HEAP: Reliable Assessment of BGP Hijacking Attacks

被引:29
|
作者
Schlamp, Johann [1 ]
Holz, Ralph [2 ,3 ]
Jacquemart, Quentin [4 ,5 ]
Carle, Georg [1 ]
Biersack, Ernst W. [4 ,6 ]
机构
[1] Tech Univ Munich, D-85748 Garching, Germany
[2] CSIRO, Data61, Eveleigh, NSW 2015, Australia
[3] Univ Sydney, Sydney, NSW 2006, Australia
[4] Eurecom, F-06904 Sophia Antipolis, France
[5] Univ Nice Sophia Antipolis, F-06000 Nice, France
[6] Caipy, F-06560 Valbonne, France
关键词
BGP hijacking; IRR analysis; SSL/TLS measurements; routing model;
D O I
10.1109/JSAC.2016.2558978
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The detection of BGP prefix hijacking attacks has been the focus of research for more than a decade. However, the state-of-the-art techniques fall short of detecting more elaborate types of attack. To study such attacks, we devise a novel formalization of Internet routing, and apply this model to routing anomalies in order to establish a comprehensive attacker model. We use this model to precisely classify attacks and to evaluate their impact and detectability. We analyze the eligibility of attack tactics that suit an attacker's goals and demonstrate that related work mostly focuses on less impactful kinds of attacks. We further propose, implement, and test the Hijacking Event Analysis Program (HEAP), a new approach to investigate hijacking alarms. Our approach is designed to seamlessly integrate with the previous work in order to reduce the high rates of false alarms inherent to these techniques. We leverage several unique data sources that can reliably disprove malicious intent. First, we make use of an Internet routing registry to derive business or organizational relationships between the parties involved in an event. Second, we use a topology-based reasoning algorithm to rule out events caused by legitimate operational practice. Finally, we use Internet-wide network scans to identify SSL/TLS-enabled hosts, which helps to identify non-malicious events by comparing public keys prior to and during an event. In our evaluation, we prove the effectiveness of our approach, and show that day-today routing anomalies are harmless for the most part. More importantly, we use HEAP to assess the validity of publicly reported alarms. We invite researchers to interface with HEAP in order to crosscheck and narrow down their hijacking alerts.
引用
收藏
页码:1849 / 1861
页数:13
相关论文
共 50 条
  • [21] ROV++: Improved Deployable Defense against BGP Hijacking
    Morillo, Reynaldo
    Furuness, Justin
    Morris, Cameron
    Breslin, James
    Herzberg, Amir
    Wang, Bing
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [22] Understanding the impact of outsourcing mitigation against BGP prefix hijacking
    Zeng, Man
    Huang, Xiaohong
    Zhang, Pei
    Li, Dandan
    COMPUTER NETWORKS, 2022, 202
  • [23] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change
    Liu, Yujing
    Su, Jinshu
    Chang, Rocky K. C.
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203
  • [24] Origin authentication scheme against BGP address prefix hijacking
    Liu, Z.-H. (kevin2296@gmail.com), 1908, Chinese Academy of Sciences (23):
  • [25] Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
    Apostolaki, Maria
    Zohar, Aviv
    Vanbever, Laurent
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 375 - 392
  • [26] Detecting selective dropping attacks in BGP
    Chuah, M.
    Huang, K.
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 959 - +
  • [27] BGP Attacks and Countermeasures in Heterogeneous Networks
    Luo, Yun-Fang
    Hu, Rui-Min
    Yang, Yu-Hong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2334 - +
  • [28] A Taxonomy of Attacks Using BGP Blackholing
    Miller, Loic
    Pelsser, Cristel
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
  • [29] Whom to Convince? It Really Matters in BGP Prefix Hijacking Attack and Defense
    Liu, Yujing
    Dai, Bin
    Zhu, Peidong
    Su, Jinshu
    FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 1 - 10
  • [30] RandHeap: Heap Randomization for mitigating Heap Spray Attacks in Virtual Machines
    Jangda, Abhinav
    Mishra, Mohit
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 169 - 178