On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation

03/16/2019
by   Wenjie Xu, et al.
0

BGP is the default inter-domain routing protocol in today's Internet, but has serious security vulnerabilitiesmurphy2005bgp. One of them is (sub)prefix hijacking. IETF standardizes RPKI to validate the AS origin but RPKI has a lot of problemsheilman2014consentcooper2013riskgilad2017wegilad2017maxlength, among which is potential false alarm. Although some previous workgilad2017weheilman2014consent points it out explicitly or implicitly, further measurement and analysis remain to be done. Our work measures and analyzes the invalid prefixes systematically. We first classify the invalid prefixes into six different types and then analyze their stability. We show that a large proportion of the invalid prefixes very likely result from traffic engineering, IP address transfer and failing to aggregate rather than real hijackings.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2022

From IP to transport and beyond: cross-layer attacks against applications

We perform the first analysis of methodologies for launching DNS cache p...
research
06/07/2019

Validating IP Prefixes and AS-Paths with Blockchains

Networks (Autonomous Systems-AS) allocate or revoke IP prefixes with the...
research
08/31/2020

APVAS: Reducing Memory Size of AS_PATH Validation by Using Aggregate Signatures

The BGPsec protocol, which is an extension of the border gateway protoco...
research
03/15/2021

BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks

Amplification DDoS attacks inherently rely on IP spoofing to steer attac...
research
03/21/2023

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

IP prefix hijacks allow adversaries to redirect and intercept traffic, p...
research
03/13/2021

Performance Analysis of Multipath BGP

Multipath BGP (M-BGP) allows a BGP router to install multiple 'equally-g...
research
11/24/2022

Data Origin Inference in Machine Learning

It is a growing direction to utilize unintended memorization in ML model...

Please sign up or login with your details

Forgot password? Click here to reset