Temporal Representations for Detecting BGP Blackjack Attacks

被引:2
|
作者
Copstein, Rafael [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
关键词
BGP; blackholing; blackjack attacks; security;
D O I
10.23919/cnsm50824.2020.9269055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though BGP blackholes are used to mitigate denial of service attacks, they also represent a major cybersecurity challenge to organizations. These challenges include abuse of route selection algorithms, lack of host verification, and maliciously triggering a blackhole, i.e. BGP blackjack. This research presents a supervised machine learning based approach for blackjack detection. We employ Naive Bayes and Decision Tree classifiers with three different temporal representations: (i) packets with/without timestamps; (ii) buffer of packets with/without timestamps; and (iii) overlapping / non-overlapping buffer of packets with/without timestamps. Our goal is to understand the effect of temporal data and context in the detection of blackjack attacks. Furthermore, we explore the most suitable attributes and solution complexity. Evaluations show that using overlapping buffer data with timestamps achieves the highest accuracy/recall using five of the seven BGP attributes. We also observe that high performance is not correlated with complex solutions.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Detecting selective dropping attacks in BGP
    Chuah, M.
    Huang, K.
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
  • [2] Beware of BGP attacks
    Nordström, O
    Dovrolis, C
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 1 - 8
  • [3] Detecting BGP misconfiguration for BGP/MPLS VPNs
    Liang, HY
    Teng, GW
    Wang, HJ
    Gao, Y
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 168 - 170
  • [4] BGP with BGPsec: Attacks and Countermeasures
    Li, Qi
    Liu, Jiajia
    Hu, Yih-Chun
    Xu, Mingwei
    Wu, Jianping
    [J]. IEEE NETWORK, 2019, 33 (04): : 194 - 200
  • [5] Detecting the Unintended in BGP Policies
    Perouli, Debbie
    Griffin, Timothy G.
    Maennel, Olaf
    Fahmy, Sonia
    Phillips, Iain
    Pelsser, Cristel
    [J]. 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [6] Detecting BGP anomalies with wavelet
    Mai, Jianning
    Yuan, Lihua
    Chuah, Chen-Nee
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 465 - 472
  • [7] BGP Attacks and Countermeasures in Heterogeneous Networks
    Luo, Yun-Fang
    Hu, Rui-Min
    Yang, Yu-Hong
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2334 - +
  • [8] A Taxonomy of Attacks Using BGP Blackholing
    Miller, Loic
    Pelsser, Cristel
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
  • [9] Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems
    Liu, Zimian
    Qiu, Han
    Wang, Rui
    Zhu, Junhu
    Wang, Qingxian
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 404 - 411
  • [10] A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks
    Huang, Yifan
    Chung, Wingyan
    Tang, Xinlin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 160 - 162