Securing BGP Using External Security Monitors ∗

  title={Securing BGP Using External Security Monitors ∗},
  author={Patrick Reynolds and Oliver Kennedy and Emin G{\"u}n Sirer and Fred B. Schneider},
Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert other hosts about invalid behavior and to initiate remedial actions. Trusted computing hardware… CONTINUE READING


Publications referenced by this paper.
Showing 1-10 of 21 references

Extensions to BGP to Support Secure Origin BGP (soBGP)

  • J. Ng
  • Internet Draft, Apr.
  • 2004
Highly Influential
4 Excerpts

BGP Security Requirements

  • B. Christian, T. Tauber
  • Internet Draft, Apr.
  • 2006
2 Excerpts

Border Gateway Protocol Security: Recommendations of the National Institute of Standards and Technology

  • R. Kuhn, K. Sriram, D. Montgomery
  • NIST Special Publication 800-54 (Draft), Sept.
  • 2006

Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms

  • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, P. Khosla
  • In Proc. SOSP,
  • 2005
1 Excerpt

Similar Papers

Loading similar papers…