A Taxonomy of Attacks Using BGP Blackholing

被引:7
|
作者
Miller, Loic [1 ]
Pelsser, Cristel [1 ]
机构
[1] Univ Strasbourg, 4 Rue Blaise Pascal, F-67081 Strasbourg, France
来源
关键词
BGP; Security; Blackholing; DDoS; Communities; Hijacks; Leaks; HIJACKING;
D O I
10.1007/978-3-030-29959-0_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP (s) to be dropped. Unfortunately, remote parties may misuse blackholing [19,57] and send requests for IPs they do not own, turning a defense technique into a new attack vector. As DDoS attacks grow in number, blackholing will only become more popular, creating a greater risk this service will be exploited. In this work, we develop a taxonomy of attacks combining hijacks with blackholing: BGP blackjacks (blackhole hijacks). We show that those attacks effectively grant more reach and stealth to the attacker than regular hijacks, and assess the usability of those attacks in various security deployments. We then find that routing security mechanisms for BGP [30,31] do not provide an adequate protection against some of those attacks, and propose additional mechanisms to properly defend against or mitigate them.
引用
收藏
页码:107 / 127
页数:21
相关论文
共 50 条
  • [21] A Taxonomy of Time and State Attacks
    Corcalciuc, Horia V.
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 564 - 573
  • [22] A taxonomy of networks and computer attacks
    Hansman, S
    Hunt, R
    [J]. COMPUTERS & SECURITY, 2005, 24 (01) : 31 - 43
  • [23] A taxonomy of SQL Injection Attacks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abdullah, Shahidan M.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 269 - 273
  • [24] Designing a Taxonomy of Web Attacks
    Lai, Jung-Ying
    Wu, Jain-Shing
    Chen, Shih-Jen
    Wu, Chia-Huan
    Yang, Chung-Huang
    [J]. ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 278 - 282
  • [25] A Taxonomy of Attacks on Federated Learning
    Jere, Malhar
    Farnan, Tyler
    Koushanfar, Farinaz
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (02) : 20 - 28
  • [26] BLT: A Taxonomy and Classification Tool for Mining BGP Update Messages
    Kitabatake, Tomoyuki
    Fontugne, Romain
    Esaki, Hiroshi
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 409 - 414
  • [27] Study of BGP peering session attacks and their impacts on routing performance
    Sriram, Kotikalapudi
    Montgomery, Doug
    Borchert, Oliver
    Kim, Okhee
    Kuhn, D. Richard
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) : 1901 - 1915
  • [28] "BGP-Hijacking" Attacks: Theoretical Basis and Practical Scenarios
    Rashevskiy, Roman B.
    Shaburov, Andrey S.
    [J]. PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 208 - 212
  • [29] Internet resiliency to attacks and failures under BGP policy routing
    Dolev, Danny
    Jamin, Sugih
    Mokryn, Osnat
    Shavitt, Yuval
    [J]. COMPUTER NETWORKS, 2006, 50 (16) : 3183 - 3196
  • [30] Network attacks: Taxonomy, tools and systems
    Hoque, N.
    Bhuyan, Monowar H.
    Baishya, R. C.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 : 307 - 324