Skip to main content

2017 | OriginalPaper | Buchkapitel

B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths

verfasst von : A. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, R. K. Manu, P. Hrudya

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

BGP (Border Gateway Protocol) is one of the core internet backbone protocols, which were designed to address the large-scale routing among the ASes (Autonomous System) in order to ensure the reachability among them. However, an attacker can inject update messages into the BGP communication from the peering BGP routers and those routing information will be propagated across the global BGP routers. This could cause disruptions in the normal routing behavior. Specially crafted BGP messages can reroute the traffic path from a source ASN to a specific destination ASN via another path and this attack is termed as AS Path Hijacking. This research work is focused on the detection of suspicious deviation in the AS path between a source and destination ASNs, by analyzing the BGP update messages that are collected by passive peering to the BGP routers. The research mainly focuses on identifying the AS Path Hijacking by quantifying: (1). How far the deviation occurred for a given AS Path and (2). How much credible is the deviated AS path. We propose a novel approach to calculate the deviation occurred by employing weighted edit distance algorithm. A probability score using n-gram frequency is used to determine credibility of the path. Both the scores are correlated together to determine whether a given AS Path is suspicious or not. The experimental results show that our approach is capable of identifying AS path hijacks with low false positives.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Faloutsos, Michalis, Petros Faloutsos, and Christos Faloutsos. “On power-law relationships of the internet topology.” ACM SIGCOMM computer communication review. Vol. 29. No. 4. ACM, 1999. Faloutsos, Michalis, Petros Faloutsos, and Christos Faloutsos. “On power-law relationships of the internet topology.” ACM SIGCOMM computer communication review. Vol. 29. No. 4. ACM, 1999.
2.
Zurück zum Zitat Fuller, V., and T. Li. “IETF RFC 4632-Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan. Online document. Updated in August 2006. Cited on 7.8. 2010.” Fuller, V., and T. Li. “IETF RFC 4632-Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan. Online document. Updated in August 2006. Cited on 7.8. 2010.”
3.
Zurück zum Zitat Butler, Kevin RB, et al. “A Survey of BGP Security Issues and Solutions. ”Proceedings of the IEEE 98.1 (2010): 100–122. Butler, Kevin RB, et al. “A Survey of BGP Security Issues and Solutions. ”Proceedings of the IEEE 98.1 (2010): 100–122.
5.
Zurück zum Zitat Pilosov, Alex, and Tony Kapela. “Stealing the Internet: An Internet-scale man in the middle attack.” NANOG-44, Los Angeles, October (2008): 12–15. Pilosov, Alex, and Tony Kapela. “Stealing the Internet: An Internet-scale man in the middle attack.” NANOG-44, Los Angeles, October (2008): 12–15.
6.
Zurück zum Zitat Turk, D. “Configuring BGP to block Denial-of-Service attacks.” (2004). Turk, D. “Configuring BGP to block Denial-of-Service attacks.” (2004).
9.
Zurück zum Zitat Zheng, Changxi, et al. “A light-weight distributed scheme for detecting IP prefix hijacks in real-time.” ACM SIGCOMM Computer Communication Review. Vol. 37. No. 4. ACM, 2007. Zheng, Changxi, et al. “A light-weight distributed scheme for detecting IP prefix hijacks in real-time.” ACM SIGCOMM Computer Communication Review. Vol. 37. No. 4. ACM, 2007.
10.
Zurück zum Zitat Jian Chang, Krishna K. Venkatasubramanian, Andrew G.West, Sampath Kannan, Insup Lee, Boon Thau Loo and Oleg Sokolsky, “AS-CRED: Reputation and Alert Service for Interdomain Routing”. Jian Chang, Krishna K. Venkatasubramanian, Andrew G.West, Sampath Kannan, Insup Lee, Boon Thau Loo and Oleg Sokolsky, “AS-CRED: Reputation and Alert Service for Interdomain Routing”.
11.
Zurück zum Zitat Zhang, Jian, Jennifer Rexford, and Joan Feigenbaum. “Learning-based anomaly detection in BGP updates.” Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data. ACM, 2005. Zhang, Jian, Jennifer Rexford, and Joan Feigenbaum. “Learning-based anomaly detection in BGP updates.” Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data. ACM, 2005.
12.
Zurück zum Zitat Gersch, Joseph E. ROVER: A DNS-based method to detect and prevent IP hijacks. Diss. Colorado State University, 2013. Gersch, Joseph E. ROVER: A DNS-based method to detect and prevent IP hijacks. Diss. Colorado State University, 2013.
13.
Zurück zum Zitat Shue, Craig A., Andrew J. Kalafut, and Minaxi Gupta. “Abnormally malicious autonomous systems and their internet connectivity.” IEEE/ACM Transactions on Networking (TON) 20.1 (2012): 220–230. Shue, Craig A., Andrew J. Kalafut, and Minaxi Gupta. “Abnormally malicious autonomous systems and their internet connectivity.” IEEE/ACM Transactions on Networking (TON) 20.1 (2012): 220–230.
14.
Zurück zum Zitat Deshpande, Shivani, et al. “An online mechanism for BGP instability detection and analysis.” Computers, IEEE Transactions on 58.11 (2009): 1470–1484. Deshpande, Shivani, et al. “An online mechanism for BGP instability detection and analysis.” Computers, IEEE Transactions on 58.11 (2009): 1470–1484.
Metadaten
Titel
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
verfasst von
A. U. Prem Sankar
Prabaharan Poornachandran
Aravind Ashok
R. K. Manu
P. Hrudya
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_76

Premium Partner