2016 IEEE European Symposium on Security and Privacy (EuroS&P) 2016
DOI: 10.1109/eurosp.2016.39
|View full text |Cite
|
Sign up to set email alerts
|

It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe

Abstract: Abstract-The Internet is often thought to be a model of resilience, due to a decentralised, organically-grown architecture. This paper puts this perception into perspective through the results of a security analysis of the Border Gateway Protocol (BGP) routing infrastructure. BGP is a fundamental Internet protocol and its intrinsic fragilities have been highlighted extensively in the literature. A seldom studied aspect is how robust the BGP infrastructure actually is as a result of nearly three decades of perp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…Presumably, this was due to the problem size associated with large-scale infrastructures like the Internet. Frey et al [22] conducted one of the first Internet-scale infrastructure assessments in terms of security evaluation. They investigated the Border Gateway Protocol deployment looking into potential threats and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Presumably, this was due to the problem size associated with large-scale infrastructures like the Internet. Frey et al [22] conducted one of the first Internet-scale infrastructure assessments in terms of security evaluation. They investigated the Border Gateway Protocol deployment looking into potential threats and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…BGP threats are caused by three fundamental vulnerabilities. First, BGP infrastructure is susceptible to physical attacks by outsiders, e.g., damage to hardware or cables between ASs [3]. Such attacks fall into the field of physical and logical security and are out of scope of this work.…”
Section: Classification Of Attacks On Bgpmentioning
confidence: 99%
“…Subprefix hijack: Another way the attacker can prevent a MOAS conflict is by advertising a subnetwork of 3 https://bgpmon.net/large-scale-bgp-hijack-out-of-india/ an existing prefix which does not belong to the attacker (Figure 1(b)). This event is also known as de-aggregation attack 4 .…”
Section: Classification Of Attacks On Bgpmentioning
confidence: 99%
See 1 more Smart Citation
“…BGP [1,2,3,4,5,6] unlike the other routing protocols is an exterior gateway protocol used between autonomous systems and is a path vector routing protocol. After you enable BGP on your router you need to advertise your routes in the routing protocol to be handled in the routing table to be exchanged with others (injection/advertisement).…”
Section: Introductionmentioning
confidence: 99%