A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

被引:2
|
作者
Scott, Ben A. [1 ,2 ]
Johnstone, Michael N. [1 ]
Szewczyk, Patryk [1 ]
机构
[1] Edith Cowan Univ, Sch Sci, Perth, WA 6027, Australia
[2] RMIT Univ, Sch Sci Engn & Technol, Ho Chi Minh City 700000, Vietnam
关键词
anomaly detection; BGP; cyber security; Internet security; routing security; TIME-SERIES DATA; ANOMALY DETECTION; FRAMEWORK; SCALE; ALGORITHM; DESIGN; SCHEME;
D O I
10.3390/s24196414
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs). BGP attacks can exploit and evade these limitations. In this paper, we review and evaluate categories of BGP attacks based on their complexity. Previously identified next-generation BGP detection techniques remain incapable of detecting advanced attacks that exploit single observable detection approaches and those designed to evade public routing monitor infrastructures. Advanced BGP attack detection requires lightweight, rapid capabilities with the capacity to quantify group-level multi-viewpoint interactions, dynamics, and information. We term this approach advanced BGP anomaly detection. This survey evaluates 178 anomaly detection techniques and identifies which are candidates for advanced attack anomaly detection. Preliminary findings from an exploratory investigation of advanced BGP attack candidates are also reported.
引用
收藏
页数:44
相关论文
共 50 条
  • [41] Border gateway protocol graph: Detecting and visualising Internet routing anomalies
    Papadopoulos, Stavros
    Moustakas, Konstantinos
    Drosou, Anastasios
    Tzovaras, Dimitrios
    IET Information Security, 2016, 10 (03): : 125 - 133
  • [42] Using Resource Public Key Infrastructure for Secure Border Gateway Protocol
    Chang, George
    Arianezhad, Majid
    Trajkovic, Ljiljana
    2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
  • [43] A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
    Krishnapriya, Singamaneni
    Singh, Sukhvinder
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2675 - 2719
  • [44] A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
    Khan, Zulfiqar Ali
    Namin, Akbar Siami
    ELECTRONICS, 2022, 11 (23)
  • [45] A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection
    Lyu, Yang
    Feng, Yaokai
    Sakurai, Kouichi
    INFORMATION, 2023, 14 (03)
  • [46] A Survey in Presentation Attack and Presentation Attack Detection
    Husseis, Anas
    Liu-Jimenez, Judith
    Goicoechea-Telleria, Ines
    Sanchez-Reillo, Raul
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [47] Receive wireless sensor data through IoT gateway using web client based on border gateway protocol
    Yan, Meng
    HELIYON, 2024, 10 (11)
  • [48] Optical routing border gateway protocol-based advance lightpath setup
    Hafid, A
    Abdelilah, M
    Mazen, KG
    Drissi, J
    2005 Systems Communications, Proceedings: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 223 - 228
  • [49] Introduction to The Border Gateway Protocol - Case Study using GNS3
    Narasimhan, Sreenivasan
    Latchman, Haniph
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 315 - 320
  • [50] Design and Analysis QoS VoIP using Routing Border Gateway Protocol (BGP)
    Ramadhan, Eko
    Firdausi, Ahmad
    Budiyanto, Setiyo
    2017 INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATION, WIRELESS SENSORS AND POWERING (BCWSP), 2017, : 17 - 20