We live in a network-centric society that increasingly relies on the Internet’s routing infrastructure to facilitate human communication, connect users to online services, interconnect distinct components of modern cloud computing systems, and enable devices to interact in the Internet of Things (IoT).
As originally designed, the Internet’s routing infrastructure has systemic vulnerabilities that expose many critical systems to theft of service, loss of privacy, and wide-scale outages. NIST is working with industry to design, standardize, and foster deployment of technologies to improve the security and resilience of Internet Routing
Today’s global Internet is comprised of roughly 800,000 distinct destinations interconnected by 60,000 enterprise and Internet Service Provider (ISP) networks. The Border Gateway Protocol (BGP) is the “glue” that enables the modern Internet, by exchanging reachability information about each destination among interconnected ISPs. Each autonomous network uses BGP data, along with its own business policies, to compute the paths which user data will follow.
As currently deployed, BGP lacks the ability to authenticate these global information exchanges and doesn’t provide means to detect and mitigate large-scale policy violations. The result is ever-increasing occurrences of “BGP Hijacks” in which malicious parties falsely claim reachability to destinations to steal their traffic, or forge information about their paths to detour traffic along routes that facilitate other attacks on the communicating systems and the information they exchange.
In addition to malicious hijacks, common configuration errors often result in large-scale “BGP leaks” in which routing information is exchanged in violation of contracted business policies and engineered network capacity designs. These leaks often result in wide-scale outages that affect entire national-scale communication infrastructures for hours.
NIST, in collaboration with the Department of Homeland Security Science and Technology Directorate (DHS S&T), is working closely with the internet industry to design, standardize and foster deployment of extensions to BGP to address these security and robustness issues.
NIST staff are leading contributors to the development of Internet Engineering Task Force (IETF) specifications for BGP protocol extensions to mitigate malicious attacks and route leaks. NIST developed reference implementations, test systems, measurement tools, performance analyses and deployment guidance are serving as a catalyst for the emerging global deployment of these critical technologies.
See the list of Associated Products for a complete listing of our technical contributions.
2024 - Project staff provided subject matter expertise and custom measurements/analytics to support the development of the ONCD Roadmap to Enhance Internet Routing Security and the FCC NPRM on Internet Routing Security. Both efforts highlight NIST contributions to IETF standards, test and measurement tools, and deployment guidance and their impact in advancing BGP security and resilience.
2022 - Project team designed and submitted new IETF draft specifications to improve source address verification (anti spoofing) techniques by leveraging existing and emerging RPKI data sets.
2021 - Project team awarded Department of Commerce Gold Medal "For developing innovative technologies that resolved critical Internet vulnerabilities and dramatically improved Internet robustness."
2021 - Release of a new version of the NIST RPKI Monitor developed to add more analysis features for understanding the completeness, correctness, and stability of the global RPKI-ROV infrastructure.
2018 – Project staff led IETF design and standardization of BGP route leak mitigation techniques and BGP-enabled DDoS mitigation techniques.
2017 - Project staff release online system to test and measure global deployment of RPKI routing security infrastructure.
2006 through 2010 – Project conduct modeling and analysis of the problem space for BGP security, including modeling of large-scale attack scenarios and comparative analysis of BGP anomaly detection algorithms and other approaches that do not require changes to the existing routing system.