Systems Approach I’ve been working on a chapter about infrastructure security for our network security book.
The core of the Internet is notoriously vulnerable to attacks, with Border Gateway Protocol (BGP) and DNS being particular weak points. So I set out to learn enough about what has been done to secure these components of the Internet’s "core infrastructure” to be able to write something useful for our book.
For this post I am going to limit myself to talking about BGP security, where it’s fair to say that the results have been mixed. This seems to be the case for Securing DNS as well, although “mixed” might actually be too positive a word in that case.
A good place to start to understand BGP security (and the lack of it) is Sharon Goldberg’s article Why Is It Taking So Long to Sec