TY - GEN
T1 - Pretty good BGP
T2 - 14th IEEE International Conference on Network Protocols, ICNP 2006
AU - Karlin, Josh
AU - Forrest, Stephanie
AU - Rexford, Jennifer L.
PY - 2006/12/1
Y1 - 2006/12/1
N2 - The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP. However, BGP routers can avoid selecting and propagating these routes if they are cautious about adopting new reachability information. We describe a protocolpreserving enhancement to BGP, Pretty Good BGP (PGBGP), that slows the dissemination of bogus routes, providing network operators time to respond before problems escalate into large-scale Internet attacks. Simulation results show that realistic deployments of PGBGP could provide 99% of Autonomous Systems with 24 hours to investigate and repair bogus routes without affecting prefix reachability. We also show that without PGBGP, 40% of ASs cannot avoid selecting bogus routes; with PGBGP, this number drops to less than 1%. Finally, we show that PGBGP is incrementally deployable and offers significant security benefits to early adopters and their customers.
AB - The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP. However, BGP routers can avoid selecting and propagating these routes if they are cautious about adopting new reachability information. We describe a protocolpreserving enhancement to BGP, Pretty Good BGP (PGBGP), that slows the dissemination of bogus routes, providing network operators time to respond before problems escalate into large-scale Internet attacks. Simulation results show that realistic deployments of PGBGP could provide 99% of Autonomous Systems with 24 hours to investigate and repair bogus routes without affecting prefix reachability. We also show that without PGBGP, 40% of ASs cannot avoid selecting bogus routes; with PGBGP, this number drops to less than 1%. Finally, we show that PGBGP is incrementally deployable and offers significant security benefits to early adopters and their customers.
UR - http://www.scopus.com/inward/record.url?scp=44049101942&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=44049101942&partnerID=8YFLogxK
U2 - 10.1109/ICNP.2006.320179
DO - 10.1109/ICNP.2006.320179
M3 - Conference contribution
AN - SCOPUS:44049101942
SN - 1424405939
SN - 9781424405930
T3 - Proceedings - International Conference on Network Protocols, ICNP
SP - 290
EP - 299
BT - Proceedings - 14th IEEE International Conference on Network Protocols, ICNP 2006
Y2 - 12 November 2006 through 15 November 2006
ER -