6. Conclusion
On the Internet, BGP protocol security must imperatively be reinforced by good security practices on interconnections between two distinct networks. These best practices are the subject of numerous guides and recommendations, and are essential to guarantee a minimum foundation: ensuring the identity of a BGP peer, guarding against peer configuration errors or network-related bugs. In French, we recommend reading the "Guide des bonnes pratiques de configuration de BGP" (Guide to good BGP configuration practices) written by the Agence nationale de la sécurité des systèmes d'information (French national agency for information systems security).
Resilience and the fight against prefix spoofing are enhanced on the one hand by systems such as RPKI, which automate tedious tasks such as updating complex filters. And secondly, and above all, they are the result of good cooperation...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Networks and Telecommunications"
(
170 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!