Securing the Internet routing infrastructure
- 10 December 2002
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Magazine
- Vol. 40 (10) , 60-68
- https://doi.org/10.1109/mcom.2002.1039858
Abstract
The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of users and networked systems, resulted in the Internet assuming its position as a mass communication medium. At the same time, the emergence of an increasingly large number of application areas and the evolution of the networking technology suggest that in the near future the Internet may become the single integrated communication infrastructure. However, as the dependence on the networking infrastructure grows, its security becomes a major concern, in light of the increased attempt to compromise the infrastructure. In particular, the routing operation is a highly visible target that must be shielded against a wide range of attacks. The injection of false routing information can easily degrade network performance, or even cause denial of service for a large number of hosts and networks over a long period of time. Different approaches have been proposed to secure the routing protocols, with a variety of countermeasures, which, nonetheless, have not eradicated the vulnerability of the routing infrastructure. In this article, we survey the up-to-date secure routing schemes. that appeared over the last few years. Our critical point of view and thorough review of the literature are an attempt to identify directions for future research on an indeed difficult and still largely open problem.Keywords
This publication has 16 references indexed in Scilit:
- Detecting disruptive routers: a distributed network monitoring approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An efficient message authentication scheme for link state routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Securing distance-vector routing protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Retrofitting security into Internet infrastructure protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Real-time protocol analysis for detecting link-state routing protocol attacksACM Transactions on Information and System Security, 2001
- Secure Border Gateway Protocol (S-BGP)IEEE Journal on Selected Areas in Communications, 2000
- HMAC: Keyed-Hashing for Message AuthenticationPublished by RFC Editor ,1997
- Protecting routing infrastructures from denial of service using cooperative intrusion detectionPublished by Association for Computing Machinery (ACM) ,1997
- Network intrusion detectionIEEE Network, 1994
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987