Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Study of BGP Peering Session Attacks and Their Impacts on Routing Performance



Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn


We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic Autonomous System (AS) topologies and address the impact of various typical service provider routing policies. Our modeling focuses on three dimensions of routing performance sensitivity: (a) Protocol aware attacks (e.g., tuned to RFD), (b) Route selection policy, and (c) Attack-region topology. Analytical results provide insights into the nature of the problem and potential impact of the attacks. Detailed packet-level simulation results complement the analytical models and provide many additional insights into specific protocol interactions and timing issues. Finally, we quantify the potential effect of the BGPGraceful Restart mechanism as a partial mitigation of the BGP vulnerability to peering session attacks.
IEEE Journal on Selected Areas in Communications


BGP Graceful Restart, Border Gateway Protocol (BGP), Internet routing protocol security, performance modeling, realistic topology, Route Flap Damping (RFD), routing policy


Sriram, K. , Montgomery, D. , Borchert, O. , Kim, O. and Kuhn, D. (2006), Study of BGP Peering Session Attacks and Their Impacts on Routing Performance, IEEE Journal on Selected Areas in Communications, [online], (Accessed April 24, 2024)
Created October 1, 2006, Updated November 10, 2018