Skip to content

Citations and Use Cases

jfuruness edited this page Nov 15, 2024 · 19 revisions

Included here are some use cases for BGPy, i.e. some papers that have been completed or are in progress by other teams by extending BGPy. Please do cite and/or contact if you end up using it, we'd love to hear your use case and add it here! We're also in the process of actively developing BGPy, so any changes you'd like to see please let us know :)

BGPy:

BGPy Description

BGPy is a BGP Python Simulator used to analyze various attack and defense scenarios that includes a custom test suite for BGP diagrams.

BGPy Links

BGPy Citation:

@inproceedings{10.1145/3607505.3607509,
author = {Furuness, Justin and Morris, Cameron and Morillo, Reynaldo and Herzberg, Amir and Wang, Bing},
title = {BGPy: The BGP Python Security Simulator},
year = {2023},
isbn = {9798400707889},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3607505.3607509},
doi = {10.1145/3607505.3607509},
abstract = {The security of Border Gateway Protocol (BGP), and inter-domain routing in general, remains a challenge, in spite of its well-known importance, repeated attacks and incidents, and extensive efforts and research over decades. We present BGPy, an open-source, extensible, robust, easy-to-use and efficient BGP security simulator, to be used for research and education. BGPy allows realistic simulations of a large variety of BGP attacks and defenses. It is provided as a Python package, and can be further customized and extended, e.g., to investigate new attacks and new defense mechanisms. We describe how BGPy is currently used by multiple BGP security projects.},
booktitle = {Proceedings of the 16th Cyber Security Experimentation and Test Workshop},
pages = {41–56},
numpages = {16},
location = {Marina del Rey, CA, USA},
series = {CSET '23}
}

ROV++:

ROV++ Description

ROV++ contains multiple variants that are incremental improvements over ROV

ROV++ Links

ROV++ Citation:

(Journal version in progress)

@inproceedings{inproceedings,
author = {Morillo, Reynaldo and Furuness, Justin and Herzberg, Amir and Morris, Cameron and Breslin, James},
year = {2020},
month = {12},
pages = {},
title = {ROV++: Improved Deployable Defense against BGP Hijacking},
doi = {10.14722/ndss.2021.24438}
}

BGP-iSec:

BGP-iSec Description

BGP-iSec includes enhancements to BGPSec for defending against path manipulation attacks.

BGP-iSec Links

BGP-iSec Citation:

@inproceedings{ndss2024:241035,
author = {Cameron Morris and Amir Herzberg and Bing Wang and Samuel Secondo},
title = {{BGP}-i{S}ec: {I}mproved {S}ecurity of {I}nternet {R}outing against {P}ost-{ROV} {A}ttacks},
booktitle = {Proceedings of the 2024 Network and Distributed System Security ({NDSS}) Symposium},
year = {2024},
isbn = {1-891562-93-2},
doi = {10.14722/ndss.2024.241035}
}

Ain’t How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies:

Ain't How You Deploy Description

An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies

Ain't How You Deploy Links

Ain't How You Deploy Citation:

NOTE: To be updated after publication, this is from a preprint and is unofficial

@inproceedings{barrett2024bgp,
  title={Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies},
  author={Barrett, Seth and Idom, Calvin and Zavala Villafuerte, German and Byers, Andrew and Gulmezoglu, Berk},
  booktitle={Proceedings of the 11th International Symposium on Networks, Computers, and Communications (ISNCC)},
  year={2024},
  month={June},
  note={Accepted for publication}
}

ASPA evaluation:

ASPA Evaluation Description

Evaluating ASPA, post-ROV defenses, and post-ROV attacks, including the novel first-ASN Stripping Hijack

ASPA Evaluation Links

Securing BGP ASAP: ASPA and Other Post-ROV Defenses:

Accepted to NDSS, preprint available upon request

Advanced Prefix Interception Attacks:

Advanced Prefix Interception Attacks Description

(in progress)

Advanced Prefix Interception Attacks Links

  • Github: (not yet public)
  • PyPi: (not yet public)
  • Paper: (in progress)
  • Unofficial paper: (in progress)

Advanced Prefix Interception Attacks Citation:

(in progress)

ASPA++:

ASPA++ Description

(in progress)

ASPA++ Links

  • Github: (not yet public)
  • PyPi: (not yet public)
  • Paper: (in progress)
  • Unofficial paper: (in progress)

ASPA++ Citation:

(in progress)

SAV:

SAV Description

(in progress)

SAV Links

  • Github: (not yet public)
  • PyPi: (not yet public)
  • Paper: (in progress)
  • Unofficial paper: (in progress)

SAV Citation:

(in progress)

Extrapolator:

Extrapolator Description

(in progress)

Extrapolator Links

  • Github: (not yet public)
  • PyPi: (not yet public)
  • Paper: (in progress)
  • Unofficial paper: (in progress)

Extrapolator Citation:

(in progress)

BGPy Website:

BGPy Website Description

(in progress)

BGPy Website Links

  • Paper: (in progress)
  • Unofficial paper: (in progress)

BGPy Website Citation:

(in progress)

Rodday's ASPA evaluation:

Rodday's ASPA evaluation

This work cited BGPy, although they didn't end up using it, since BGPy wasn't around when the work had been started, noting that it would potentially be useful for future works. It was recently accepted, but the paper is not yet out.

@inproceedings{inproceedings,
author = {Rodday, Nils and Rodosek, Gabi and Pras, Aiko and Deij, Roland},
year = {2024},
month = {05},
pages = {1-10},
title = {Exploring the Benefit of Path Plausibility Algorithms in BGP},
doi = {10.1109/NOMS59830.2024.10575088}
}```
Clone this wiki locally