Open Access Open Access  Restricted Access Subscription Access

BGP Prefix Hijacking Attack and its Prevention Methods


Affiliations
1 Department of Computer Networks, Misurata University, Libya

The Border Gateway Protocol (BGP) is an Internet routing protocol that is widely used. With the introduction and implementation of various security features to prevent attacks and alleviate routing instabilities, BGP remains vulnerable due to the lack of integrity and authentication of BGP messages. BGP operations are highly dependent on its security, and attacks against BGP have a detrimental effect on packet forwarding. Given the importance of BGP security, Two techniques to improve BGP session security have been studied in this project to improve secure Internet routing, this project describes BGP prefix hijacking attack and its cause and the way to prevent it. The project studies BGP prefix filtering and Resource Public Key Infrastructure (RPKI), to prevent BGP from malicious attacks and misconfigurations. BGP prefix filtering is operationally deployable and very effective to improve BGP security problems. RPKI a specialized Public Key Infrastructure (PKI), was developed. It makes use of cryptographically verifiable statements to ensure that Autonomous Systems (ASes) and the owners of Internet resources are certifiably linked to the routing information they generate, resulting in a trusted routing origin.

Keywords

Border Gateway Protocol, BGP HIjacking, BGP Prefix, RPKI Validation, BGP RPKI.
User
Notifications
Font Size

Abstract Views: 160




  • BGP Prefix Hijacking Attack and its Prevention Methods

Abstract Views: 160  | 

Authors

Afif Abugharsa
Department of Computer Networks, Misurata University, Libya
Bashir Elkharraz
Department of Computer Networks, Misurata University, Libya
Eltohami Elghoul
Department of Computer Networks, Misurata University, Libya

Abstract


The Border Gateway Protocol (BGP) is an Internet routing protocol that is widely used. With the introduction and implementation of various security features to prevent attacks and alleviate routing instabilities, BGP remains vulnerable due to the lack of integrity and authentication of BGP messages. BGP operations are highly dependent on its security, and attacks against BGP have a detrimental effect on packet forwarding. Given the importance of BGP security, Two techniques to improve BGP session security have been studied in this project to improve secure Internet routing, this project describes BGP prefix hijacking attack and its cause and the way to prevent it. The project studies BGP prefix filtering and Resource Public Key Infrastructure (RPKI), to prevent BGP from malicious attacks and misconfigurations. BGP prefix filtering is operationally deployable and very effective to improve BGP security problems. RPKI a specialized Public Key Infrastructure (PKI), was developed. It makes use of cryptographically verifiable statements to ensure that Autonomous Systems (ASes) and the owners of Internet resources are certifiably linked to the routing information they generate, resulting in a trusted routing origin.

Keywords


Border Gateway Protocol, BGP HIjacking, BGP Prefix, RPKI Validation, BGP RPKI.