Securing BGP incrementally

Martin Suchara, Ioannis Avramopoulos, Jennifer L. Rexford

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it became clear that any viable secure routing protocol must offer benefits also in its early stages of deployment. In order to determine when the protocols are not adoptable, we quantify the benefits offered by a partial deployment of an Idealized Secure BGP which is able to detect malicious routes with perfect accuracy. We also quantify the benefits of an imperfect version of the protocol. Subsequently, we conclude that even the best protocols which simply detect and avoid bogus routes do not offer good security performance except in limited scenarios. We offer alternative designs, and hope that our insights will result in a new secure routing protocol that will be more attractive to early adopters.

Original languageEnglish (US)
Title of host publicationProceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT
DOIs
StatePublished - Dec 1 2007
Event2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT - New York, NY, United States
Duration: Dec 10 2007Dec 13 2007

Publication series

NameProceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT

Other

Other2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT
CountryUnited States
CityNew York, NY
Period12/10/0712/13/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Securing BGP incrementally'. Together they form a unique fingerprint.

  • Cite this

    Suchara, M., Avramopoulos, I., & Rexford, J. L. (2007). Securing BGP incrementally. In Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT [a52] (Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT). https://doi.org/10.1145/1364654.1364715