Temporal Representations for Detecting BGP Blackjack Attacks

被引:2
|
作者
Copstein, Rafael [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
关键词
BGP; blackholing; blackjack attacks; security;
D O I
10.23919/cnsm50824.2020.9269055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though BGP blackholes are used to mitigate denial of service attacks, they also represent a major cybersecurity challenge to organizations. These challenges include abuse of route selection algorithms, lack of host verification, and maliciously triggering a blackhole, i.e. BGP blackjack. This research presents a supervised machine learning based approach for blackjack detection. We employ Naive Bayes and Decision Tree classifiers with three different temporal representations: (i) packets with/without timestamps; (ii) buffer of packets with/without timestamps; and (iii) overlapping / non-overlapping buffer of packets with/without timestamps. Our goal is to understand the effect of temporal data and context in the detection of blackjack attacks. Furthermore, we explore the most suitable attributes and solution complexity. Evaluations show that using overlapping buffer data with timestamps achieves the highest accuracy/recall using five of the seven BGP attributes. We also observe that high performance is not correlated with complex solutions.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] "BGP-Hijacking" Attacks: Theoretical Basis and Practical Scenarios
    Rashevskiy, Roman B.
    Shaburov, Andrey S.
    [J]. PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 208 - 212
  • [32] Internet resiliency to attacks and failures under BGP policy routing
    Dolev, Danny
    Jamin, Sugih
    Mokryn, Osnat
    Shavitt, Yuval
    [J]. COMPUTER NETWORKS, 2006, 50 (16) : 3183 - 3196
  • [33] The temporal and topological characteristics of BGP path changes
    Chang, DF
    Govindan, R
    Heidemann, J
    [J]. 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2003, : 190 - 199
  • [34] BGPViewer: Using Graph representations to explore BGP routing changes
    Papadopoulos, Stavros
    Moustakas, Konstantinos
    Tzovaras, Dimitrios
    [J]. 2013 18TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2013,
  • [35] Detecting False Data Injection Attacks using Spatial-temporal Graph Neural Network
    Wei, Xingshen
    Liu, Wei
    Zhou, Jian
    Zhou, Xiaoming
    Zhang, Wenjie
    Cao, Yongjian
    [J]. 2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS, 2023, : 338 - 343
  • [36] Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network
    Cao, Yongyi
    Jiang, Hao
    Deng, Yuchuan
    Wu, Jing
    Zhou, Pan
    Luo, Wei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3855 - 3872
  • [37] The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior
    Lutu, Andra
    Bagnulo, Marcelo
    Pelsser, Cristel
    Maennel, Olaf
    Cid-Sueiro, Jesus
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 1237 - 1250
  • [38] On Detecting Code Reuse Attacks
    Y. V. Kosolapov
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 573 - 583
  • [39] Understanding and Detecting Majority Attacks
    Cilloni, Thomas
    Cai, Xiyu
    Fleming, Charles
    Li, Jun
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2020), 2020, : 11 - 21
  • [40] Detecting DNS Amplification Attacks
    Kambourakis, Georgios
    Moschos, Tassos
    Geneiatakis, Dimitris
    Gritzalis, Stefanos
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 185 - 196