A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

被引:2
|
作者
Scott, Ben A. [1 ,2 ]
Johnstone, Michael N. [1 ]
Szewczyk, Patryk [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Perth, WA 6027, Australia
[2] RMIT Univ, Sch Sci Engn & Technol, Ho Chi Minh City 700000, Vietnam
关键词
anomaly detection; BGP; cyber security; Internet security; routing security; TIME-SERIES DATA; ANOMALY DETECTION; FRAMEWORK; SCALE; ALGORITHM; DESIGN; SCHEME;
D O I
10.3390/s24196414
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs). BGP attacks can exploit and evade these limitations. In this paper, we review and evaluate categories of BGP attacks based on their complexity. Previously identified next-generation BGP detection techniques remain incapable of detecting advanced attacks that exploit single observable detection approaches and those designed to evade public routing monitor infrastructures. Advanced BGP attack detection requires lightweight, rapid capabilities with the capacity to quantify group-level multi-viewpoint interactions, dynamics, and information. We term this approach advanced BGP anomaly detection. This survey evaluates 178 anomaly detection techniques and identifies which are candidates for advanced attack anomaly detection. Preliminary findings from an exploratory investigation of advanced BGP attack candidates are also reported.
引用
收藏
页数:44
相关论文
共 50 条
  • [21] Border Gateway Protocol Route Leak Detection Technique Based on Graph Features and Machine Learning
    Shen, Chen
    Wang, Ruixin
    Li, Xiang
    Zhang, Peiying
    Liu, Kai
    Tan, Lizhuang
    ELECTRONICS, 2024, 13 (20)
  • [22] A Survey on Attack Detection on Cloud using Supervised Learning Techniques
    Nenvani, Geetanjali
    Gupta, Huma
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [23] A formal model for checking the convergence property of border gateway protocol
    Yin, Ping
    Ma, Yinxue
    ICIC Express Letters, Part B: Applications, 2014, 5 (06): : 1753 - 1758
  • [24] Optimized MRAI Timers for Border Gateway Protocol in Large Networks
    Shukla, Shipra
    Kumar, Mahesh
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2019, 10 (04) : 31 - 44
  • [25] Border Gateway Protocol (BGP) and Traceroute Data Workshop Report
    Claffy, Kc
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (03) : 28 - 31
  • [26] Enhancing Border Gateway Protocol Security using Public Blockchain
    Shukla, Shipra
    Gupta, Swastika
    Rai, Misha
    Bhati, Muskan
    Chaudhary, Vanshika
    14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023, 2023, 2023-June : 2381 - 2389
  • [27] Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver
    Weitz, Konstantin
    Woos, Doug
    Torlak, Emina
    Ernst, Michael D.
    Krishnamurthy, Arvind
    Tatlock, Zachary
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 765 - 780
  • [28] BGP-MX: Border Gateway Protocol with Mobility Extensions
    Kaddoura, Maher
    Trent, Barry
    Ramanujan, Ranga
    Hadynski, Gregory
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 687 - 692
  • [29] Multidomain SDN-Based Gateways and Border Gateway Protocol
    Alotaibi, Hamad Saud
    Gregory, Mark A.
    Li, Shuo
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2022, 2022
  • [30] Analysis of Border Gateway Protocol (BGP) with Improvement in Byzantine Robustness
    Verma, Rahul Deo
    Samaddar, Shefalika Ghosh
    2018 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT'18), 2018,