Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph

verfasst von : Paulo Salvador

Erschienen in: E-Business and Telecommunications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet routing relies completely on the Border Gateway Protocol (BGP) which is inherently insecure and allow the deployment of route hijacking attacks. The client side detection of such type of attacks can be achieved by detecting Round Trip Time (RTT) deviations from multiple points on the Internet to the target network. However, the localization of the autonomous systems where the attack originates can only be performed with an underlying realistic and precise model of the Internet interconnections. A usable and useful realistic Internet interconnections model does not exist. The existing interconnection models are to simplistic to be applicable in real scenarios and/or incorporate to much uncorrelated information that cannot be used due to its complexity.
This work presents a client side methodology to locate the source of BGP hijack attacks based on a quasi-realist graph that models the Internet as an all. The construction of such graph builds upon all known Internet exchange points (IX) and landing points of all known submarine cables. The lack of information about interconnections between Internet exchangers (IX) nodes and landing points is extrapolated from simple rules that take in consideration Earth geographic characteristics. This approach results in a graph that includes all major corner stones of the Internet while maintaining a simple structure. This underlying quasi-realist graph model of the Internet will allow the search for IX nodes where a false route could be injected to create a similar RTT anomaly observed during an attack.
With very simplistic assumptions as similar node, link loads and symmetric routing by the shortest path, and calibration using a relatively small set of world-scale measurements, the proof-of-concept results show that the model allows to locate the source of routing hijack attacks within a reasonable degree of efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pilosov, A., Kapela, T.: Stealing the internet - an internet-scale man in the middle attack. In: DEFCON 2016, August 2008 Pilosov, A., Kapela, T.: Stealing the internet - an internet-scale man in the middle attack. In: DEFCON 2016, August 2008
5.
Zurück zum Zitat Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: detecting IP prefix hijacking on my own. IEEE/ACM Trans. Netw. 18(6), 1815–1828 (2010)CrossRef Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: detecting IP prefix hijacking on my own. IEEE/ACM Trans. Netw. 18(6), 1815–1828 (2010)CrossRef
6.
Zurück zum Zitat Liu, Y., Luo, X., Chang, R., Su, J.: Characterizing inter-domain rerouting by betweenness centrality after disruptive events. IEEE J. Sel. Areas Commun. 31(6), 1147–1157 (2013)CrossRef Liu, Y., Luo, X., Chang, R., Su, J.: Characterizing inter-domain rerouting by betweenness centrality after disruptive events. IEEE J. Sel. Areas Commun. 31(6), 1147–1157 (2013)CrossRef
7.
Zurück zum Zitat Salvador, P., Nogueira, A.: Customer-side detection of internet-scale traffic redirection. In: 16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014), September 2014 Salvador, P., Nogueira, A.: Customer-side detection of internet-scale traffic redirection. In: 16th International Telecommunications Network Strategy and Planning Symposium (NETWORKS 2014), September 2014
8.
Zurück zum Zitat Silva, M., Nogueira, A., Salvador, P.: Modular platform for customer-side detection of BGP redirection attacks. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 199–206. INSTICC, SciTePress (2018) Silva, M., Nogueira, A., Salvador, P.: Modular platform for customer-side detection of BGP redirection attacks. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 199–206. INSTICC, SciTePress (2018)
9.
Zurück zum Zitat Salvador, P.: A quasi-realistic internet graph. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), pp. 27–32 (2017) Salvador, P.: A quasi-realistic internet graph. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), pp. 27–32 (2017)
11.
Zurück zum Zitat Schlamp, J., Holz, R., Jacquemart, Q., Carle, G., Biersack, E.W.: HEAP: reliable assessment of BGP hijacking attacks. IEEE J. Sel. Areas Commun. 34(6), 1849–1861 (2016)CrossRef Schlamp, J., Holz, R., Jacquemart, Q., Carle, G., Biersack, E.W.: HEAP: reliable assessment of BGP hijacking attacks. IEEE J. Sel. Areas Commun. 34(6), 1849–1861 (2016)CrossRef
12.
Zurück zum Zitat Kasiviswanathan, S.P., Eidenbenz, S., Yan, G.: Geography-based analysis of the internet infrastructure. In: 2011 Proceedings IEEE INFOCOM, pp. 131–135, April 2011 Kasiviswanathan, S.P., Eidenbenz, S., Yan, G.: Geography-based analysis of the internet infrastructure. In: 2011 Proceedings IEEE INFOCOM, pp. 131–135, April 2011
13.
Zurück zum Zitat Mátray, P., Hága, P., Laki, S., Csabai, I., Vattay, G.: On the network geography of the internet. In: 2011 Proceedings IEEE INFOCOM, pp. 126–130, April 2011 Mátray, P., Hága, P., Laki, S., Csabai, I., Vattay, G.: On the network geography of the internet. In: 2011 Proceedings IEEE INFOCOM, pp. 126–130, April 2011
14.
Zurück zum Zitat Landa, R., Araújo, J.T., Clegg, R.G., Mykoniati, E., Griffin, D., Rio, M.: The large-scale geography of internet round trip times. In: 2013 IFIP Networking Conference, pp. 1–9, May 2013 Landa, R., Araújo, J.T., Clegg, R.G., Mykoniati, E., Griffin, D., Rio, M.: The large-scale geography of internet round trip times. In: 2013 IFIP Networking Conference, pp. 1–9, May 2013
15.
17.
Zurück zum Zitat Alexander, J.: Loxodromes: A rhumb way to go. Mathematics Magazine 77, December 2004 Alexander, J.: Loxodromes: A rhumb way to go. Mathematics Magazine 77, December 2004
Metadaten
Titel
Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph
verfasst von
Paulo Salvador
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-11039-0_1