How Secure are Secure Interdomain Routing Protocols Flashcards

1
Q

the four major extensions to BGP, ordered

from weakest to strongest

A

0) (unmodified) BGP
1) origin authentication
2) soBGP
3) S-BGP
4) data-plane verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stub ASes

A

ASes without customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the manipulator’s goal is to attract trac, i.e., to convince the maximum number of ASes in the graph to
forward trac that is destined to the victim IP prex via
the manipulator’s own network.

A

an attraction attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the manipulator has the additional goal of ensuring that he has an available path to the victim. This is in contrast to an attraction attack, where the manipulator is allowed, but not required, to create a blackhole where he has no working path to the victim IP prex

A

interception attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

uses a trusted database to guarantee that an AS cannot falsely claim to be the rightful owner for an IP prefix. However, the manipulator can still get away with announcing any path that ends at the AS that rightfully owns the victim IP prex.

A

Origin Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

provides origin authentication as well as a trusted database that guarantees that any announced path physically exists in the AS-level topology of the internet work. However, a manipulator can still get away with announcing a path that exists but is not actually available.

A

soBGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In addition to origin authentication, Secure BGP also uses cryptographically-signed routing announcements to provides a property called path verification. Path verification guarantees that every AS ‘a’ can only announce a path abP to its neighbors if it has a neighbor b that announced the path bP to ‘a’. Thus, it effectively limits a single manipulator to announcing available paths.

A

S-BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

prevents an AS from announcing one path, while forwarding on another.

A

Data-plane verication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

polices the BGP announcements made by stubs. A stub is an AS with no customers

A

Defensive Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

does not include mechanisms for validating
information in routing announcements. Thus, the manipulator can get away with announcing any path he wants, including (falsely) claiming that he is the owner of the victim’s IP prefix.

A

(unmodified) BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Thus, we suggest that secure routing protocols (e.g., soBGP and S-BGP) should be deployed in combination with mechanisms that police export policies (e.g., defensive ltering). We believe both are needed; defensive ltering to eliminate attacks by stub ASes, and secure routing protocols to blunt attacks launched by larger ASes, (especially since we found that large ASes can launch the most damaging attacks).

A

export policies are a very effective attack vector that these protocols do not address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It was found that a manipulator can still attract traffic by cleverly manipulating…

A

… his export policies. Indeed, we found that announcing a short path is often less important than exporting that path to the right set of neighbors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly