Martin Suchara will present his research seminar/general exam on Monday January 21 at 1PM in Room 402. The members of his committee are: Jennifer Rexford (advisor), Larry Peterson, and David August. Everyone is invited to attend his talk, and those faculty wishing to remain for the oral exam following are welcome to do so. His abstract and reading list follow below. Securing Interdomain Routing in Small Groups Although the Internet's routing system has serious security vulnerabilities, none of the existing proposals for a secure variant of BGP has been successfully deployed in practice. This is not surprising since deploying protocols that require the cooperation of tens of thousands of independently-operated networks is problematic. Instead, we argue that small groups should be the basis for securing BGP. We offer a new design in which interdomain routing is secured by as few as 5-10 participating ASes, adding to the effort to secure BGP incrementally. Existence of well accepted cryptographic protocols that secure integrity and confidentiality of data delivery allows us to focus primarily on securing availability of communication. We conduct extensive simulations on a realistic Internet topology, and identify conditions for small groups to be effective. Even though the non-participants outnumber the group members by several orders of magnitude, the participants can achieve remarkable security gains by filtering compromised interdomain routes, cooperating to expose additional path diversity, inducing non-participants to select valid routes, and enlisting a few large ISPs to participate. We also propose two novel mechanisms that the group members can employ to achieve these goals, namely secure overlay routing and the cooperative announcement of each other's address space. Our experiments show that the proposed technique allows small groups to secure interdomain routing efficiently. Reading List Textbook: [1] L. Peterson, and B. Davie, Computer Networks: A Systems Approach, 3rd edition, Morgan Kaufmann Publishers, May 2003. Research papers: [1] D. Clark, "The design philosophy of the DARPA Internet protocols," ACM SIGCOMM Computer Communication Review, Vol. 18, No. 4, pp. 106-114, Aug. 1988. [2] L. Gao, "On inferring autonomous systems relationships in the Internet," IEEE/ACM Transactions on Networking, Vol. 9, No. 6, pp. 733-745, Dec. 2001. [3] O. Nordstrom, and C. Dovrolis, "Beware of BGP attacks," ACM SIGCOMM Computer Communication Review, Vol. 34, No. 2, pp. 1-8, Apr. 2004. [4] R. White, "Securing BGP through secure origin BGP," The Internet Protocol Journal, Vol. 6, No. 3, pp. 15-22, Sep. 2003. [5] S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications, Vol. 18, No. 4, pp. 582-592, Apr. 2000. [6] Y. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," ACM SIGCOMM Computer Communication Review, Vol. 34, No. 4, pp. 179-192, Aug. 2004. [7] H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling adoptability of secure BGP protocols," ACM SIGCOMM Computer Communication Review, Vol. 36, No. 4, pp. 279-290, Aug. 2006. [8] J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by cautiously adopting routes," in Proc. IEEE International Conference on Network Protocols, pp. 290-299, Nov. 2006. [9] D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford, "Don't secure routing protocols, secure data delivery," in Proc. ACM SIGCOMM HotNets Workshop, Nov. 2006. [10] D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, "Resilient overlay networks," in Proc. 18th ACM Symposium on Operating System Principles, Vol. 35, No. 5, pp. 131-145, Oct. 2001.
participants (1)
-
Melissa M Lawson