[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3961))

Included in the following conference series:

  • 834 Accesses

Abstract

The present Internet is not trustworthy, partially because the routing system forwards packets only according to destination IP address. Forged packets with mendacious source IP address will also be brought to the destination, which can be utilized to compromise the destination machine. In this paper, we propose to enhance BGP by adding Route Selection Notice functionality. With BGP Route Selection Notice, Autonomous Systems can validate the authenticity of incoming IP packets and filter out improper packets to make routing infrastructure offer support to trustworthy service. BGP Route Selection Notice does not impair the routing function of BGP and with proper design its bandwidth cost and convergence delay is acceptable which is proved by our simulation.

Supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314801, and Hi-tech research and development program of China under Grant No. 2005AA112130.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Rekhter, Y., Li, T.: A Border Gateway Protocol 4(BGP-4). RFC 1771 (1995)

    Google Scholar 

  2. Labovitz, C., Malan, G.R., Jahanian, F.: Internet routing instability. IEEE/ACM Transactions on Networking 6(5), 515–527 (1998)

    Article  Google Scholar 

  3. Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In: Proceedings of ACM SIGCOMM, vol. 31(4), pp. 15–26 (2001)

    Google Scholar 

  4. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. Computer Communication Review 30(4), 295–306 (2000)

    Article  Google Scholar 

  5. Baker, F.: Requirements for IP Version 4 Routers. RFC 1812 (1995)

    Google Scholar 

  6. Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (1998)

    Google Scholar 

  7. Bremler-Barr, A., Levy, H.: Spoofing prevention method. In: Proceedings of IEEE INFOCOM, pp. 536–547 (2005)

    Google Scholar 

  8. Li, J., Mirkovic, J., Wang, M., Reiher, M., Zhang, L.: SAVE: Source address validity enforcement protocol. In: Proceedings of IEEE INFOCOM, vol. 3, pp. 1557–1566 (2002)

    Google Scholar 

  9. SSFNet project, http://www.ssfnet.org/

  10. Premore, B.: Multi-as topologies from BGP routing tables, http://www.ssfnet.org/Exchange/gallery/asgraph/index.html

  11. Labovitz, C., Ahuja, A., Bose, A., Jahanian, F.: Delayed Internet routing convergence. IEEE/ACM Transactions on Networking 9(3), 293–306 (2001)

    Article  Google Scholar 

  12. Siganos, G., Faloutsos, M., Faloutsos, P., Faloutsos, C.: Power laws and the AS-level Internet topology. IEEE/ACM Transactions on Networking 11(7-11), 514–524 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lijun, W., Ke, X., Jianping, W. (2006). BGP Route Selection Notice. In: Chong, I., Kawahara, K. (eds) Information Networking. Advances in Data Communications and Wireless Networks. ICOIN 2006. Lecture Notes in Computer Science, vol 3961. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11919568_44

Download citation

  • DOI: https://doi.org/10.1007/11919568_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48563-6

  • Online ISBN: 978-3-540-48564-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics