Open Access
Subscription Access
BGP Prefix Hijacking Attack and its Prevention Methods
The Border Gateway Protocol (BGP) is an Internet routing protocol that is widely used. With the introduction and implementation of various security features to prevent attacks and alleviate routing instabilities, BGP remains vulnerable due to the lack of integrity and authentication of BGP messages. BGP operations are highly dependent on its security, and attacks against BGP have a detrimental effect on packet forwarding. Given the importance of BGP security, Two techniques to improve BGP session security have been studied in this project to improve secure Internet routing, this project describes BGP prefix hijacking attack and its cause and the way to prevent it. The project studies BGP prefix filtering and Resource Public Key Infrastructure (RPKI), to prevent BGP from malicious attacks and misconfigurations. BGP prefix filtering is operationally deployable and very effective to improve BGP security problems. RPKI a specialized Public Key Infrastructure (PKI), was developed. It makes use of cryptographically verifiable statements to ensure that Autonomous Systems (ASes) and the owners of Internet resources are certifiably linked to the routing information they generate, resulting in a trusted routing origin.
Keywords
Border Gateway Protocol, BGP HIjacking, BGP Prefix, RPKI Validation, BGP RPKI.
User
Font Size
Information
Abstract Views: 160