Secure Inter-Domain Routing

Current Status

This project is currently seeking technology vendors to participate in the development of an example solution. Please see our Federal Register notice for more information. After reviewing the notice, if you as a technology provider are interested in providing products and technical expertise as a collaborator on the reference design for the listed projects please send an email to requesting a Letter of Interest template.

Download the Secure Inter-Domain Routing: Route Hijacks (PDF) project description for more information on the project


The National Cybersecurity Center of Excellence (NCCoE) at NIST recognizes the need to ensure safe and secure Internet traffic exchange. To address safe and secure internet traffic exchange, the NCCoE has launched part one of this project series: Secure Inter-Domain Routing: Route Hijacks. This project will use commercially available technologies to develop a cybersecurity reference design that can be implemented to increase security and functionality in internet routing.

The Border Gateway Protocol (BGP) is the adopted default routing protocol of the Internet. BGP facilitates the exchange of routing information and determines feasible paths for data to flow from a source to a destination. Autonomous Systems (ASes) and Internet Service Providers (ISPs) collaborate with each other by exchanging route information using BGP to achieve interconnectivity. When the exchange of route information is inaccurate (either done maliciously or accidentally), traffic will either take inefficient paths through the internet, arrive at malicious sites that masquerade legitimate destinations, or never arrive to its intended destination.

This project will demonstrate how the implementation of BGP Route Origin Validation (ROV), using Resource Public Key Infrastructure (RPKI), will address and resolve the erroneous exchange of network routes. This project will result in a publicly available NIST Cybersecurity Practice Guide, a detailed implementation guide of the practical steps required to implement a cybersecurity reference design that addresses this challenge.