The security appliance to BIRD software router

  • Authors:
  • Kyoungha Kim;Yanggon Kim

  • Affiliations:
  • Towson University, Towson, MD;Towson University, Towson, MD

  • Venue:
  • Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Internet consists of a large number of interconnected Autonomous Systems (ASes) which exchange their routes using Border Gateway Protocol (BGP). However, it was originally designed to operate in a trusted environment, and there are no internal mechanisms to protect the information it carries. We have implemented RTR-BIRD, which is an enhancement of BIRD software router to interact with RTRPKI which is another implementation of us to allow RTR-BIRD to support origin validation using Resource Public Key Infrastructure (RPKI). In contrast to QuaggaSRx that is the only one RPKI-capable software router implementation at this time, our implementation enables users to access an empirical cache rather than a virtual cache which is implemented by National Institute of Standards and Technology (NIST) and resides in a local. Subsequently, RTR-BIRD can be exploited for practical testing in software-based routing environment against QuaggaSRx. Our main contribution here is that we have developed the originator which not only makes a software router (BIRD) interact with RPKI but also shares a validated cache as well as Route Origin Authorizations (ROAs) of the cache with the other software routers. We also expect that RTR-BIRD is faster than QuaggaSRx as much as the difference in performance between the deployed and latest version of BIRD and that of Quagga. It's because an algorithm theoretically shows the same performance in a same situation, and each origin validation scheme of RTR-BIRD and QuaggaSRx, each of which is implemented based on the same standard defined by IETF, is equivalent to each other.