2007
DOI: 10.1145/1282427.1282412
|View full text |Cite
|
Sign up to set email alerts
|

A light-weight distributed scheme for detecting ip prefix hijacks in real-time

Abstract: As more and more Internet IP prefix hijacking incidents are being reported, the value of hijacking detection services has become evident. Most of the current hijacking detection approaches monitor IP prefixes on the control plane and detect inconsistencies in route advertisements and route qualities. We propose a different approach that utilizes information collected mostly from the data plane. Our method is motivated by two key observations: when a prefix is not hijacked, 1) the hop count of the path from a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 67 publications
(61 citation statements)
references
References 23 publications
0
61
0
Order By: Relevance
“…Both active traceroute-based anomaly detection techniques [15], [30] and passive RTT-based anomaly detection techniques [14] have been proposed. While we will focus on the use of passive measurements, we note that the approaches in general are fairly similar.…”
Section: E Route Anomaly Detection Using Passive Measurementsmentioning
confidence: 99%
See 3 more Smart Citations
“…Both active traceroute-based anomaly detection techniques [15], [30] and passive RTT-based anomaly detection techniques [14] have been proposed. While we will focus on the use of passive measurements, we note that the approaches in general are fairly similar.…”
Section: E Route Anomaly Detection Using Passive Measurementsmentioning
confidence: 99%
“…While we will focus on the use of passive measurements, we note that the approaches in general are fairly similar. For example, Zheng et al [30] use changes in the number of hops in the traceroute paths to identify potential hijacks, while Hiran et al [14] use changes in the RTTs to identify potential anomalies.…”
Section: E Route Anomaly Detection Using Passive Measurementsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hu et al have begun studying data plane route verification [28,47] by measuring destination characteristics such as the destination host OS, IP identifier probing, and TCP timestamps. Such techniques could be used to reduce the number of false positives in PGBGP.…”
Section: Insecure Data Planementioning
confidence: 99%