Sciweavers

Share
CCS
2006
ACM

Optimizing BGP security by exploiting path stability

9 years 11 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has been widely deployed. The lack of adoption is largely caused by a failure to find a balance between deployability, cost, and security. In this paper, we consider the design and performance of BGP path authentication constructions that limit resource costs by exploiting route stability. Based on a year-long study of BGP traffic and indirectly supported by findings within the networking community, we observe that routing paths are highly stable. This observation leads to comprehensive and efficient constructions for path authentication. We empirically analyze the resource consumption of the proposed constructions via trace-based simulations. This latter study indicates that our constructions can reduce validation costs by as much as 97.3% over existing proposals while requiring nominal storage resources. We conc...
Kevin R. B. Butler, Patrick McDaniel, William Aiel
Added 22 Aug 2010
Updated 22 Aug 2010
Type Conference
Year 2006
Where CCS
Authors Kevin R. B. Butler, Patrick McDaniel, William Aiello
Comments (0)
books