2012
DOI: 10.1109/mnet.2012.6375891
|View full text |Cite
|
Sign up to set email alerts
|

Visual analytics for BGP monitoring and prefix hijacking identification

Abstract: Abstract-The control plane of the Internet relies entirely on BGP as inter-domain routing protocol to maintain and exchange routing information between large network providers and their customers. However, an intrinsic vulnerability of the protocol is its inability to validate the integrity and correctness of routing information exchanged between peer routers. As a result, it is relatively easy for people with malicious intent to steal legitimate IP blocks through an attack known as prefix hijacking, which ess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 12 publications
(12 reference statements)
0
9
0
Order By: Relevance
“…Additionally, they provide an overall domain characterization including challenges, data sources and users. [14,41,50,64,71,73,80], that not only considers the visualization techniques employed, but also lower-level visualization features, interaction methods, and use cases [5]. Additionally, they distinguish between BGP visualizations that are high-level, or overview, lower-level, or local view, and multi-view.…”
Section: Related Surveys and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, they provide an overall domain characterization including challenges, data sources and users. [14,41,50,64,71,73,80], that not only considers the visualization techniques employed, but also lower-level visualization features, interaction methods, and use cases [5]. Additionally, they distinguish between BGP visualizations that are high-level, or overview, lower-level, or local view, and multi-view.…”
Section: Related Surveys and Motivationmentioning
confidence: 99%
“…Finally, Youn et al presented a study on BGP visualization tools focused on cyber situational awareness [82]. Their survey canvassed 10 tools, seven of which appear in our study: [5,9,64,67,68,73,76], and give more specifics on the visualization techniques employed, core functions, level of detail and use cases. However, they do not consider the specific attacks used to validate the tools or attempt to map the visualization techniques to the attack types.…”
Section: Related Surveys and Motivationmentioning
confidence: 99%
“…This tool highlights aspects of BGP data that have received less attention in previous visualization applications to help form a complete picture of an important part of the Internet communications infrastructure. Ernst Biersack et al(2012) [9] proposed the VIS-SENSE model for analysts to detect abnormal routing patterns in vast amounts of BGP data through network visualization. We emphasized how to visualize BGP monitoring to identify prefix hijacking attacks through malicious intent.…”
Section: Related Work 21 Cyber Situation Awareness (Cyber Sa) Overviewsmentioning
confidence: 99%
“…Management of worldwide Internet traffic is administered by tens of thousands of independent routing domain systems called autonomous systems (AS) (Biersack et al, 2012). An AS can be owned by network operators such as Internet Service Providers (ISPs).…”
Section: Border Gateway Protocolmentioning
confidence: 99%