Abstract

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.

Highlights

  • The validity of the routing advertisements sent by one router to another is essential for Internet connectivity

  • This study aims to implement Border Gateway Protocol (BGP) and Resource Public Key Infrastructure (RPKI) using the Bird Internet Routing Daemon (BIRD)

  • “NLnet Labs - Resource Public Key Infrastructure (RPKI) Tools - Routinator.” Accessed: Oct. 05, https://www.nlnetlabs.nl/projects/rpki/routinator/

Read more

Summary

Implementasi BGP tanpa

Survei terhadap operator jaringan mengenai BGP hijack. 6 2019 Marcus dan BGP tanpa RPKI. 2. Metode Penelitian Tahapan dalam penelitian ini terlihat pada Gambar 1

Router menerima prefix dari BGP peer dan meneruskan
No Router IP address
Sebelum implementasi protokol
Konfigurasi dasar template BGP pada
Origination Using the Resource Certificate Public Key
Implementation in Public Network of the Universitas
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call