ABSTRACT Modeling Adoptability of Secure BGP Protocols.pdfVIP

ABSTRACT Modeling Adoptability of Secure BGP Protocols.pdf

  1. 1、本文档共12页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
ABSTRACT Modeling Adoptability of Secure BGP Protocols

Modeling Adoptability of Secure BGP Protocols? Haowen Chan, Debabrata Dash, Adrian Perrig, and Hui Zhang Carnegie Mellon University {haowenchan, ddash, perrig, hzhang}@ ABSTRACT Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasi- bility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative research into what prop- erties contribute the most to the adoptability of a security scheme. In this paper, we provide a model for assessing the adoptability of a secure BGP routing protocol. We perform this evaluation by simulating incentives compatible adoption decisions of ISPs on the Internet under a variety of assumptions. Our results include: (a) the existence of a sharp threshold, where, if the cost of adoption is below the threshold, complete adoption takes place, while almost no adoption takes place above the threshold; (b) under a strong at- tacker model, adding a single hop of path authentication to origin authentication yields similar adoptability characteristics as a full path security scheme; (c) under a weaker attacker model, adding full path authentication (e.g., via S-BGP [9]) significantly improves the adoptability of BGP security over weaker path security schemes such as soBGP [16]. These results provide insight into the devel- opment of more adoptable secure BGP protocols and demonstrate the importance of studying adoptability of protocols. Categories and Subject Descriptors C.2 [Computer-Communication Networks]: General General Terms Security, Design Keywords Adoptability, Adoption dynamics, incentives-compatibility ? This research was supported in part by grants CNS-0433540 and ANI-0331653 from the National Science Foundation, and by a gift from Cisco. The views and conclusions contained here are those of the authors and should not be interpreted as necessarily represent- ing the official policies or endorsements, either ex

文档评论(0)

l215322 + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档