Article | REF: TE7531 V1

BGP security: IP network interconnections security

Author: Sarah NATAF

Publication date: May 10, 2015

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

Français

ABSTRACT

The Border Gateway Protocol is the only protocol interconnecting all IP networks composing the Internet. Hence Internet interconnection security and robustness depend exclusively on the security of BGP. This article presents some weaknesses of this protocol, such as the ability to spoof a BGP peer, global incidents due to malformed messages or human errors, BGP route injection and traffic hijacking. After discussing the risks, this article presents all the countermeasures available for the operators such as inherent security mechanisms and operational best practices that aim to build a more reliable and resilient Internet.

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Sarah NATAF: Network Architect, Orange, Paris, France

 INTRODUCTION

The Internet is a network made up of tens of thousands of IP networks interconnected in pairs. These interconnections are based on a single communications protocol: BGP, or Border Gateway Protocol, which dynamically calculates and propagates the best paths to a destination. Version 4 of this protocol appeared in the mid-1990s, 1995 to be exact, at a time when the number of Internet operators and players was limited, as was the number of IP address blocks advertised on the network. In the wake of the Internet bubble in the 2000s, the explosion in the size of the routing table, the introduction of a new version of IP and the arrival of a large number of new participants in the global network, the architecture of the protocol itself has changed only slightly: BGP has undergone only minor changes to date, its structuring principles remaining unchanged.

Yet the Internet's entire reliability and resilience to outages depend on this BGP technology. The first major incident on the Internet took place in the late 1990s, when an operator inadvertently propagated incorrect routes across the entire network, causing it to collapse (this event is analyzed in the course of the article, along with a number of others). With the emergence of services that are an integral part of the daily lives of millions of people, network robustness has become a major issue: people and services need to be connected and reachable without interruption. On the other hand, while data security is always paramount, more and more attention is being paid to the way in which it is routed between sender and destination; the risks of interception for eavesdropping are growing, and particular attention is being paid to the paths taken by this data.

Traffic detour, destination unreachability, spoofing, fault propagation, isolation of all or part of the network: in this article, we list the various security risks applicable to network interconnections. We will then explain the countermeasures available, both at protocol level and in terms of the operations to be implemented by the various network operators and players. Finally, we will detail the new mechanisms available to operators to improve Internet security and combat threats such as ad spoofing and packet hijacking.

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

KEYWORDS

IP   |   network security   |   internet   |   telecommunications   |   security   |   BGP   |   IP


This article is included in

Networks and Telecommunications

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
BGP and IP interconnection security on the Internet