2016
DOI: 10.1109/jsac.2016.2558978
|View full text |Cite
|
Sign up to set email alerts
|

HEAP: Reliable Assessment of BGP Hijacking Attacks

Abstract: The detection of BGP prefix hijacking attacks has been the focus of research for more than a decade. However, stateof-the-art techniques fall short of detecting more elaborate types of attack. To study such attacks, we devise a novel formalization of Internet routing, and apply this model to routing anomalies in order to establish a comprehensive attacker model. We use this model to precisely classify attacks and to evaluate their impact and detectability. We analyze the eligibility of attack tactics that suit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…Though hijack attacks can be effective for many adversarial objectives (e.g., setting up phishing websites and spoofing DNS responses [49]), they disrupt connectivity for hosts in the victim's network. In contrast, interception attacks preserve connectivity in the data plane, making them much harder to detect than hijack attacks (as seen in [77,86], data-plane connectivity is a common method for detecting hijack attacks).…”
Section: Bgp Interception Attacksmentioning
confidence: 99%
“…Though hijack attacks can be effective for many adversarial objectives (e.g., setting up phishing websites and spoofing DNS responses [49]), they disrupt connectivity for hosts in the victim's network. In contrast, interception attacks preserve connectivity in the data plane, making them much harder to detect than hijack attacks (as seen in [77,86], data-plane connectivity is a common method for detecting hijack attacks).…”
Section: Bgp Interception Attacksmentioning
confidence: 99%
“…The effect of a hijack is to redirect traffic for the affected prefix to/through the network of the hijacker AS. This attracted traffic can be (i) dropped (blackholing, BH), (ii) manipulated or eavesdropped and then sent on to the victim AS1 (manin-the-middle, MM), or (iii) used in an impersonation of the [25] (2006) [40] (2008) [68] (2007) [69] (2016) [59] (2012) [63] (2007) [36]…”
Section: Classification By Data-plane Traffic Manipulationmentioning
confidence: 99%
“…Reactive defenses comprise two steps: detection and mitigation. Several systems have been proposed for prefix hijacking detection [25], [36], [40], [59], [63], [68], [69], with most of them being designed to operate as third-party services; they monitor the Internet control/data plane and upon the detection of a suspicious event or anomaly, notify the involved ASes. Our survey reveals a similar trend in practice: more than 60% rely on third-parties (e.g., [8]) to get notified about suspicious events involving their prefixes.…”
Section: Real-world Problems With Bgp Hijackingmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, BGP hijacks are a prevalent threat and concern for network operators [48]. There have been many efforts in the research community to characterize BGP hijacking events [28,56] and to develop hijack detection systems using different approaches, metrics, and vantage points [22,27,42,43,46,49,50,57]. While most systems focus on detecting individual BGP hijacking events, some attempt to identify the source of the cause and a few even tackle mitigation and remediation [7].…”
Section: Related Workmentioning
confidence: 99%