Temporal Representations for Detecting BGP Blackjack Attacks

被引:2
|
作者
Copstein, Rafael [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
关键词
BGP; blackholing; blackjack attacks; security;
D O I
10.23919/cnsm50824.2020.9269055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though BGP blackholes are used to mitigate denial of service attacks, they also represent a major cybersecurity challenge to organizations. These challenges include abuse of route selection algorithms, lack of host verification, and maliciously triggering a blackhole, i.e. BGP blackjack. This research presents a supervised machine learning based approach for blackjack detection. We employ Naive Bayes and Decision Tree classifiers with three different temporal representations: (i) packets with/without timestamps; (ii) buffer of packets with/without timestamps; and (iii) overlapping / non-overlapping buffer of packets with/without timestamps. Our goal is to understand the effect of temporal data and context in the detection of blackjack attacks. Furthermore, we explore the most suitable attributes and solution complexity. Evaluations show that using overlapping buffer data with timestamps achieves the highest accuracy/recall using five of the seven BGP attributes. We also observe that high performance is not correlated with complex solutions.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Detecting BrakTooth Attacks
    Nandikotkur, Achyuth
    Traore, Issa
    Mamun, Mohammad
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 787 - 792
  • [22] Detecting attacks on networks
    Herringshaw, C
    [J]. COMPUTER, 1997, 30 (12) : 16 - 17
  • [23] Detecting BGP Anomalies Using Machine Learning Techniques
    Ding, Qingye
    Li, Zhida
    Batta, Prerna
    Trajkovic, Ljiljana
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 3352 - 3355
  • [24] Detecting Replay Attacks Using Single-Channel Audio: The Temporal Autocorrelation of Speech
    Lee, Shih-Kuang
    Tsao, Yu
    Wang, Hsin-Min
    [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1984 - 1990
  • [25] Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder
    Lan, Bin
    Yu, Shunzheng
    [J]. 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [26] Towards Detecting BGP Route Hijacking using the RPKI
    Waehlisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 103 - 104
  • [27] Towards detecting BGP route hijacking using the RPKI
    Wählisch, Matthias
    Maennel, Olaf
    Schmidt, Thomas C.
    [J]. SIGCOMM'12 - Proceedings of the ACM SIGCOMM 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication, 2012, : 103 - 104
  • [28] Using bursty announcements for detecting BGP routing anomalies
    Moriano, Pablo
    Hill, Raquel
    Camp, L. Jean
    [J]. COMPUTER NETWORKS, 2021, 188
  • [29] A First Joint Look at DoS Attacks and BGP Blackholing in the Wild
    Jonker, Mattijs
    Pras, Aiko
    Dainotti, Alberto
    Sperotto, Anna
    [J]. IMC'18: PROCEEDINGS OF THE INTERNET MEASUREMENT CONFERENCE, 2018, : 457 - 463
  • [30] Study of BGP peering session attacks and their impacts on routing performance
    Sriram, Kotikalapudi
    Montgomery, Doug
    Borchert, Oliver
    Kim, Okhee
    Kuhn, D. Richard
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) : 1901 - 1915