2014 6th International Conference on Cyber Conflict (CyCon 2014) 2014
DOI: 10.1109/cycon.2014.6916405
|View full text |Cite
|
Sign up to set email alerts
|

Inter-AS routing anomalies: Improved detection and classification

Abstract: Based on the interconnection of currently about 45.000 Autonomous Systems (ASs) the Internet and its routing system in particular is highly fragile. To exchange inter-AS routing information, the Border Gateway Protocol (BGP) is used since the very beginning, and will be used for the next years, even with IPv6. BGP has many weaknesses by design, of which the implicit trust of ASs to each other AS is the most threatening one. Although this has been topic on network security research for more than a decade, the p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…These groups were collected with an average duration of 3 days per group. During these periods many changes in BGP behavior, such as BGP hijacking [13], worm attack [14], and link failures [15], are detected. The collected groups contain the following: the peak day of an anomaly, one day prior, and one day after the anomaly.…”
Section: Bgp Data and Methodologymentioning
confidence: 99%
“…These groups were collected with an average duration of 3 days per group. During these periods many changes in BGP behavior, such as BGP hijacking [13], worm attack [14], and link failures [15], are detected. The collected groups contain the following: the peak day of an anomaly, one day prior, and one day after the anomaly.…”
Section: Bgp Data and Methodologymentioning
confidence: 99%
“…BGP anomaly refers to harmful changes of BGP behavior that may cause thousands of anomalous BGP updates. A single BGP update is classified as an anomaly if it contains an invalid AS number, invalid or reserved IP prefixes, AS-PATH without a physical equivalent, etc [12]. In addition, a set of BGP updates can also be classified as an anomaly if the characteristics show a rapid change in the number of BGP updates, or contain longest and shortest paths, etc [13].…”
Section: Bgp Anomaly Detectionmentioning
confidence: 99%
“…Anomalies are discrepancies or outliers that do not follow the desired pattern. An anomaly, in BGP, is generated from an update message if even one of the given circumstances is encountered -An Autonomous System number being used is invalid, or one or more IP prefixes being used are reserved or invalid, or the originating AS does not own the IP prefix being used, or two or more Autonomous Systems have announced the same IP prefix or the suggested route has no substantial equal, or the suggested route does not agree with regular routing decisions [3].…”
Section: Introductionmentioning
confidence: 99%