An analysis of susceptibility in securing multifaceted Border Gateway Protocol (BGP)

Kyoungha Kim
2016
The Border Gateway Protocol (BGP), which is an inter-domain routing protocol, does not validate the origin and path information that are used to form BGP networks, resulting in many BGP-routing accidents. The Resource Public Key Infrastructure (RPKI ) and BGPsec are remarked as solutions to provide the Origin Validation and Path Validation into BGP. The validation methodologies in those solutions are based on the Public Key Infrastructure (PKI ) so as to offer the strong security level but
more » ... ce significant computational overhead, especially in validating paths. In this paper, we contribute to developing BGP implementations for researchers to perform practical BGP simulations based on RPKI or BGPsec, as well as to analyze BGP data. Our implementations also introduce less computational overhead with the same capabilities.
doi:10.13016/m25j7c fatcat:fai4yvlotfgj3nemlondfndvd4