Does Scale, Size, and Locality Matter? Evaluation of Collaborative BGP Security Mechanisms
2016 (English)In: Proc. IFIP Networking, Vienna, Austria, May 2016., 2016Conference paper (Refereed)
The Border Gateway Protocol (BGP) was not designed with security in mind and is vulnerable to many attacks, including prefix/subprefix hijacks, interception attacks, and imposture attacks. Despite many protocols having been proposed to detect or prevent such attacks, no solution has been widely deployed. Yet, the effectiveness of most proposals relies on largescale adoption and cooperation between many large Autonomous Systems (AS). In this paper we use measurement data to evaluate some promising, previously proposed techniques in cases where they are implemented by different subsets of ASes, and answer questions regarding which ASes need to collaborate, the importance of the locality and size of the participating ASes, and how many ASes are needed to achieve good efficiency when different subsets of ASes collaborate. For our evaluation we use topologies and routing information derived from real measurement data. We consider collaborative detection and prevention techniques that use (i) prefix origin information, (ii) route path updates, or (iii) passively collected round-trip time (RTT) information. Our results and answers to the above questions help determine the effectiveness of potential incremental rollouts, incentivized or required by regional legislation, for example. While there are differences between the techniques and two of the three classes see the biggest benefits when detection/prevention is performed close to the source of an attack, the results show that significant gains can be achieved even with only regional collaboration.
Place, publisher, year, edition, pages
Computer Science Communication Systems
IdentifiersURN: urn:nbn:se:liu:diva-129430OAI: oai:DiVA.org:liu-129430DiVA: diva2:939403
Proc. IFIP Networking, Vienna, Austria, May 2016