A configuration-based approach to mitigating man-in-the-middle attacks in enterprise cloud IaaS Networks running BGP.

Show simple item record

dc.contributor.author Oti, S. B.
dc.contributor.author Bansah, I.
dc.contributor.author Adegboyega, T. M.
dc.date.accessioned 2023-01-27T09:48:45Z
dc.date.available 2023-01-27T09:48:45Z
dc.date.issued 2016
dc.identifier.other 10.5120/ijca2016910604
dc.identifier.uri https://www.ijcaonline.org/archives/volume146/number1/25363-2016910604
dc.identifier.uri http://atuspace.atu.edu.gh:8080/handle/123456789/2711
dc.description.abstract Cloud IaaS service providers offer virtualized computing resources to enterprises over the internet. As with most internet based services, cloud service providers may need to establish BGP peering relationships with upstream/neighbor ISPs for the purposes of exchanging routing information between their respective Autonomous systems thereby making it possible for a rogue AS to carry out a Man-In-The-Middle (MITM) attack. Available literature supports the fact that BGP as an infrastructure protocol is vulnerable to MITM attacks yet a good number of proposals aimed at counteracting these attacks have not been fully implemented. Secure BGP, Secure Origin BGP and Pretty Secure BGP are all proposals which have not been fully implemented due to high overhead and invariable router load. We believe however that an existing cloud IaaS service provider could mitigate the risk of a MITM attack by optimizing their configurations and ensuring that upstream providers do a proper job filtering prefixes using a prefix-list. This paper presents a GNS-3 simulation of a MITM attack by mimicking a section of the internet and goes on to show how the application of a prefix-list can help mitigate the attack. en_US
dc.language.iso en_US en_US
dc.publisher International Journal of Computer Applications en_US
dc.relation.ispartofseries vol.;146
dc.subject BGP security en_US
dc.subject Cloud Services en_US
dc.subject Prefix-List en_US
dc.subject Secure BGP en_US
dc.subject Session Hijacking en_US
dc.title A configuration-based approach to mitigating man-in-the-middle attacks in enterprise cloud IaaS Networks running BGP. en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account