PPT-BGP security

Author : alida-meadow | Published Date : 2017-08-16

some slides borrowed from Jen Rexford Princeton U How does BGP work ASlevel autonomous system collection of networks under single administrative org Relationships

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "BGP security" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

BGP security: Transcript


some slides borrowed from Jen Rexford Princeton U How does BGP work ASlevel autonomous system collection of networks under single administrative org Relationships usually private info Customerprovider customers pay to providers. unmedu Stephanie Forrest University of New Mexico Santa Fe Institute forrestcsunmedu Jennifer Rexford Princeton University jrexcsprincetonedu Abstract The Internets interdomain routing protocol BGP is vulnerable to a number of damaging attacks which Network Positioning System. RIPE61 . Rome, November 2010. Stefano . Previdi. - . sprevidi@cisco.com. . Distinguished Engineer. Cisco Systems. Cisco NPS Introduction. NPS Introduction/Overview. Service Applicability. Autonomous Systems and . Interdomain. Routing (Exterior Gateway Protocol EGP). 2. Internet Infrastructure. 3. Autonomous . Systems. An . autonomous system (AS). is a region of the Internet that is administered by a single entity and that has a unified routing . Network Fundamentals. Lecture 10: Inter Domain Routing. (It’s all about the Money). Revised . 9/25/2013. Network Layer, Control Plane. 2. Function:. Set up routes between networks. Key challenges:. PE. . draft-fang-l3vpn. -data-center-interconnect-01. L. Fang . R. Fernando . D. . Rao. . S. Boutros . PE. . draft-fang-l3vpn-virtual-pe-04. Luyuan Fang . David . Ward . Rex . Fernando . IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3S 1 7KH%*3*UDFHIXO6KXWGRZQIHDWXUHUHGXFHVRUHOLPLQDWHVWKHORVVRILQERXQGRU Deployment. Is the Juice Worth the Squeeze?. 1. Robert Lychev Sharon Goldberg Michael . Schapira. Georgia . Tech. Boston University. Boston University. Hebrew University. Partial Landscape . of BGP D. How DNS works. Ask local resolver first about name->IP mapping. It returns info from cache if any. If info not in cache, resolver asks servers in DNS hierarchy that are authoritative for a given domain. draft-leymann-mpls-seamless-mpls-02.txt. Nicolai Leymann, . Thomas Beckhaus. (DT). Wim Henderickx (Alcatel-Lucent). Clarence Filsfils (Cisco). Dirk Steinberg (Steinberg Consulting). Bruno Decraene (FT). DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS. IPS/IDS. Enterprise or IDC. Service Provider Network. Router. DDoS. attack traffic consumes SP network capacity. DDoS. attacks are launched from compromised systems (bots). The Internet. Data Plane. Control Plane. Autonomous Systems. Core . ASes. Fringe . ASes. Transit . ASes. Border Gateway Protocol. Connects Different . ASes. Defines Route Selection. Updates. Performance of BGP. Geoff Huston. APNIC. What’s . a . “more specific”?. A prefix advertisement that refines a “covering” advertisement. 10.0.0.0/8. 10.1.0.0/16. Why advertise a more specific?. I. : . To redirect packets to a different network: “. BMP(BGP Monitoring Protocol) Testing by JANOGers BMP Test Results 16 Sep 2014 Joint Test Members and their Motivation BIGLOBE An ISP in Japan which has about 3 million subscribers. We have several

Download Document

Here is the link to download the presentation.
"BGP security"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents