Secure Extension of BGP by Decoupling Path Propagation and Adoption
draft-zhang-idr-decoupling-06
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Mingui Zhang , Bin Liu , Dacheng Zhang , Beichuan Zhang , Beichuan Zhang | ||
Last updated | 2013-06-27 (Latest revision 2012-12-24) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This draft proposes a novel mitigation scheme to protect the inter- domain data delivery during false routing announcements. A new path attribute is defined to Decouple propagation of a path and adoption of a path for data forwarding in BGP (DBGP). DBGP does not use suspicious paths for data forwarding, but still propagates them in the routing system to facilitate attack detection. It can extensively protect data delivery from routing announcements of false sub- prefixes, false origins, false nodes and false links, and works well with ongoing attack detection and prevention systems.
Authors
Mingui Zhang
Bin Liu
Dacheng Zhang
Beichuan Zhang
Beichuan Zhang
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)