Temporal Representations for Detecting BGP Blackjack Attacks

被引:2
|
作者
Copstein, Rafael [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
关键词
BGP; blackholing; blackjack attacks; security;
D O I
10.23919/cnsm50824.2020.9269055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Even though BGP blackholes are used to mitigate denial of service attacks, they also represent a major cybersecurity challenge to organizations. These challenges include abuse of route selection algorithms, lack of host verification, and maliciously triggering a blackhole, i.e. BGP blackjack. This research presents a supervised machine learning based approach for blackjack detection. We employ Naive Bayes and Decision Tree classifiers with three different temporal representations: (i) packets with/without timestamps; (ii) buffer of packets with/without timestamps; and (iii) overlapping / non-overlapping buffer of packets with/without timestamps. Our goal is to understand the effect of temporal data and context in the detection of blackjack attacks. Furthermore, we explore the most suitable attributes and solution complexity. Evaluations show that using overlapping buffer data with timestamps achieves the highest accuracy/recall using five of the seven BGP attributes. We also observe that high performance is not correlated with complex solutions.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Detecting SYN flooding attacks
    Wang, HI
    Zhang, DL
    Shin, KG
    [J]. IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
  • [42] On Detecting Code Reuse Attacks
    Kosolapov, Y. V.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 573 - 583
  • [43] Detecting BGP Routing Anomalies Using Machine Learning: A Review
    Muosa, Ali Hassan
    Ali, A. H.
    [J]. FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 1, FONES-AIOT 2024, 2024, 1035 : 145 - 164
  • [44] Detecting BGP Instability Using Recurrence Quantification Analysis (RQA)
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    [J]. 2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [45] Detecting Sybil attacks in VANETs
    Yu, Bo
    Xu, Cheng-Zhong
    Xiao, Bin
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756
  • [46] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change
    Liu, Yujing
    Su, Jinshu
    Chang, Rocky K. C.
    [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203
  • [47] Collaborative framework for protection against attacks targeting BGP and edge networks
    Hiran, Rahul
    Carlsson, Niklas
    Shahmehri, Nahid
    [J]. COMPUTER NETWORKS, 2017, 122 : 120 - 137
  • [48] Early detection of BGP instabilities resulting from Internet worm attacks
    Deshpande, S
    Thottan, M
    Sikdar, B
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2266 - 2270
  • [49] Modular Platform for Customer-Side Detection of BGP Redirection Attacks
    Silva, Marco
    Nogueira, Antonio
    Salvador, Paulo
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 199 - 206
  • [50] RETRACTED: Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network (Retracted Article)
    Yue, Chuan
    Wang, Lide
    Wang, Dengrui
    Duo, Ruifeng
    Yan, Haipeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021