dc.contributor.author |
Oti, S. B. |
|
dc.contributor.author |
Bansah, I. |
|
dc.contributor.author |
Adegboyega, T. M. |
|
dc.date.accessioned |
2023-01-27T09:48:45Z |
|
dc.date.available |
2023-01-27T09:48:45Z |
|
dc.date.issued |
2016 |
|
dc.identifier.other |
10.5120/ijca2016910604 |
|
dc.identifier.uri |
https://www.ijcaonline.org/archives/volume146/number1/25363-2016910604 |
|
dc.identifier.uri |
http://atuspace.atu.edu.gh:8080/handle/123456789/2711 |
|
dc.description.abstract |
Cloud IaaS service providers offer virtualized computing resources to enterprises over the internet. As with most internet based services, cloud service providers may need to establish BGP peering relationships with upstream/neighbor ISPs for the purposes of exchanging routing information between their respective Autonomous systems thereby making it possible for a rogue AS to carry out a Man-In-The-Middle (MITM) attack. Available literature supports the fact that BGP as an infrastructure protocol is vulnerable to MITM attacks yet a good number of proposals aimed at counteracting these attacks have not been fully implemented. Secure BGP, Secure Origin BGP and Pretty Secure BGP are all proposals which have not been fully implemented due to high overhead and invariable router load. We believe however that an existing cloud IaaS service provider could mitigate the risk of a MITM attack by optimizing their configurations and ensuring that upstream providers do a proper job filtering prefixes using a prefix-list. This paper presents a GNS-3 simulation of a MITM attack by mimicking a section of the internet and goes on to show how the application of a prefix-list can help mitigate the attack. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
International Journal of Computer Applications |
en_US |
dc.relation.ispartofseries |
vol.;146 |
|
dc.subject |
BGP security |
en_US |
dc.subject |
Cloud Services |
en_US |
dc.subject |
Prefix-List |
en_US |
dc.subject |
Secure BGP |
en_US |
dc.subject |
Session Hijacking |
en_US |
dc.title |
A configuration-based approach to mitigating man-in-the-middle attacks in enterprise cloud IaaS Networks running BGP. |
en_US |
dc.type |
Article |
en_US |