A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

被引:2
|
作者
Scott, Ben A. [1 ,2 ]
Johnstone, Michael N. [1 ]
Szewczyk, Patryk [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Perth, WA 6027, Australia
[2] RMIT Univ, Sch Sci Engn & Technol, Ho Chi Minh City 700000, Vietnam
关键词
anomaly detection; BGP; cyber security; Internet security; routing security; TIME-SERIES DATA; ANOMALY DETECTION; FRAMEWORK; SCALE; ALGORITHM; DESIGN; SCHEME;
D O I
10.3390/s24196414
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs). BGP attacks can exploit and evade these limitations. In this paper, we review and evaluate categories of BGP attacks based on their complexity. Previously identified next-generation BGP detection techniques remain incapable of detecting advanced attacks that exploit single observable detection approaches and those designed to evade public routing monitor infrastructures. Advanced BGP attack detection requires lightweight, rapid capabilities with the capacity to quantify group-level multi-viewpoint interactions, dynamics, and information. We term this approach advanced BGP anomaly detection. This survey evaluates 178 anomaly detection techniques and identifies which are candidates for advanced attack anomaly detection. Preliminary findings from an exploratory investigation of advanced BGP attack candidates are also reported.
引用
收藏
页数:44
相关论文
共 50 条
  • [1] A Survey of Security Techniques for the Border Gateway Protocol (BGP)
    Nicholes, Martin O.
    Mukherjee, Biswanath
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 52 - 65
  • [2] Border Gateway Protocol Anomaly Detection Using Neural Network
    Karimi, Mohsen
    Jahanshahi, Ali
    Mazloumi, Abbas
    Sabzi, Hadi Zamani
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 6092 - 6094
  • [3] Optimal detection of border gateway protocol anomalies with extensive feature set
    Sunita, M.
    Mallapur, Sujata V.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 50893 - 50919
  • [4] Optimal Trained Hybrid Classifier for Border Gateway Protocol Anomaly Detection
    Sunita, M.
    Sujata, V
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2022, 13 (01)
  • [5] Optimal detection of border gateway protocol anomalies with extensive feature set
    M. Sunita
    Sujata V. Mallapur
    Multimedia Tools and Applications, 2024, 83 : 50893 - 50919
  • [6] Interdomain routing and the border gateway protocol
    Bonaventure, O
    Feldmann, A
    Gao, LX
    Griffin, T
    Mao, ZM
    IEEE NETWORK, 2005, 19 (06): : 3 - 4
  • [7] Securing the border gateway routing protocol
    Smith, BR
    GarciaLunaAceves, JJ
    IEEE GLOBECOM 1996 - GLOBAL INTERNET'96, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 81 - 85
  • [8] A Survey: Network Attack Detection and Mitigation Techniques
    Shinde, Om
    Kulkarni, Varad
    Patani, Harsh
    Rajput, Anagha
    Jaiswal, R. C.
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 1, SMARTCOM 2024, 2024, 945 : 263 - 275
  • [9] A Fractional Model of the Border Gateway Protocol (BGP)
    Haxell, P. E.
    Wilfong, G. T.
    PROCEEDINGS OF THE NINETEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2008, : 193 - +
  • [10] Securing the Border Gateway Protocol: A status update
    Kent, ST
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 40 - 53