ABSTRACT

Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation   [open pdf - 6MB]

From the Executive Summary: "This NIST [National Institute of Standards and Technology] Cybersecurity Practice Guide  demonstrates  how  networks  can  protect  BGP  routes from vulnerability to route hijacks  by using  available security protocols, products, and tools  to perform BGP [Border Gateway Protocol] ROV [route origin validation] to reduce route hijacking threats. The example implementation described  in this guide aims to protect the integrity and improve the resiliency of internet traffic exchange  by verifying the source of the route."

Report Number:
NIST Special Publication 1800-14; National Institute of Standards and Technology Special Publication 1800-14
Author:
Publisher:
Date:
2019-06
Copyright:
Public Domain
Retrieved From:
Federal Depository Library Program Electronic Collection (FDLP/EC): https://permanent.fdlp.gov/
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations