Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2019 Network Traffic Measurement and Analysis Conference (TMA) 2019
DOI: 10.23919/tma.2019.8784511
|View full text |Cite
|
Sign up to set email alerts
|

BGP hijacking classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 51 publications
(19 citation statements)
references
References 27 publications
0
18
0
1
Order By: Relevance
“…We complement the set of malicious ASes compiled through the honeypot data with AS reputation lists which are developed by monitoring the BGP routing system to detect ASes with consistent patterns of malicious routing, such as traffic misdirection. We use the list produced by Testart et al [58], which we further extend with examples of bulletproof hosters and hijackers reported by [25,14] resulting in a list of 922 malicious ASes.…”
Section: As Reputation Lists Based On Bgp Misbehaviormentioning
confidence: 99%
“…We complement the set of malicious ASes compiled through the honeypot data with AS reputation lists which are developed by monitoring the BGP routing system to detect ASes with consistent patterns of malicious routing, such as traffic misdirection. We use the list produced by Testart et al [58], which we further extend with examples of bulletproof hosters and hijackers reported by [25,14] resulting in a list of 922 malicious ASes.…”
Section: As Reputation Lists Based On Bgp Misbehaviormentioning
confidence: 99%
“…The prefix originations by these single digit ASes are likely mere results of misconfigurations, where an origin network accidentally adds an additional AS number (behind its own) to its BGP advertisements. These so-called "fat finger errors" [15] commonly occur when configuring a router to perform AS path prepending, a traffic engineering technique that artificially lengthens the AS path in order to make the advertised path less desirable in the BGP decision process [44]. A notable example of an AS flagged by our classifier is AS5, an AS whose registered company went out of business 20 years ago, periodically revived through router misconfiguration.…”
Section: Indications Of Misconfigurationmentioning
confidence: 99%
“…• MOAS (Multiple Origin AS) conflict [20]. It means that a prefix matches the behavior of multiple origin ASs.…”
Section: B Prefix Hijacking Detection Technologymentioning
confidence: 99%