Skip to main content

Measures of Self-similarity of BGP Updates and Implications for Securing BGP

  • Conference paper
Passive and Active Network Measurement (PAM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4427))

Included in the following conference series:

Abstract

Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate the contents of the BGP update message. The additional task of validation of these credentials when processing BGP messages will entail significant additional processing overheads. If the BGP validation process is prepared to assume that a validation outcome has a reasonable lifetime before requiring re-validation, then a local cache of BGP validation outcomes may provide significant leverage in reducing the additional processing overhead. The question then is whether we can quantify the extent to which caching of BGP updates and the associated validation outcome can reduce the validation processing load. The approach used to address this question is to analyze a set of BGP update message logs collected from a regional transit routing location within the public IPv4 Internet. This paper describes the outcomes of this study into the self-similarity of BGP updates and relates these self-similarity metrics to the size and retention time characteristics of an effective BGP update cache. This data is then related to the message validation activity, and the extent to which caching can reduce this validation processing activity is derived.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4), RFC 4271, Internet Engineering Task Force (January 2006)

    Google Scholar 

  2. Internet Architecture Board: Minutes of Meeting (January 1991), online at, http://www.iab.org/documents/iabmins/IABmins.1991-01-08.arch.html

  3. Huston, G.: 2005 – BGP Updates, presentation to Global Routing Operations Working Group, IETF 65, (March 2006), online at, http://www3.ietf.org/proceedings/06mar/slides/grow-3.pdf

  4. Kent, S., Lynn, C., Seo, K.: Secure border gateway protocol (s-bgp). IEEE Journal on Selected Areas in Communication 18(4) (2000)

    Google Scholar 

  5. GNU Zebra. online at, http://www.zebra.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Steve Uhlig Konstantina Papagiannaki Olivier Bonaventure

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Huston, G. (2007). Measures of Self-similarity of BGP Updates and Implications for Securing BGP. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds) Passive and Active Network Measurement. PAM 2007. Lecture Notes in Computer Science, vol 4427. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71617-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71617-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71616-7

  • Online ISBN: 978-3-540-71617-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics