A survey of security techniques for the border gateway protocol (BGP)

  • Authors:
  • M. Nicholes;B. Mukherjee

  • Affiliations:
  • Dept. of Electr. & Comput. Eng., Univ. Of California, Davis, CA;-

  • Venue:
  • IEEE Communications Surveys & Tutorials
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Web surfing is an example (and popular) Internet application where users desire services provided by servers that exist somewhere in the Internet. To provide the service, data must be routed between the user's system and the server. Local network routing (relative to the user) can not provide a complete route for the data. In the core Internet, a portion of the network controlled by a single administrative authority, called an autonomous system (AS), provides local network support and also exchanges routing information with other ASes using the border gateway protocol (BGP). Through the BGP route exchange, a complete route for the data is created. Security at this level in the Internet is challenging due to the lack of a single administration point and because there are numerous ASes which interact with one another using complex peering policies. This work reviews recent techniques to secure BGP. These security techniques are categorized as follows: 1) cryptographic/attestation, 2) database, 3) overlay/group protocols, 4) penalty, and 5) data-plane testing. The techniques are reviewed at a high level in a tutorial format, and shortcomings of the techniques are summarized as well. The depth of coverage for particular published works is intentionally kept minimal, so that the reader can quickly grasp the techniques. This survey provides a basis for evaluation of the techniques to understand coverage of published works as well as to determine the best avenues for future research.