18422075. BGP BLACKHOLE AND HIJACK MITIGATION simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Revision as of 03:30, 30 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

BGP BLACKHOLE AND HIJACK MITIGATION

Organization Name

Cisco Technology, Inc.

Inventor(s)

Jakob Heitz of Santa Clara CA (US)

Juan Alcaide of Durham NC (US)

BGP BLACKHOLE AND HIJACK MITIGATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18422075 titled 'BGP BLACKHOLE AND HIJACK MITIGATION

Simplified Explanation

The patent application abstract describes techniques for mitigating BGP blackholes and hijackings, including methods for a victim AS to notify a second AS to avoid using a first AS for data propagation. The message sent includes specific AS numbers to avoid, a timestamp, expiration interval, victim AS signature, and identifier for certificate verification.

  • Techniques for mitigating BGP blackholes and hijackings:
   - Victim AS determines association with first AS on BGP route
   - Victim AS sends message to second AS to avoid using first AS for data propagation
   - Message includes AS numbers to avoid, timestamp, expiration interval, victim AS signature, and identifier for certificate verification
    • Potential Applications:**

- Internet security - Network routing optimization

    • Problems Solved:**

- Mitigating BGP blackholes - Preventing hijackings of data propagation

    • Benefits:**

- Enhanced network security - Improved data routing efficiency

    • Potential Commercial Applications:**

- Network security software - Internet service provider tools

    • Possible Prior Art:**

- Existing BGP security protocols - Network routing optimization techniques

  1. Unanswered Questions
    1. How does this technique compare to existing BGP security measures?

The article does not provide a direct comparison to existing BGP security measures, leaving uncertainty about the novelty and effectiveness of the disclosed techniques.

    1. What are the potential limitations or challenges in implementing these mitigation techniques?

The article does not address potential limitations or challenges in implementing the described mitigation techniques, leaving room for further exploration into practical applications and scalability.


Original Abstract Submitted

Techniques for mitigating BGP blackholes and hijackings are disclosed herein. The techniques include methods for determining, by a victim autonomous system (AS), that a first AS is associated with a first BGP route that includes the victim AS as the destination or as an AS along the first BGP route to the destination and sending a message to a second AS directing the second AS to refrain from using the first AS to propagate data to the victim AS. The message can include a set of one or more AS numbers to avoid in refraining from using to propagate data to the victim AS, a timestamp, an expiration interval, a signature of the victim AS, and an identifier identifying a certificate to be used to verify the signature. Systems and computer-readable media are also provided.