LDC: Detecting BGP Prefix Hijacking by Load Distribution Change

被引:1
|
作者
Liu, Yujing [1 ]
Su, Jinshu [1 ]
Chang, Rocky K. C. [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
BGP prefix hijacking; detection; load distribution; direct provider; TOPOLOGY;
D O I
10.1109/IPDPSW.2012.147
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
BGP prefix hijacking remains a serious security threat to the Internet. Despite many detection mechanisms have been proposed, few of them are practically deployed in a large scale. Inaccuracy of detection and inefficiency of deployment are two major causing problems. In this paper, based on the key observation that the distribution of traffic load to a prefix will change unusually after the prefix is hijacked, we present a system LDC to detect BGP prefix hijacking by passively monitoring Load Distribution Change on direct providers of prefix's owner, with the purpose of Leveraging Data-plane information to detect Control-plane problem. Through large amount of simulations of hijacking attacks and AS failure events based on empirical data, we evaluate the accuracy of LDC under different deployment situations, moreover, gain useful insights about choosing detection threshold accordingly.
引用
收藏
页码:1197 / 1203
页数:7
相关论文
共 50 条
  • [1] Detecting bogus BGP route information: Going beyond prefix hijacking
    Qiu, Jian
    Gao, Lixin
    Ranjan, Supranamaya
    Nucci, Antonio
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 381 - +
  • [2] Estimating the impact of BGP prefix hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    arXiv, 2021,
  • [3] Estimating the Impact of BGP Prefix Hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,
  • [4] Estimating the Impact of BGP Prefix Hijacking
    Aristotle University of Thessaloniki, Greece
    不详
    不详
    IFIP Netw. Conf., IFIP Netw., 2021,
  • [5] A Survey among Network Operators on BGP Prefix Hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Dainotti, Alberto
    Dimitropoulos, Xenofontas
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2018, 48 (01) : 64 - 69
  • [6] Case Study Analysis on BGP: Prefix Hijacking and Transit AS
    Hakimi, Rifqy
    Saputra, Yuris Mulya
    Nugraha, Beny
    2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,
  • [7] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification
    Biersack, Ernst
    Jacquemart, Quentin
    Fischer, Fabian
    Fuchs, Johannes
    Thonnard, Olivier
    Theodoridis, Georgios
    Tzovaras, Dimitrios
    Vervier, Pierre-Antoine
    IEEE NETWORK, 2012, 26 (06): : 33 - 39
  • [8] Understanding the impact of outsourcing mitigation against BGP prefix hijacking
    Zeng, Man
    Huang, Xiaohong
    Zhang, Pei
    Li, Dandan
    COMPUTER NETWORKS, 2022, 202
  • [9] Origin authentication scheme against BGP address prefix hijacking
    Liu, Z.-H. (kevin2296@gmail.com), 1908, Chinese Academy of Sciences (23):
  • [10] Whom to Convince? It Really Matters in BGP Prefix Hijacking Attack and Defense
    Liu, Yujing
    Dai, Bin
    Zhu, Peidong
    Su, Jinshu
    FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 1 - 10