A Taxonomy of Attacks Using BGP Blackholing

被引:7
|
作者
Miller, Loic [1 ]
Pelsser, Cristel [1 ]
机构
[1] Univ Strasbourg, 4 Rue Blaise Pascal, F-67081 Strasbourg, France
来源
关键词
BGP; Security; Blackholing; DDoS; Communities; Hijacks; Leaks; HIJACKING;
D O I
10.1007/978-3-030-29959-0_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP (s) to be dropped. Unfortunately, remote parties may misuse blackholing [19,57] and send requests for IPs they do not own, turning a defense technique into a new attack vector. As DDoS attacks grow in number, blackholing will only become more popular, creating a greater risk this service will be exploited. In this work, we develop a taxonomy of attacks combining hijacks with blackholing: BGP blackjacks (blackhole hijacks). We show that those attacks effectively grant more reach and stealth to the attacker than regular hijacks, and assess the usability of those attacks in various security deployments. We then find that routing security mechanisms for BGP [30,31] do not provide an adequate protection against some of those attacks, and propose additional mechanisms to properly defend against or mitigate them.
引用
收藏
页码:107 / 127
页数:21
相关论文
共 50 条
  • [1] A First Joint Look at DoS Attacks and BGP Blackholing in the Wild
    Jonker, Mattijs
    Pras, Aiko
    Dainotti, Alberto
    Sperotto, Anna
    [J]. IMC'18: PROCEEDINGS OF THE INTERNET MEASUREMENT CONFERENCE, 2018, : 457 - 463
  • [2] Inferring BGP Blackholing Activity in the Internet
    Giotsas, Vasileios
    Smaragdakis, Georgios
    Dietzel, Christoph
    Richter, Philipp
    Feldmann, Anja
    Berger, Arthur
    [J]. PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, : 1 - 14
  • [3] Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs
    Nawrocki, Marcin
    Blendin, Jeremias
    Dietzel, Christoph
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, : 435 - 448
  • [4] Beware of BGP attacks
    Nordström, O
    Dovrolis, C
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 1 - 8
  • [5] BGP with BGPsec: Attacks and Countermeasures
    Li, Qi
    Liu, Jiajia
    Hu, Yih-Chun
    Xu, Mingwei
    Wu, Jianping
    [J]. IEEE NETWORK, 2019, 33 (04): : 194 - 200
  • [6] Detecting selective dropping attacks in BGP
    Chuah, M.
    Huang, K.
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
  • [7] BGP Attacks and Countermeasures in Heterogeneous Networks
    Luo, Yun-Fang
    Hu, Rui-Min
    Yang, Yu-Hong
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2334 - +
  • [8] Temporal Representations for Detecting BGP Blackjack Attacks
    Copstein, Rafael
    Zincir-Heywood, Nur
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [9] A taxonomy of rational attacks
    Nielson, SJ
    Crosby, SA
    Wallach, DS
    [J]. PEER-TO-PEER SYSTEMS IV, 2005, 3640 : 36 - 46
  • [10] HEAP: Reliable Assessment of BGP Hijacking Attacks
    Schlamp, Johann
    Holz, Ralph
    Jacquemart, Quentin
    Carle, Georg
    Biersack, Ernst W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (06) : 1849 - 1861