Using bursty announcements for detecting BGP routing anomalies

被引:14
作者
Moriano, Pablo [1 ]
Hill, Raquel [2 ]
Camp, L. Jean [3 ]
机构
[1] Oak Ridge Natl Lab, Comp Sci & Math Div, Oak Ridge, TN 37830 USA
[2] Spelman Coll, Comp & Informat Sci Dept, Atlanta, GA 30314 USA
[3] Indiana Univ, Luddy Sch Informat Comp & Engn, Bloomington, IN 47408 USA
关键词
Border Gateway Protocol (BGP); Internet measurements; Prefix hijacking; Time series analysis; Anomaly detection; Burstiness; PREFIX HIJACKING; BURSTINESS; LONG;
D O I
10.1016/j.comnet.2021.107835
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend to occur in groups of relatively high frequency, followed by periods of infrequent activity. We hypothesize that we may use these bursty characteristics to detect anomalous routing incidents. In this work, we use manually verified ground truth metadata and volume of announcements as a baseline measure, and propose a burstiness measure that detects prior anomalous incidents with high recall and better precision than the volume baseline. We quantify the burstiness of inter-arrival times around the date and times of four large-scale incidents: the Indosat hijacking event in April 2014, the Telecom Malaysia leak in June 2015, the Bharti Airtel Ltd. hijack in November 2015, and the MainOne leak in November 2018; and three smaller scale incidents that led to traffic interception: the Belarusian traffic direction in February 2013, the Icelandic traffic direction in July 2013, and the Russian telecom that hijacked financial services in April 2017. Our method leverages the burstiness of disruptive update messages to detect these incidents. We describe limitations, open challenges, and how this method can be used for routing anomaly detection.
引用
收藏
页数:14
相关论文
共 86 条
  • [1] BGP Anomaly Detection Techniques: A Survey
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 377 - 396
  • [2] [Anonymous], 2006, 6 ACM SIGCOMM C INTE, DOI DOI 10.1145/1177080.1177099
  • [3] Long short-term memory
    Hochreiter, S
    Schmidhuber, J
    [J]. NEURAL COMPUTATION, 1997, 9 (08) : 1735 - 1780
  • [4] Arnbak A., 2015, Mich. Telecommun. Technol. Law Rev, V21, P317
  • [5] Ars Technica, 2019, BIZ IT INFORM TEHCNO
  • [6] A study of prefix hijacking and interception in the Internet
    Ballani, Hitesh
    Francis, Paul
    Zhang, Xinyang
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 265 - 276
  • [7] The origin of bursts and heavy tails in human dynamics
    Barabási, AL
    [J]. NATURE, 2005, 435 (7039) : 207 - 211
  • [8] BGPMon, 2019, BGPMON BLOG
  • [9] Blogs Dyn Guest, 2013, NEW THREAT TARGETED
  • [10] Butler K, 2010, P IEEE, V98, P100, DOI 10.1109/JPROC.2009.2034031