Border gateway protocol graph: detecting and visualising internet routing anomalies

被引:6
|
作者
Papadopoulos, Stavros [1 ]
Moustakas, Konstantinos [2 ]
Drosou, Anastasios [3 ]
Tzovaras, Dimitrios [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Elect & Elect Engn, London SW7 2AZ, England
[2] Univ Patras, Dept Elect & Comp Engn, Rio Campus, Patras 26504, Greece
[3] Ctr Res & Technol Hellas, Inst Informat Technol, 6th Km Xarilaou, Thessaloniki 57001, Greece
关键词
BGP;
D O I
10.1049/iet-ifs.2014.0525
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Border gateway protocol (BGP) is the main protocol used on the Internet today, for the exchange of routing information between different networks. The lack of authentication mechanisms in BGP, render it vulnerable to prefix hijacking attacks, which raise serious security concerns regarding both service availability and data privacy. To address these issues, this study presents BGPGraph, a scheme for detecting and visualising Internet routing anomalies. In particular, BGPGraph introduces a novel BGP anomaly metric that quantifies the degree of anomaly on the BGP activity, and enables the analyst to obtain an overview of the BGP status. The analyst, is afterwards able to focus on significant time windows for further analysis, by using a hierarchical graph visualisation scheme. Furthermore, BGPGraph uses a novel method for the quantification of information visualisation that allows for the evaluation, and optimal selection of parameters, in case of the corresponding visual analytics algorithms. As a result, by utilising the proposed approach, four new BGP anomalies were able to be identified. Experimental demonstration in known BGP events, illustrates the significant analytics potential of the proposed approach in terms of identifying prefix hijacks and performing root cause analysis.
引用
收藏
页码:125 / 133
页数:9
相关论文
共 50 条
  • [1] Border gateway protocol graph: Detecting and visualising Internet routing anomalies
    Papadopoulos, Stavros
    Moustakas, Konstantinos
    Drosou, Anastasios
    Tzovaras, Dimitrios
    IET Information Security, 2016, 10 (03): : 125 - 133
  • [2] Interdomain routing and the border gateway protocol
    Bonaventure, O
    Feldmann, A
    Gao, LX
    Griffin, T
    Mao, ZM
    IEEE NETWORK, 2005, 19 (06): : 3 - 4
  • [3] Securing the border gateway routing protocol
    Smith, BR
    GarciaLunaAceves, JJ
    IEEE GLOBECOM 1996 - GLOBAL INTERNET'96, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 81 - 85
  • [4] Border gateway protocol extensions for quality of service routing
    Yoo, Y
    Ahn, S
    Cho, K
    Kim, T
    Kim, CS
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 464 - 470
  • [5] Efficient security mechanisms for the border gateway routing protocol
    Smith, BR
    Garcia-Luna-Aceves, JJ
    COMPUTER COMMUNICATIONS, 1998, 21 (03) : 203 - 210
  • [6] SpamDetector: Detecting spam callers in Voice over Internet Protocol with graph anomalies
    Swarnkar, Mayank
    Hubballi, Neminath
    SECURITY AND PRIVACY, 2019, 2 (01):
  • [7] Detecting and analyzing border gateway protocol blackholing activity
    Farasat, Talaya
    Khan, Akmal
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (04)
  • [8] Optimal detection of border gateway protocol anomalies with extensive feature set
    Sunita, M.
    Mallapur, Sujata V.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 50893 - 50919
  • [9] Optimal detection of border gateway protocol anomalies with extensive feature set
    M. Sunita
    Sujata V. Mallapur
    Multimedia Tools and Applications, 2024, 83 : 50893 - 50919
  • [10] An improved energy efficient quality of service routing for border gateway protocol
    Shukla, Shipra
    Kumar, Mahesh
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 520 - 535