nonetheless cooperate to offer global connectivity to
hundreds of millions of hosts. Routing policies are
used to select which routes are advertised to which
neighbors and which paths are used to send packets
to any given destination.
The way routing information is exchanged and the
content of routing information are crucial for
Internet connectivity, reliability, and robustness. If
this network prefix reachability information is
incorrect, traffic may not reach its destination,
networks may be isolated, and traffic may be
subverted to unintended networks. There are many
reasons why this information may be incorrect. First,
BGP has vulnerabilities; its messages are subject to
modification, deletion, forgery, and replay. At the
beginning of Internet, there were few interconnected
ASes and there was an implicit trust relationship,
nowadays their number is increasing considerably
(approximately 30 per week (Huston, 2006)). Even
if the peering agreements between two ASes helps to
build a trust relationship, the hop by hop routing
paradigm and the ability of each hop to modify BGP
messages decreases the trust relationship.
Information traverses unknown ASes and is subject
to modification or deletion maliciously or due to
misconfigurations.
The remainder of this paper is structured as follows.
Section 2 reviews the related work. Section 3
formally defines identified requirements. In section
4 we introduce the background materials and we
describe the methodology that we used to identify
incorrect announcements, we discuss this proposal.
We conclude in section 5.
2 RELATED WORK
Several efforts have been made to solve internet
routing security problems. They vary from the
utilization of cryptographic methods, the utilization
of the forwarding plane to validate announcements,
to anomaly detection based on routes monitoring.
Different solutions are based on cryptographic
methods aiming to avoid and to prevent incorrect
information propagation. One of these approaches is
Secure BGP (Kent, 2000). Its goal is to assure the
integrity of BGP messages, the authorization of a
router to originate and to announce a route. IPSec is
used to provide messages integrity and peer
authentication. A public key infrastructure is used to
support the authentication of the ownership of
address blocks and autonomous system identities,
the given BGP router's identity and its right to
represent the AS it claims. Certificates are issued as
address blocks and autonomous systems numbers
are allocated by Regional Internet Registries (RIR).
Another public key infrastructure is used to express
the authorization of a router to send an
announcement to another router. The main
disadvantage of SBGP is to add complexity and
increase the convergence time. In addition, the strict
hierarchal public key infrastructures (PKIs) make it
difficult to deploy over Internet (Atkinson, 2004).
Zhao et al (Zhao, 2004)(Zhao, 2005) addressed these
drawbacks and proposed some enhancements. They
used different cryptographic methods in order to
make it less complex and to minimize the added
convergence time. In addition, SBGP does not
address issues such as detecting policy violations or
incorrect propagation of route announcements or
withdrawals. Secure Origin BGP (White, 2003) is a
second solution using cryptographic methods. It uses
a PKI to authenticate the AS; RIRs are not involved
as Certificate Authorities (CA) for their
authentication. ASes issue certificates to authorize
other ASes to announce their prefixes. So, SoBGP is
based on the idea that ASes publish their policies
which may be considered as a drawback since some
ASes consider them confidential. Pretty Secure BGP
(Wan, 2005) uses both centralized and distributed
trust models used in SBGP and SoBGP. The first
model is used for AS number authentication and the
latter is used for IP prefix ownership and origination
verification. The three solutions described above
were presented in IETF Routing Protocols Security
Working Group but there was no consensus on those
solutions (RPSEC). A new IETF working group that
will focus on Interdomain routing security (SIDR) is
currently under proposal.
Besides cryptographic solutions, other works
focused on the MOAS conflicts. Wu et al worked on
BGP anomalies and MOAS visualization tools
(Teoh, 2003)(Teoh, 2004). Anomaly visualization is
not efficient enough againt anomalies, it would be
more efficient to have a mechanism that detects and
reacts to anomalies as the routing system is running
or even a mechanism that prevent those attacks.
Zhao et al proposed to create a list of multiple ASes
who are entitled to originate a prefix and attach it to
BGP community attribute in announcements (Zhao,
2002). In order to validate received paths, Kim et al
proposed to use forwarding plane information and
used ICMP traceback messages (Kim, 2005). The
disadvantage of this approach is related to ICMP
filtering practices currently used. Moreover there
can be legitimate differences between BGP AS paths
and paths derived from forwarding plane (Huyn,
2003).
INTERNET ROUTING SECURITY: AN APPROACH TO DETECT AND TO REACT TO INCORRECT
ADVERTISEMENTS
111