SICO: Surgical Interception Attacks by Manipulating BGP Communities

被引:19
|
作者
Birge-Lee, Henry [1 ]
Wang, Liang [1 ]
Rexford, Jennifer [1 ]
Mittal, Prateek [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
networking; security; BGP; hijacking attacks; interception attacks; BGP communities;
D O I
10.1145/3319535.3363197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more complex and challenging interception attacks require that adversary intercept a victim's traffic and forward it on to the victim. If an interception attack is launched incorrectly, the adversary's attack will disrupt its route to the victim making it impossible to forward packets. To overcome these challenges, we introduce SICO attacks (Surgical Interception using COmmunities): a novel method of launching interception attacks that leverages BGP communities to scope an adversary's attack and ensure a route to the victim. We then show how SICO attacks can be targeted to specific source IP addresses for reducing attack costs. Furthermore, we ethically perform SICO attacks on the real Internet backbone to evaluate their feasibility and effectiveness. Results suggest that SICO attacks can achieve interception even when previously proposed attacks would not be feasible and outperforms them by attracting traffic from an additional 16% of Internet hosts (worst case) and 58% of Internet hosts (best case). Finally, we analyze the Internet topology to find that at least 83% of multi-homed ASes are capable of launching these attacks.
引用
收藏
页码:431 / 448
页数:18
相关论文
共 50 条
  • [1] On BGP communities
    Donnet, Benoit
    Bonaventure, Olivier
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (02) : 55 - 59
  • [2] Beware of BGP attacks
    Nordström, O
    Dovrolis, C
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 1 - 8
  • [3] BGP with BGPsec: Attacks and Countermeasures
    Li, Qi
    Liu, Jiajia
    Hu, Yih-Chun
    Xu, Mingwei
    Wu, Jianping
    [J]. IEEE NETWORK, 2019, 33 (04): : 194 - 200
  • [4] Detecting selective dropping attacks in BGP
    Chuah, M.
    Huang, K.
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
  • [5] BGP Attacks and Countermeasures in Heterogeneous Networks
    Luo, Yun-Fang
    Hu, Rui-Min
    Yang, Yu-Hong
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2334 - +
  • [6] A Taxonomy of Attacks Using BGP Blackholing
    Miller, Loic
    Pelsser, Cristel
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
  • [7] Temporal Representations for Detecting BGP Blackjack Attacks
    Copstein, Rafael
    Zincir-Heywood, Nur
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [8] HEAP: Reliable Assessment of BGP Hijacking Attacks
    Schlamp, Johann
    Holz, Ralph
    Jacquemart, Quentin
    Carle, Georg
    Biersack, Ernst W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (06) : 1849 - 1861
  • [9] Automatic Inference of BGP Location Communities
    Silva, Brivaldo A., Jr.
    Mol, Paulo
    Fonseca, Osvaldo
    Cunha, Italo
    Ferreira, Ronaldo A.
    Katz-Bassett, Ethan
    [J]. PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2022, 6 (01)
  • [10] The Italian Society of Surgical Oncology (SICO) - Introduction
    Moggi, L
    Badellino, F
    Giustozzi, G
    Bufalari, A
    Gipponi, M
    Sensi, B
    [J]. JOURNAL OF SURGICAL ONCOLOGY, 2000, 74 (01) : 1 - 1