scholarly journals SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange

2021 ◽  
Vol 13 (7) ◽  
pp. 171
Author(s):  
Pang-Wei Tsai ◽  
Aris Cahyadi Risdianto ◽  
Meng Hui Choi ◽  
Satis Kumar Permal ◽  
Teck Chaw Ling

In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS), and it might cause performance and compatibility problems in legacy network infrastructure. Nevertheless, with recent advancements in network innovation, some traditional networks are planning to be restructured with Software-Defined Networking (SDN) technology for gaining more benefits. By using SDN, Internet eXchange Point (IXP) is able to enhance its capability of management by applying softwarized control methods, acting as a Software-Defined eXchange (SDX) center to handle numerous advertisement adaptively. To use the SDN method to strengthen routing security of IXP, this paper proposed an alternative SDX development, SD-BROV, an SDX-based BGP Route Origin Validation mechanism that establishes a flexible route exchange scenario with RPKI validation. The validating application built in the SDN controller is capable of investigating received routing information. It aims to support hybrid SDN environments and help non-SDN BGP neighbors to get trusted routes and drop suspicious ones in transition. To verify proposed idea with emulated environment, the proof-of-concept development is deployed on an SDN testbed running over Research and Education Networks (RENs). During BGP hijacking experiment, the results show that developed SD-BROV is able to detect and stop legitimate traffic to be redirected by attacker, making approach to secure traffic forwarding on BGP routers.

Sensors ◽  
2017 ◽  
Vol 17 (3) ◽  
pp. 647 ◽  
Author(s):  
Carlos Pérez Díaz ◽  
Jonathan Muñoz ◽  
Tarendra Lakhankar ◽  
Reza Khanbilvardi ◽  
Peter Romanov

2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


CHEST Journal ◽  
2015 ◽  
Vol 148 (4) ◽  
pp. 892A
Author(s):  
Laren Tan ◽  
Alexander Fung ◽  
Theresa Duong ◽  
Michael Schivo ◽  
JP Delplanque ◽  
...  

2022 ◽  
Vol 82 ◽  
Author(s):  
D. M. Castro e Silva ◽  
N. S. Adiwardana

Abstract The loop is a material classically used in the laboratory for the purpose of plate streaking and handling biological materials. However, metal loops techniques might be time consuming, considering the amount of time spent to guarantee its cooling process through each inoculation. Furthermore, plastic loops may also represent environmental issues during its production and discard process and can also represent higher costs for the laboratory. Thus, in situations of limited resources, even the simplest materials can be restricted due to logistical and budgetary issues, especially in developing countries. Inspired by demands like these, facing an occasional shortage of supply of laboratory plastic handles, we hereby present a quality control for sterilization methods and cost-effectiveness studies towards the use of wooden sticks in a Latin American country and we discuss the possibility of the large-scale use of this technique.


2021 ◽  
Author(s):  
Pragati Shrivastava ◽  
Kotaro Kataoka

<p>The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named “multi-hop link fabrication”, in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield introduces a novel verification technique that includes: i) monitoring legacy switch and host generated traffic at MHL and ii) validating the existence of legacy switches contained in an MHL. This paper presents the prototype implementation of Hybrid-Shield over a real SDN controller. The experimental evaluation is performed with the mininet virtual network emulation. Our evaluation shows that Hybrid-Shield is capable of detecting MHL fabrication attacks in real-time with high accuracy. Hybrid-Shield’s performance evaluation shows that it is lightweight at the controller as it causes less overhead and requires no additional functionalities at the SDN controller for deployment.</p>


2020 ◽  
Vol 20 (04) ◽  
pp. 2150001
Author(s):  
J. MOHAN ◽  
SHWETA M. DEVANAGAONKAR ◽  
VINEETA V. GARUR ◽  
A. KARTHIK ◽  
K. ROHITAKSHA ◽  
...  

SDN is approaching its own structure of acceptance. Therefore, the increasing deployment of SDNs is being discussed as a possible approach, appearing in the development of the hybrid SDN networks. An foremost work in the hybrid SDN networks is bandwidth allocation, taking into account the integration of both SDN-enabled and conventional switches. The network loop in layer 2 switches is skipped in Spanning Tree Protocol (STP) by ceaselessly watching the network to trace all links and block the unwanted ones. Bridge loops will occur anytime there’s a redundant Layer2 way between ends. By default, switches forward broadcast/multicast out all ports, other than the port from that the broadcast/multicast was delivered. Once a switch loop is brought in the network, broadcast messages are going to be broadcasted more often leading to broadcast storms. The Spanning-tree algorithm enforces a distributed divergent of the Bellman-Ford iterative algorithm that always looks for the optimal solution and selects an optimal influential switch anytime. In this paper we use controller’s global network view for resolving loop problem in layer 2 network. SDN controller acts on broadcast packets received from switch-ports and host-ports differently that is if the broadcast packets received from host ports, the SDN controller broadcasts these packets to all ports and if broadcast packets is received from switch ports, only some switches broadcasts these packets on all ports instead of all switches.


2017 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Mark Joselli ◽  
Fabio Binder ◽  
Esteban Clua ◽  
Eduardo Soluri

Games are interactive applications that require input devices in order to send messages for the interaction. Normally this input devices are mouse, keyboards and joysticks. Lately, this input has been done in different ways, such as voice, touch and movement with new input devices. One type of input that has not been very explored is the use of the brain waves as a input for the game. While in past these devices where expensive, nowadays Brain Computer Interface (BCI) have become accessible, cheap and can be acquired with nonintrusive top off-the-shelf products, which can create a new paradigm of interaction for games. This work presents a novel architecture and framework that can help the development of games with both BCI and traditional interfaces. As a proof of concept, this paper shows the experience in designing and developing a game prototype using the framework and EEG brainwaves as one of the players input. The game is an action slice game, similar to Fruit Ninja, called MindNinja. This game differ form most BCI game, since it is based on an action game, using touch input where the BCI is used as an auxiliary input to change the game behavior. This game was tested and evaluated with a group of person, showing promising results in the fun level, as well as increasing the attention level of subjects.


Sign in / Sign up

Export Citation Format

Share Document