Organizations want to ensure the protection of the BG protocol

The protocol responsible for network traffic, has been attacked a number of times recently, there are those who want to stop it.

BGP or its name Border Gateway Protocol is actually a protocol used by Internet companies, ISPs and of course cloud companies. Recently, the protocol received multiple attacks that caused the information passing through it passed on to the attackers. This allowed them to hunt messages and users could be hurt.

One organization decided to submit a proposal for a new protocol protection standard in the hope that it would stop these attacks. The Center for Cyber ​​Security at the American Standards Institute has submitted a first draft on the subject, one that will ensure protection of the protocol.

The BGP was designed somewhere in the 80s, when only in the mid-90s did the protocol change, long before anyone thought cyber attacks could harm it.

Several examples of attacks on the protocol,

At the end of July, Talgarm’s servers were attacked and in fact all the information passed through Iran, only because the attackers hijacked the protocol.

Amazon’s servers were also damaged (AWS) when the BGP was hijacked by attackers who wanted to eliminate phishing attacks they experienced.

In 2017 a bug on the Google side led to the BGP division and Japan was left without a network for some time.

NIST and DHS have decided to write a draft on the security of the SIDR protocol (internal information security) to prevent these attacks.

“There are three essential components of the IETF SIDR effort: The first, Resource Public Key Infrastructure (RPKI), provides a way for a holder of a block of internet addresses–typically a company or cloud service provider–to stipulate which networks can announce a direct connection to their address block; the second, BGP Origin Validation, allows routers to use RPKI information to filter out unauthorized BGP route announcements, eliminating the ability of malicious parties to easily hijack routes to specific destinations. The third component, BGP Path Validation (also known as ‘BGPsec’), is what is described in the suite of draft standards (RFCs 8205 through 8210) the IETF has just published.”

Source.

Roy Shpitalnik

lived the life of a BlackBerry since 2009 so I was first exposed to 8900. With Israeli cellular world history, training and knowledge for more on BlackBerry, I decided to join the community. When the Media bash BlackBerry on regular basis i decided to Join BerryIL.COM. The true must be published. Contact me on Twitter : @SimpleBerryRoy

Top