An analysis of susceptibility in securing multifaceted Border Gateway Protocol (BGP)
Links to Fileshttp://library.towson.edu/cdm/ref/collection/etd/id/52678
MetadataShow full item record
Type of Workapplication/pdf
xiv, 129 pages
DepartmentTowson University. Department of Computer and Information Sciences
The Border Gateway Protocol (BGP), which is an inter-domain routing protocol, does not validate the origin and path information that are used to form BGP networks, resulting in many BGP-routing accidents. The Resource Public Key Infrastructure (RPKI ) and BGPsec are remarked as solutions to provide the Origin Validation and Path Validation into BGP. The validation methodologies in those solutions are based on the Public Key Infrastructure (PKI ) so as to offer the strong security level but produce significant computational overhead, especially in validating paths. In this paper, we contribute to developing BGP implementations for researchers to perform practical BGP simulations based on RPKI or BGPsec, as well as to analyze BGP data. Our implementations also introduce less computational overhead with the same capabilities.