of BGP Security: Issues and Solutions A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011 Outline Introduction/Motivation Sources of BGP Insecurity BGP Security Today BGP

More information

CS 268: Computer Networking. Next Lecture: Interdomain Routing

CS 268: Computer Networking. Next Lecture: Interdomain Routing CS 268: Computer Networking L-3 BGP Next Lecture: Interdomain Routing BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet 2 Outline Need for hierarchical

More information

GLOBAL INTERNET ROUTING FORENSICS Validation of BGP Paths using ICMP Traceback

GLOBAL INTERNET ROUTING FORENSICS Validation of BGP Paths using ICMP Traceback Chapter 14 GLOBAL INTERNET ROUTING FORENSICS Validation of BGP Paths using ICMP Traceback Eunjong Kim, Dan Massey and Indrajit Ray Abstract The Border Gateway Protocol (BGP), the Internet's global routing

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 24: Exterior Routing and BGP Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus How routing between different

More information

Mutually Agreed Norms for Routing Security NAME

Mutually Agreed Norms for Routing Security NAME Mutually Agreed Norms for Routing Security NAME EMAIL The Problem A Routing Security Overview 2 Routing Incidents are Increasing In 2017 alone, 14,000 routing outages or attacks such as hijacking, leaks,

More information

An Expectation-Based Approach to Policy-Based Security of the Border Gateway Protocol

An Expectation-Based Approach to Policy-Based Security of the Border Gateway Protocol 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): GI 2016: 9th IEEE Global Internet Symposium An Expectation-Based Approach to Policy-Based Security of the Border Gateway Protocol

More information

Major Project Part II. Isolating Suspicious BGP Updates To Detect Prefix Hijacks

Major Project Part II. Isolating Suspicious BGP Updates To Detect Prefix Hijacks Major Project Part II Isolating Suspicious BGP Updates To Detect Prefix Hijacks Author: Abhishek Aggarwal (IIT Delhi) Co-authors: Anukool Lakhina (Guavus Networks Inc.) Prof. Huzur Saran (IIT Delhi) !

More information