Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE.

Similar presentations


Presentation on theme: "Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE."— Presentation transcript:

1 Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE B.Sc., PhD. Swinburne University of Technology 1

2 Border Gateway Protocol  What is it?  iBGP vs eBGP  TCP/IP  Distant Vector Routing Path Vector Routing  Route Selection Process  Messages AS Path 2

3 BGP Threat Model  Securing the BGP Session Injection, eavesdropping, delay messages, replay  Verifying BGP Identity Are you really who you claim to be?  Verifying BGP Information Is your information complete?  Verifying Forwarding Paths Is my information accurate? 3

4 Consequences of Attacks on the Routing System Denial of Service the potential to masqueradeAddress Stealing The ability to eavesdrop www.fireblog.com 4

5 Securing BGP  The Security Toolset  Security Requirements Securing the data payload and semantics Piecemeal incremental deployment  Approaches to Securing BGP sBGP, soBGP, psBGP, pgBGP, IRV 5

6 Approaches to Securing BGP  Securing the operation of BGP TCP session GTSM TCP MD5 IPSEC  Security in the Data Level 6

7 Securing the Integrity of BGP Data  sBGP  soBGP psBGP  IRV  pgBGP 7

8 State of BGP Security As the table shows, of all proposals, only a few have been implemented and mostly not deployed 8


Download ppt "Presented by: Tony Reveldez GEOFF HUSTON B.Sc., M.Sc. Australian National University MATTIA ROSSI B.Eng.,M.Sc. Leopold- Franzens- Universitaet GEOFF ARMITAGE."

Similar presentations


Ads by Google