We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements

Abstract: The security of the Internet's routing infrastructure has underpinned much of the past two decades of distributed systems security research. However, the converse is increasingly true. Routing and path decisions are now important for the security properties of systems built on top of the Internet. In particular, BGP poisoning leverages the de facto routing protocol between Autonomous Systems (ASes) to maneuver the return paths of upstream networks onto previously unusable, new paths. These new paths can be used to avoid congestion, censors, geo-political boundaries, or any feature of the topology which can be expressed at an AS-level. Given the increase in BGP poisoning usage as a security primitive, we set out to evaluate poisoning feasibility in practice beyond simulation.
To that end, using an Internet-scale measurement infrastructure, we capture and analyze over 1,400 instances of BGP poisoning across thousands of ASes as a mechanism to maneuver return paths of traffic. We analyze in detail the performance of steering paths, the graph-theoretic aspects of available paths, and re-evaluate simulated systems with this data. We find that the real-world evidence does not completely support the findings from simulated systems published in the literature. We also analyze filtering of BGP poisoning across types of ASes and ISP working groups. We explore the connectivity concerns when poisoning by reproducing a decade old experiment to uncover the current state of an Internet triple the size. We build predictive models for understanding an ASes' vulnerability to poisoning. Finally, an exhaustive measurement of an upper bound on the maximum path length of the Internet is presented, detailing how security research should react to ASes leveraging poisoned long paths. In total, our results and analysis expose the real-world impact of BGP poisoning on past and future security research.
Comments: NDSS 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
DOI: 10.14722/ndss.2020.23240
Cite as: arXiv:1811.03716 [cs.CR]
  (or arXiv:1811.03716v6 [cs.CR] for this version)

Submission history

From: Jared Smith [view email]
[v1] Thu, 8 Nov 2018 23:31:52 GMT (3611kb,D)
[v2] Fri, 16 Nov 2018 18:17:40 GMT (6199kb,D)
[v3] Mon, 15 Apr 2019 22:46:11 GMT (3063kb,D)
[v4] Sat, 18 May 2019 22:33:36 GMT (6858kb,D)
[v5] Tue, 21 May 2019 18:20:05 GMT (6858kb,D)
[v6] Fri, 24 Jan 2020 18:08:25 GMT (6972kb,D)

Link back to: arXiv, form interface, contact.