Affiliation:
1. Cornell Tech
2. TU Darmstadt
3. Hebrew University of Jerusalem
4. University of California , Berkley
Abstract
Abstract
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today’s Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security problems, a lack of innovation, and the leakage of sensitive information about domains’ routing preferences. To overcome some of these problems, we revisit the idea of centralizing and using secure multi-party computation (MPC) for interdomain routing which was proposed by Gupta et al. (ACM HotNets’12). We implement two algorithms for interdomain routing with state-of-the-art MPC protocols. On an empirically derived dataset that approximates the topology of today’s Internet (55 809 nodes), our protocols take as little as 6 s of topology-independent precomputation and only 3 s of online time. We show, moreover, that when our MPC approach is applied at country/region-level scale, runtimes can be as low as 0.17 s online time and 0.20 s pre-computation time. Our results motivate the MPC approach for interdomain routing and furthermore demonstrate that current MPC techniques are capable of efficiently tackling real-world problems at a large scale.
Reference48 articles.
1. [1] S. Machiraju and R. H. Katz. Leveraging BGP dynamics to reverse-engineer routing policies. Technical Report UCB/EECS-2006-61, EECS Department, University of California, Berkeley, May 2006.
2. [2] V. Giotsas and S. Zhou. Inferring AS relationships from BGP attributes. CoRR, abs/1106.2417, 2011.
3. [3] D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A new approach to interdomain routing based on secure multi-party computation. In Workshop on Hot Topics in Networks (HotNets’12), pages 37–42. ACM, 2012.
4. [4] P. Gill, M. Schapira, and S. Goldberg. Let the market drive deployment: a strategy for transitioning to BGP security. In SIGCOMM’11, pages 14–25. ACM, 2011.
5. [5] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC’87, pages 218–229. ACM, 1987.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DIT and Beyond: Interdomain Routing With Intradomain Awareness for IIoT;IEEE Internet of Things Journal;2023-12-01
2. Ariadne: a Privacy-Preserving Network Layer Protocol;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16
3. Homomorphic Routing;Proceedings of the 2nd ACM SIGCOMM Workshop on Future of Internet Routing & Addressing;2023-09-10
4. Edge Local Differential Privacy for Dynamic Graphs;Security and Privacy in Social Networks and Big Data;2023
5. Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing;2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS);2022-06-10