PPT-Securing BGP: The current state of

Author : myesha-ticknor | Published Date : 2018-02-28

RPKI Geoff Huston Chief Scientist APNIC Incidents What happens when I announce your addresses in BGP All the traffic that used to go to you will now come to me I

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Securing BGP: The current state of" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Securing BGP: The current state of: Transcript


RPKI Geoff Huston Chief Scientist APNIC Incidents What happens when I announce your addresses in BGP All the traffic that used to go to you will now come to me I can inspect unencrypted traffic that was heading towards you. Lecture 20: Routing . Security. (Hijacking the Internet for fun and profit!). Based on slides from J. Rexford @ Princeton U. Revised Fall 2014 by P. Gill. BGP. : The Internet’s Routing Protocol (1). Autonomous Systems and . Interdomain. Routing (Exterior Gateway Protocol EGP). 2. Internet Infrastructure. 3. Autonomous . Systems. An . autonomous system (AS). is a region of the Internet that is administered by a single entity and that has a unified routing . Kireeti Kompella (kireeti@juniper.net). Senad Palislamovic (senad.palislamovic@alcatel-lucent.com). IETF-90 (Toronto). speaker: Ravi Singh. draft-singh-l2vpn-bgp-vpls-control-flags-01.txt. Updated processing of control flags for BGP VPLS. draft-decraene-idr-reserved-extended-communities-00. Bruno Decraene France Telecom - Orange. Pierre Francois UCL . The need:. To get a reserved non-transitive BGP community. draft-ietf-grow-bgp-gshut. DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS. IPS/IDS. Enterprise or IDC. Service Provider Network. Router. DDoS. attack traffic consumes SP network capacity. DDoS. attacks are launched from compromised systems (bots). draft-ni-l3vpn-pm-bgp-ext-00. Hui Ni, . Shunwan Zhuan, . Zhenbin Li. Huawei Technologies. IETF 87, Berlin, Germany. Solution Suggested in . [. draft. -dong-l3vpn-pm-framework. ]. Basic Idea: . Create a . Michael . Schapira. Joint work with . Yaping. Zhu . and . Jennifer Rexford. (Princeton University). Once Upon a Time… . Internet Inter-Network Routing:. . Small network. Single administrative entity. Giuseppe Di Battista. Massimo Rimondini. Giorgio Sadolfo. IEEE/IFIP NOMS 2012. 18/04/2012. Monitoring the Status of MPLS VPN and VPLS Based on BGP Signaling Information. Giuseppe Di Battista. Massimo Rimondini. some slides borrowed from Jen Rexford (Princeton U). How does BGP work. AS-level (autonomous system, collection of networks under single administrative org). Relationships (usually private info). Customer/provider (customers pay to providers). Geoff Huston. APNIC. What’s . a . “more specific”?. A prefix advertisement that refines a “covering” advertisement. 10.0.0.0/8. 10.1.0.0/16. Why advertise a more specific?. I. : . To redirect packets to a different network: “. La gamme de thé MORPHEE vise toute générations recherchant le sommeil paisible tant désiré et non procuré par tout types de médicaments. Essentiellement composé de feuille de morphine, ce thé vous assurera d’un rétablissement digne d’un voyage sur . BMP(BGP Monitoring Protocol) Testing by JANOGers BMP Test Results 16 Sep 2014 Joint Test Members and their Motivation BIGLOBE An ISP in Japan which has about 3 million subscribers. We have several Ajay Chhabria. Ajay Lele. Kevin Wang. Brocade. Giles Heron. Cisco. Setup Creation. BGP. BGP IPv4/IPv6 Routes. BGP-LS. Application Peer. OpenConfig. PCEP. PCE initiated LSPs. PCC initiated LSPs (Delegation). Chief Scientist, APNIC. Through the Routing Lens …. There are very few ways to assemble a single view of the entire Internet. The lens of routing is one of the ways in which information relating to the entire reachable Internet is bought together.

Download Document

Here is the link to download the presentation.
"Securing BGP: The current state of"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents