1226534994

1226534994



LABORATORY OF THE INTER-DOMAIN ROUTING - BGP SECURITY

Abstract

The aim of this work is to analyse the security vulnerabilities of the Border Gateway Protocol (BGP) including detailed description of various kinds of attacks and methods of protection. A set of best practices in BGP routers configuration is proposed, enhancing network security against both misconfiguration and premeditated attacks. A practical part of this work is laboratory scenario concerning BGP security.

Within the framework of previously developed Bachelor’s thesis, [22], the preliminary version of laboratory infrastructure for inter-domain routing has been proposed. The infrastructure consists of the selected router emulator and an application, which main purpose is assistance in router configuration, automatic verification and evaluation of performed exercises. In order to extend flexibility of the application, the infrastructure has been reorganised (see appendix E) and new functionalities has been implemented. Due to the experience of conducting multiple laboratory exercises with students, the scenario has been significantly improved and enhanced.

Using developed application and laboratory scenarios during practical experiments with students, improves the generał understanding of the inter-domain routing and expla-ining methods of implementing traffic engineering rules to routers. In addition, the use of Simple Network Management Protocol (SNMP) and Management Information Base (MIB) is enabled in the application, which constitute a valuable extension of laboratory concerns. In generał, the appliance of router emulator allow to conduct exercises with minimum effort and cost.

In the introduction, the concept and structure of the Internet network is presented. In the following chapter, the purpose of usage of BGP in this network is discussed, and its main characteristics are introduced: the attributes of UPDATE messages are described in details; examples of traffic engineering in inter-domain routing are presented. Then, the issues related with security vulnerabilities of BGP, which can affect the inter-domain routing are analysed. Possible types of attacks exploiting BGP vulnerabilities are presented as well. Next, the available Solutions to improve security of BGP are discussed (e.g., session security enhancement between neighbouring routers, common methods of BGP message filtering, and usage of the integrated security systems). Finally, the concepts of laboratories are presented including a description of the experiments and infrastructure reąuired to conduct them. The integral part of this work consists of annexes with exten-ded documentation of laboratory elements: a capabilities and operation instructions for selected router emulator; two laboratory instructions; an application manuał and a report containing a list of performed changes in the new version of application.

Keywords: BGP, laboratory, security



Wyszukiwarka

Podobne podstrony:
Effect Of Dividends On Stock Prices 18 The objective of this study is to analysis the relationship b
PROBLEMY PIELĘGNIARSTWA 2014, tom 22, zeszyt nr 3 Aim. The purpose of this study is to analyze opini
REYERSE ENGINEERING - PISTON SCANNING Abstract The aim of this work was to use reverse engineering t
I Tjttyial
> tapescript page 255 treningmaturalny The purpose of this exercise is to make students realise t
PROBLEMY PIELĘGNIARSTWA 2014, tom 22, zeszyt nr 3 Aim. The purpose of this study is to analyze opini
DSC07314 SUMMARY CULTURAL HERITAGE OF OPOLE REGION VILLAGES - PRESERVATION ISSUES The aim of this re
50120 skanowanie0027 (22) 2.    Providing cultural information The aim of this approa
ISSUES IN INFORMATION SCIENCE - INFORMATION STUDIES Ihe core purpose of this journal is to provide
44 M. SIKORSKI ABSTRACT The aim of this paper is to review the most widely used techniąue for studie
The role of accounting in an anti-crisis prevention in smali businesses Summary: The purpose of this
Exercises class Description: The aim of this course is to provide an opportunity to develop skills o
CCI2012102316 Stylistyka XVIIIAdministrative Polish and its Variants The aim of this paper is to ma
6 4 2 rclosing phrase opening phrase ("joining") The main aim of this phrase is to lead to

więcej podobnych podstron