Accurate real-time identification of IP prefix hijacking

被引:76
|
作者
Hu, Xin [1 ]
Mao, Z. Morley [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
10.1109/SP.2007.7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. We propose novel ways to significantly improve the detection accuracy by combining analysis of passively collected BGP routing updates with data plane fingerprints of suspicious prefixes. The key insight is to use data plane information in the form of edge network fingerprinting to disambiguate suspect IP hijacking incidences based on routing anomaly detection. Conflicts in data plane fingerprints provide much more definitive evidence of successful IP prefix hijacking. Utilizing multiple real-time BGP feeds, we demonstrate the ability of our system to distinguish between legitimate routing changes and actual attacks. Strong correlation with addresses that originate spam emails from a spam honeypot confirms the accuracy of our techniques.
引用
收藏
页码:3 / +
页数:3
相关论文
共 50 条
  • [1] Argus: An Accurate and Agile System to Detecting IP Prefix Hijacking
    Xiang, Yang
    Wang, Zhiliang
    Yin, Xia
    Wu, Jianping
    [J]. 2011 19TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2011,
  • [2] ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking
    Chaviaras, Gavriil
    Gigis, Petros
    Sermpezis, Pavlos
    Dimitropoulos, Xenofontas
    [J]. PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, : 625 - 626
  • [3] Probabilistic IP prefix authentication (PIPA) for prefix hijacking
    Seoul National University, Korea, Republic of
    [J]. Proc. Int. Conf. Future Internet Technol., CFI, 1600, (52-55):
  • [4] Analysis of IP Prefix Hijacking and Traffic Interception
    Latt, Khin Thida
    Ohara, Yasuhiro
    Uda, Satoshi
    Shinoda, Yoichi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 22 - 31
  • [5] An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems
    Alkadi, Osama S.
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1164 - 1174
  • [6] iSPY: Detecting IP prefix hijacking on my own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) : 327 - 338
  • [7] Improved Calculation of AS Resilience Against IP Prefix Hijacking
    Wuebbeling, Matthias
    Meier, Michael
    [J]. PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 121 - 128
  • [8] IP Prefix Hijacking Detection Using Idle Scan
    Hong, Seong-Cheol
    Ju, Hong-Taek
    Hong, James W.
    [J]. MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 395 - 404
  • [9] iSPY: Detecting IP Prefix Hijacking on My Own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1815 - 1828
  • [10] A study of IP prefix hijacking in cloud computing networks
    Liu, Yujing
    Peng, Wei
    Su, Jinshu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2201 - 2210