Visual Analytics for BGP Monitoring and Prefix Hijacking Identification

被引:14
|
作者
Biersack, Ernst [1 ]
Jacquemart, Quentin [1 ]
Fischer, Fabian [2 ]
Fuchs, Johannes [2 ]
Thonnard, Olivier
Theodoridis, Georgios
Tzovaras, Dimitrios
Vervier, Pierre-Antoine [1 ]
机构
[1] Eurecom, Sophia Antipolis, France
[2] Univ Konstanz, Constance, Germany
来源
IEEE NETWORK | 2012年 / 26卷 / 06期
关键词
D O I
10.1109/MNET.2012.6375891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing information between large network providers and their customers. However, an intrinsic vulnerability of the protocol is its inability to validate the integrity and correctness of routing information exchanged between peer routers. As a result, it is relatively easy for people with malicious intent to steal legitimate IP blocks through an attack known as prefix hijacking, which essentially consists of injecting bogus routing information into the system to redirect or subvert network traffic. In this article, we give a short survey of visualization methods that have been developed for BGP monitoring, in particular for the identification of prefix hijacks. Our goal is to illustrate how network visualization has the potential to assist an analyst in detecting abnormal routing patterns in massive amounts of BGP data. Finally, we present an analysis of a real validated case of prefix hijacking, which took place between April and August 2011. We use this hijack case study to illustrate the ongoing work carried out in VIS-SENSE, a European research project that leverages visual analytics to develop more effective tools for BGP monitoring and prefix hijack detection.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [21] Model construction on prefix hijacking attack
    Zhao, Jinjing
    Wen, Yan
    Wang, Yaping
    International Conference on Communication Technology Proceedings, ICCT, 2012, : 866 - 871
  • [22] A study of prefix hijacking and interception in the Internet
    Ballani, Hitesh
    Francis, Paul
    Zhang, Xinyang
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 265 - 276
  • [23] Model Construction on Prefix Hijacking Attack
    Zhao, Jinjing
    Wen, Yan
    Wang, Yaping
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 866 - 871
  • [24] Computational Complexity of Traffic Hijacking under BGP and S-BGP
    Chiesa, Marco
    Di Battista, Giuseppe
    Erlebach, Thomas
    Patrignani, Maurizio
    AUTOMATA, LANGUAGES, AND PROGRAMMING, ICALP 2012, PT II, 2012, 7392 : 476 - 487
  • [25] Computational complexity of traffic hijacking under BGP and S-BGP
    Chiesa, Marco
    Di Battista, Giuseppe
    Erlebach, Thomas
    Patrignani, Maurizio
    THEORETICAL COMPUTER SCIENCE, 2015, 600 : 143 - 154
  • [26] Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels
    Wuebbeling, Matthias
    Meier, Michael
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 330 - 338
  • [27] ARTEMIS: Neutralizing BGP Hijacking Within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (06) : 2471 - 2486
  • [28] ARTEMIS: Neutralizing BGP Hijacking within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 6 - 6
  • [29] An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems
    Alkadi, Osama S.
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1164 - 1174
  • [30] HEAP: Reliable Assessment of BGP Hijacking Attacks
    Schlamp, Johann
    Holz, Ralph
    Jacquemart, Quentin
    Carle, Georg
    Biersack, Ernst W.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (06) : 1849 - 1861