Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System

被引:0
|
作者
Chen, Yihao [1 ,2 ]
Yin, Qilei [3 ]
Li, Qi [3 ,4 ]
Liu, Zhuotao [3 ,4 ]
Xu, Ke [3 ,5 ]
Xu, Yi [3 ,4 ]
Xu, Mingwei [3 ,4 ]
Liu, Ziqian [6 ]
Wu, Jianping [3 ,5 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Tsinghua Univ, BNRist, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[5] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[6] China Telecom, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
PREFIX HIJACKING;
D O I
暂无
中图分类号
学科分类号
摘要
BGP is the de facto inter-domain routing protocol to ensure global connectivity of the Internet. However, various reasons, such as deliberate attacks or misconfigurations, could cause BGP routing anomalies. Traditional methods for BGP routing anomaly detection require significant manual investigation of routes by network operators. Although machine learning has been applied to automate the process, prior arts typically impose significant training overhead (such as large-scale data labeling and feature crafting), and only produce uninterpretable results. To address these limitations, this paper presents a routing anomaly detection system centering around a novel network representation learning model named BEAM. The core design of BEAM is to accurately learn the unique properties (defined as routing role) of each Autonomous System (AS) in the Internet by incorporating BGP semantics. As a result, routing anomaly detection, given BEAM, is reduced to a matter of discovering unexpected routing role churns upon observing new route announcements. We implement a prototype of our routing anomaly detection system and extensively evaluate its performance. The experimental results, based on 18 real-world RouteViews datasets containing over 11 billion route announcement records, demonstrate that our system can detect all previously-confirmed routing anomalies, while only introducing at most five false alarms every 180 million route announcements. We also deploy our system at a large ISP to perform real-world detection for one month. During the course of deployment, our system detects 497 true anomalies in the wild with an average of only 1.65 false alarms per day.
引用
收藏
页码:5143 / 5160
页数:18
相关论文
共 50 条
  • [1] A SEMANTICS-AWARE NORMALIZING FLOW MODEL FOR ANOMALY DETECTION
    Ma, Wei
    Lan, Shiyong
    Huang, Weikang
    Wang, Wenwu
    Yang, Hongyu
    Ma, Yitong
    Ma, Yongjie
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 2207 - 2212
  • [2] Semantics-aware malware detection
    Christodorescu, M
    Jha, S
    Seshia, SA
    Song, D
    Bryant, RE
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 32 - 46
  • [3] HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
    Fu, Chenglong
    Zeng, Qiang
    Du, Xiaojiang
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 4223 - 4240
  • [4] Semantics-Aware Autoencoder
    Bellini, Vito
    Di Noia, Tommaso
    Di Sciascio, Eugenio
    Schiavone, Angelo
    IEEE ACCESS, 2019, 7 : 166122 - 166137
  • [5] Semantics-aware detection of targeted attacks: a survey
    Luh R.
    Marschalek S.
    Kaiser M.
    Janicke H.
    Schrittwieser S.
    Luh, Robert (robert.luh@fhstp.ac.at), 1600, Springer-Verlag France (13) : 47 - 85
  • [6] Semantics-Aware Active Fault Detection in IoT
    Stamatakis, George J.
    Pappas, Nikolaos
    Fragkiadakis, Alexandros
    Traganitis, Apostolos
    2022 20TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT 2022), 2022, : 161 - 168
  • [7] Malicious Webpage Detection by Semantics-Aware Reasoning
    Lin, Shih-Fen
    Hou, Yung-Tsung
    Chen, Chia-Mei
    Jeng, Bingchiang
    Laih, Chi-Sung
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 115 - +
  • [8] An API Semantics-Aware Malware Detection Method Based on Deep Learning
    Ma, Xin
    Guo, Shize
    Bai, Wei
    Chen, Jun
    Xia, Shiming
    Pan, Zhisong
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [9] Invited talk - Towards semantics-aware access control
    Damiani, E
    di Vimercati, SD
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 177 - 188
  • [10] Semantics-aware perimeter protection
    Cremonini, M
    Damiani, E
    Samarati, P
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 229 - 242