Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||David R. Kuhn; Kotikalapudi Sriram; Douglas C. Montgomery;|
|Title:||Border Gateway Protocol Security|
|Published:||July 17, 2007|
|Abstract:||This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to greatly improved BGP security, they are not a complete defense against all threats. Security administrators and decision makers should select and apply these methods based on their unique needs.|
|Citation:||Special Publication (NIST SP) - 800-54|
|Keywords:||BGP, Border Gateway Protocol, computer security, routers|
|Research Areas:||Computer Security|
|PDF version:||Click here to retrieve PDF version of paper (749KB)|