Secure Inter-Domain Routing

Current Status

This project is moving into the build phase. We have selected several technology collaborators who have signed a Cooperative Research and Development Agreement (CRADA; see an example) with NIST.

Download the Secure Inter-Domain Routing: Route Hijacks Project Description (PDF) for further details.

Summary

The National Cybersecurity Center of Excellence (NCCoE) at NIST recognizes the need to ensure safe and secure Internet traffic exchange, and has launched part one of this project series: Secure Inter-Domain Routing: Route Hijacks. This project is using commercially available technologies to develop a cybersecurity reference design that can be implemented to increase security and functionality in internet routing.

The Border Gateway Protocol (BGP) is the adopted default routing protocol of the Internet. BGP facilitates the exchange of routing information—determining feasible paths for data to flow from a source to a destination. Autonomous Systems and Internet Service Providers exchange route information using BGP to achieve interconnectivity. When the exchange of route information is inaccurate (either done maliciously or accidentally), traffic will either take inefficient paths through the internet, arrive at malicious sites that masquerade legitimate destinations, or never arrive to its intended destination.

This project will demonstrate how the implementation of BGP Route Origin Validation, using Resource Public Key Infrastructure, will address and resolve the erroneous exchange of network routes. This project will result in a in a NIST Cybersecurity Practice Guide—a publicly available description of the solution and practical steps needed to implement a cybersecurity reference design that addresses this challenge.

Questions? Comments? Contact us at sidr-nccoe@nist.gov.

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

AT&T Logo
CenturyLink Logo
cisco logo
Comcast Logo
George Washington University Logo
Juniper Networks logo
Palo Alto Networks logo