Managing BGP Routes with a BGP Session Multiplexer
نویسندگان
چکیده
This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients access to the same set of BGP feeds, BGP-Mux facilitates many applications, including: (1) scalable, real-time monitoring of BGP update feeds; (3) new routing architectures that require access to all BGP routing updates from neighboring ASes (as opposed to just the best BGP route for each destination); and (2) virtual networks running on shared infrastructure that share common underlying network connectivity. We have implemented BGP-Mux through by configuring existing features in the Quagga software router; we have deployed BGPMux on VINI and evaluated its scalability and performance in a controlled environment on the Emulab testbed.
منابع مشابه
Modeling BGP Route Selection within an AS
This paper presents a provably correct model that computes the outcome of the BGP decision process for each router in a single AS, without simulating the complex details of BGP message passing. The model requires only static inputs that can be easily obtained from the routers: the set of candidate routes to a destination (and the routers in the AS at which they were learned), import policies an...
متن کاملPretty Good BGP: Protecting BGP by Cautiously Selecting Routes
The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks primarily due to operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP. Until such a large proposal is adopted, networks will remain vulnerable to false information injected into BGP. However, BGP rout...
متن کاملPretty Good BGP: Protecting BGP by Cautiously Selecting Routes
The Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, is vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public-key infrastructure and accurate routing registries or (ii) detect attacks only after they have spread throughout the network. However, BGP routers could avoid selecting and propagating malicious routes if they were cautious...
متن کاملStatus of this Memo BGP Session Security Requirements
The document "BGP security requirements" (draft-ietf-rpsec-bgpsecrec) specifies general security requirements for BGP. However, specific security requirements for single BGP sessions, i.e., the connection between two BGP peers, are only touched on briefly in the section "transport layer protection". This document expands on this particular aspect of BGP security, defining the security requireme...
متن کاملA Novel Approach for Secure Routing through Bgp Using Symmetric Key
The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The traditional BGP protocol is not sufficient to provide security and authentication for AS path and verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various ty...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008