Security enhancement on BGP protocol: A literature survey

Border Gateway Protocol (BGP) is an exterior gateway classless path vector routing protocol. It is a routing protocol operated to exchange routing information among different autonomous system over the internet. BGP hold multitudinous unprotected security, since it works with the received information from neighboring routers which could be wrong sometime. Routing is the backbone of any network, the road transport network to the Internet via telephone network. Its importance is capital itself in accentors networks (which have no center), that is to say, in networks where information is not disseminated (so known) from a single central point of the network, as Internet. A complete vision of RPKI (Resource public key infrastructure) needs several interconnected networks, dynamic routing between these networks and authentication of RPKI.

[1]  Evangelos Kranakis,et al.  Pretty Secure BGP, psBGP , 2005, NDSS.

[2]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[3]  Russ White Architecture and Deployment Considerations for Secure Origin BGP (soBGP) , 2006 .

[4]  Tao Wan,et al.  Securing routing protocols through information corroboration , 2006 .

[5]  R. A. White,et al.  Deployment Considerations for Secure Origin BGP (soBGP) , 2003 .

[6]  Ravishanker Chandra,et al.  BGP Route Reflection An alternative to full mesh IBGP , 1996, RFC.

[7]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.

[8]  Andy Heffernan,et al.  Protection of BGP Sessions via the TCP MD5 Signature Option , 1998, RFC.

[9]  Eric Rescorla,et al.  Guidelines for Writing RFC Text on Security Considerations , 2003, RFC.

[10]  Jennifer Rexford,et al.  Pretty Good BGP: Improving BGP by Cautiously Adopting Routes , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[11]  Paul Traina Autonomous System Confederations for BGP , 1996, RFC.

[12]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[13]  Marcin Zalewski,et al.  Strange attractors and tcp/ip sequence number analysis , 2004 .

[14]  Kirk Lougheed,et al.  Border Gateway Protocol (BGP) , 2021, IP Routing Protocols.

[15]  Susan Hares,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[16]  Yakov Rekhter,et al.  Border Gateway Protocol 3 (BGP-3) , 1991, RFC.

[17]  Sandra L. Murphy,et al.  BGP Security Vulnerabilities Analysis , 2006, RFC.

[18]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[19]  It Informatics,et al.  Border Gateway Protocol , 2013 .

[20]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[21]  Evangelos Kranakis,et al.  On interdomain routing security and pretty secure BGP (psBGP) , 2007, TSEC.

[22]  Geoff Huston,et al.  BGP Wedgies , 2005, RFC.

[23]  Lixin Gao,et al.  On inferring and characterizing Internet routing policies , 2003, Journal of Communications and Networks.

[24]  Patrick D. McDaniel,et al.  Origin authentication in interdomain routing , 2003, CCS '03.

[25]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.