ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning

被引:7
作者
Dong, Yutao [1 ,2 ]
Li, Qing [2 ]
Sinnott, Richard O. [3 ]
Jiang, Yong [1 ,2 ]
Xia, Shutao [1 ,2 ]
机构
[1] Tsinghua Univ, Tsinghua Shenzhen Int Grad Sch, Beijing, Peoples R China
[2] Peng Cheng Lab PCL, Shenzhen, Peoples R China
[3] Univ Melbourne, Melbourne, Vic, Australia
来源
2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021) | 2021年
基金
中国国家自然科学基金;
关键词
BGP; Anomaly Detection; Self-operated; Weakly Supervised Learning;
D O I
10.1109/ICNP52444.2021.9651957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable protocol in the network. However, the lack of routing authentication and validation makes it vulnerable to attacks, including routing leaks, route hijacking, prefix hijacking, etc. Therefore, in this paper we propose a generalized framework for ISP self-operated BGP anomaly detection based on weakly supervised learning. To tackle the problem of insufficient data in BGP anomaly detection, we propose an approach to learn from the other anomaly detection systems through knowledge distillation. To reduce the impact of inaccurate supervision, we design a self-attention-based Long Short-Term Memory (LSTM) model to self-adaptively mine the differences between BGP anomaly categories, including both feature and time dimensions. Finally, we implement a system and demonstrate the performance through a set of comprehensive experiments. Compared with the state-of-the-art schemes, our scheme has better generalization on various anomaly types.
引用
收藏
页数:11
相关论文
共 41 条
[1]   BGP Anomaly Detection Techniques: A Survey [J].
Al-Musawi, Bahaa ;
Branch, Philip ;
Armitage, Grenville .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :377-396
[2]  
Allahdadi A., 2017, ARXIV PREPRINT ARXIV, P1
[3]  
[Anonymous], 2016, P 2016 INTERNET MEAS, DOI DOI 10.1145/2987443.2987482
[4]  
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[5]   SICO: Surgical Interception Attacks by Manipulating BGP Communities [J].
Birge-Lee, Henry ;
Wang, Liang ;
Rexford, Jennifer ;
Mittal, Prateek .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :431-448
[6]  
Bush Randy, 2013, RFC 6810
[7]   A Measurement Study on the Distribution Disparity of BGP Instabilities [J].
Chen, Meng ;
Xu, Mingwei ;
Yang, Yuan ;
Li, Qing .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :19-27
[8]   Measurement of large-scale BGP events: Definition, detection, and analysis [J].
Chen, Meng ;
Xu, Mingwei ;
Li, Qing ;
Yang, Yuan .
COMPUTER NETWORKS, 2016, 110 :31-45
[9]  
Chen MC, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATICS, MANAGEMENT ENGINEERING AND INDUSTRIAL APPLICATION (IMEIA 2016), P1, DOI 10.1109/PLASMA.2016.7534032
[10]  
Cheng M., 2018, IEEE T SERV COMPUT