Visual Analytics for BGP Monitoring and Prefix Hijacking Identification

被引:14
|
作者
Biersack, Ernst [1 ]
Jacquemart, Quentin [1 ]
Fischer, Fabian [2 ]
Fuchs, Johannes [2 ]
Thonnard, Olivier
Theodoridis, Georgios
Tzovaras, Dimitrios
Vervier, Pierre-Antoine [1 ]
机构
[1] Eurecom, Sophia Antipolis, France
[2] Univ Konstanz, Constance, Germany
来源
IEEE NETWORK | 2012年 / 26卷 / 06期
关键词
D O I
10.1109/MNET.2012.6375891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing information between large network providers and their customers. However, an intrinsic vulnerability of the protocol is its inability to validate the integrity and correctness of routing information exchanged between peer routers. As a result, it is relatively easy for people with malicious intent to steal legitimate IP blocks through an attack known as prefix hijacking, which essentially consists of injecting bogus routing information into the system to redirect or subvert network traffic. In this article, we give a short survey of visualization methods that have been developed for BGP monitoring, in particular for the identification of prefix hijacks. Our goal is to illustrate how network visualization has the potential to assist an analyst in detecting abnormal routing patterns in massive amounts of BGP data. Finally, we present an analysis of a real validated case of prefix hijacking, which took place between April and August 2011. We use this hijack case study to illustrate the ongoing work carried out in VIS-SENSE, a European research project that leverages visual analytics to develop more effective tools for BGP monitoring and prefix hijack detection.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [31] Evaluation on the Influence of Internet Prefix Hijacking Events
    Zhao, Jinjing
    Wen, Yan
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 611 - 631
  • [32] Analysis of IP Prefix Hijacking and Traffic Interception
    Latt, Khin Thida
    Ohara, Yasuhiro
    Uda, Satoshi
    Shinoda, Yoichi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 22 - 31
  • [33] BGP Molecules: Understanding and Predicting Prefix Failures
    Khosla, Ravish
    Fahmy, Sonia
    Hu, Y. Charlie
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 146 - 150
  • [34] Securing prefixes against BGP hijacking in a cooperative way
    Wang, Xiao-Qiang
    Zhu, Pei-Dong
    Lu, Xi-Cheng
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (03): : 642 - 661
  • [35] Visual Analytics for Fraud Detection and Monitoring
    Leite, Roger A.
    Gschwandtner, Theresia
    Miksch, Silvia
    Gstrein, Erich
    Kuntner, Johannes
    2015 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY, 2015, : 201 - 202
  • [36] Towards Detecting BGP Route Hijacking using the RPKI
    Waehlisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 103 - 104
  • [37] Towards detecting BGP route hijacking using the RPKI
    Wählisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    SIGCOMM'12 - Proceedings of the ACM SIGCOMM 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication, 2012, : 103 - 104
  • [38] A Method to Detect Prefix Hijacking by Using Ping Tests
    Tahara, Mitsuho
    Tateishi, Naoki
    Oimatsu, Toshio
    Majima, Souhei
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 390 - 398
  • [39] iSPY: Detecting IP prefix hijacking on my own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) : 327 - 338
  • [40] A study of IP prefix hijacking in cloud computing networks
    Liu, Yujing
    Peng, Wei
    Su, Jinshu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2201 - 2210