Visual Analytics for BGP Monitoring and Prefix Hijacking Identification

被引:14
|
作者
Biersack, Ernst [1 ]
Jacquemart, Quentin [1 ]
Fischer, Fabian [2 ]
Fuchs, Johannes [2 ]
Thonnard, Olivier
Theodoridis, Georgios
Tzovaras, Dimitrios
Vervier, Pierre-Antoine [1 ]
机构
[1] Eurecom, Sophia Antipolis, France
[2] Univ Konstanz, Constance, Germany
来源
IEEE NETWORK | 2012年 / 26卷 / 06期
关键词
D O I
10.1109/MNET.2012.6375891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing information between large network providers and their customers. However, an intrinsic vulnerability of the protocol is its inability to validate the integrity and correctness of routing information exchanged between peer routers. As a result, it is relatively easy for people with malicious intent to steal legitimate IP blocks through an attack known as prefix hijacking, which essentially consists of injecting bogus routing information into the system to redirect or subvert network traffic. In this article, we give a short survey of visualization methods that have been developed for BGP monitoring, in particular for the identification of prefix hijacks. Our goal is to illustrate how network visualization has the potential to assist an analyst in detecting abnormal routing patterns in massive amounts of BGP data. Finally, we present an analysis of a real validated case of prefix hijacking, which took place between April and August 2011. We use this hijack case study to illustrate the ongoing work carried out in VIS-SENSE, a European research project that leverages visual analytics to develop more effective tools for BGP monitoring and prefix hijack detection.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [41] iSPY: Detecting IP Prefix Hijacking on My Own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1815 - 1828
  • [42] Improved Calculation of AS Resilience Against IP Prefix Hijacking
    Wuebbeling, Matthias
    Meier, Michael
    PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 121 - 128
  • [43] IP Prefix Hijacking Detection Using Idle Scan
    Hong, Seong-Cheol
    Ju, Hong-Taek
    Hong, James W.
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 395 - 404
  • [44] Investigating prefix propagation through active BGP probing
    Colitti, Lorenzo
    Di Battista, Giuseppe
    Patrignani, Maurizio
    Pizzonia, Maurizio
    Rimondini, Massimo
    MICROPROCESSORS AND MICROSYSTEMS, 2007, 31 (07) : 460 - 474
  • [45] ROV++: Improved Deployable Defense against BGP Hijacking
    Morillo, Reynaldo
    Furuness, Justin
    Morris, Cameron
    Breslin, James
    Herzberg, Amir
    Wang, Bing
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [46] "BGP-Hijacking" Attacks: Theoretical Basis and Practical Scenarios
    Rashevskiy, Roman B.
    Shaburov, Andrey S.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 208 - 212
  • [47] The application of visual analytics to financial stability monitoring
    Flood, Mark D.
    Lemieux, Victoria L.
    Varga, Margaret
    Wong, B. L. William
    JOURNAL OF FINANCIAL STABILITY, 2016, 27 : 180 - 197
  • [48] Visual Analytics: A New Paradigm for Process Monitoring
    Yousef, Ibrahim
    Shah, Sirish L.
    Gopaluni, R. Bhushan
    IFAC PAPERSONLINE, 2022, 55 (07): : 376 - 383
  • [49] Visual analytics for monitoring credit scoring models
    Baldo, Daiane Rodrigues
    Regio, Murilo Santos
    Manssour, Isabel Harb
    INFORMATION VISUALIZATION, 2023, 22 (04) : 340 - 357
  • [50] A Prefix Hijacking Detection Model Based on the Immune Network Theory
    Zhang, Jian
    Li, Daofeng
    Zhao, Bowen
    IEEE ACCESS, 2019, 7 : 132384 - 132394