HEAP: Reliable Assessment of BGP Hijacking Attacks

被引:29
|
作者
Schlamp, Johann [1 ]
Holz, Ralph [2 ,3 ]
Jacquemart, Quentin [4 ,5 ]
Carle, Georg [1 ]
Biersack, Ernst W. [4 ,6 ]
机构
[1] Tech Univ Munich, D-85748 Garching, Germany
[2] CSIRO, Data61, Eveleigh, NSW 2015, Australia
[3] Univ Sydney, Sydney, NSW 2006, Australia
[4] Eurecom, F-06904 Sophia Antipolis, France
[5] Univ Nice Sophia Antipolis, F-06000 Nice, France
[6] Caipy, F-06560 Valbonne, France
关键词
BGP hijacking; IRR analysis; SSL/TLS measurements; routing model;
D O I
10.1109/JSAC.2016.2558978
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The detection of BGP prefix hijacking attacks has been the focus of research for more than a decade. However, the state-of-the-art techniques fall short of detecting more elaborate types of attack. To study such attacks, we devise a novel formalization of Internet routing, and apply this model to routing anomalies in order to establish a comprehensive attacker model. We use this model to precisely classify attacks and to evaluate their impact and detectability. We analyze the eligibility of attack tactics that suit an attacker's goals and demonstrate that related work mostly focuses on less impactful kinds of attacks. We further propose, implement, and test the Hijacking Event Analysis Program (HEAP), a new approach to investigate hijacking alarms. Our approach is designed to seamlessly integrate with the previous work in order to reduce the high rates of false alarms inherent to these techniques. We leverage several unique data sources that can reliably disprove malicious intent. First, we make use of an Internet routing registry to derive business or organizational relationships between the parties involved in an event. Second, we use a topology-based reasoning algorithm to rule out events caused by legitimate operational practice. Finally, we use Internet-wide network scans to identify SSL/TLS-enabled hosts, which helps to identify non-malicious events by comparing public keys prior to and during an event. In our evaluation, we prove the effectiveness of our approach, and show that day-today routing anomalies are harmless for the most part. More importantly, we use HEAP to assess the validity of publicly reported alarms. We invite researchers to interface with HEAP in order to crosscheck and narrow down their hijacking alerts.
引用
收藏
页码:1849 / 1861
页数:13
相关论文
共 50 条
  • [1] "BGP-Hijacking" Attacks: Theoretical Basis and Practical Scenarios
    Rashevskiy, Roman B.
    Shaburov, Andrey S.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 208 - 212
  • [2] BGP hijacking classification
    Cho, Shinyoung
    Fontugne, Romain
    Cho, Kenjiro
    Dainotti, Alberto
    Gill, Phillipa
    PROCEEDINGS OF THE 3RD NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA 2019), 2019, : 25 - 32
  • [3] Estimating the impact of BGP prefix hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    arXiv, 2021,
  • [4] Detection of BGP Hijacking based on AS Hegemony
    Nakashima, Kenta
    Harayama, Michiko
    Mishima, Miwako
    2024 International Conference on Electronics, Information, and Communication, ICEIC 2024, 2024,
  • [5] Estimating the Impact of BGP Prefix Hijacking
    Aristotle University of Thessaloniki, Greece
    不详
    不详
    IFIP Netw. Conf., IFIP Netw., 2021,
  • [6] Estimating the Impact of BGP Prefix Hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,
  • [7] Computational Complexity of Traffic Hijacking under BGP and S-BGP
    Chiesa, Marco
    Di Battista, Giuseppe
    Erlebach, Thomas
    Patrignani, Maurizio
    AUTOMATA, LANGUAGES, AND PROGRAMMING, ICALP 2012, PT II, 2012, 7392 : 476 - 487
  • [8] Computational complexity of traffic hijacking under BGP and S-BGP
    Chiesa, Marco
    Di Battista, Giuseppe
    Erlebach, Thomas
    Patrignani, Maurizio
    THEORETICAL COMPUTER SCIENCE, 2015, 600 : 143 - 154
  • [9] ARTEMIS: Neutralizing BGP Hijacking Within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (06) : 2471 - 2486
  • [10] ARTEMIS: Neutralizing BGP Hijacking within a Minute
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Gigis, Petros
    Dimitropoulos, Xenofontas
    Cicalese, Danilo
    King, Alistair
    Dainotti, Alberto
    PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 6 - 6