Ip Routing Security Concerns and Countermeasures

Only available on StudyMode
  • Download(s) : 78
  • Published : May 2, 2013
Open Document
Text Preview
IP Routing security concerns and countermeasures

Patrick Kilensel
Information Security Analyst at FORUS

IP Routing security concerns and countermeasures

Table of Contents
Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5 1.2 Research activities to improve IP routing security ......................................... 7 2. Short list of IP routing attack vectors .............................................................. 9 2.1. Malicious Route Injection .............................................................................. 9 2.2. Unallocated Route Injection .......................................................................... 9 2.3. TCP Resets ................................................................................................. 10 2.4. Resource Exhaustion .................................................................................. 10 3. Measures to further secure IP routing ........................................................... 11 3.1. Protecting Router Configurations ................................................................ 11 3.2. Generalized TTL Security Mechanism (GTSM) ........................................... 12 3.3. Filtering ....................................................................................................... 12 3.4. Access Control Lists (ACLs)........................................................................ 12 3.5. Digital Signatures ........................................................................................ 13 4. Conclusion ....................................................................................................... 13 5. References ....................................................................................................... 14 1.

2

IP Routing security concerns and countermeasures

Abstract The Internet Protocol (IP) Routing mechanism plays a central role in the existence of the Internet. In fact, without IP Routing the Internet as we know it would not exist. Lammle M. (2006) explains that IP routing is made possible through the use of devices running algorithms called 'routing protocols' that find the best paths between the related networks in other to deliver data. Applications of the Internet rely on the routing system to provide services in delivering their data to the right destinations. In that context, the Internet Routing mechanism is a target of choice for hackers an d other cyber criminals who are constantly researching ways to sneak into vulnerable information systems using targeted seamless attacks. More than never before, the security of the data available on the Internet or traveling through the Internet is paramount. A successful attack on the routing system can result in confidential data being stolen, the applications security being compromised or in a denial of service (DoS). The paper walks us through a number of IP routing known attack mechanisms and censes a number of good practices as well as countermeasures that can be applied to ensure IP Routing security.

Keywords: IP routing, Router security, Network security, Internet security, Network management.

3

IP Routing security concerns and countermeasures

1. O BJECTIVE
This paper's objective is to emphasize the core role of IP Routing in the critical operation of safel y and reliabl y moving data packets from one digital s ystem to another . The paper also overviews some of the well-known vulnerabilities the IP Routing system and attack vectors that can be used to disrupt its operation . Finall y the paper aim to discuss a number of countermeasures and best practices that can be used to mitigate risks in the likelihood of cyber-attack scenarios....
tracking img