[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Survey among Network Operators on BGP Prefix Hijacking

Published: 27 April 2018 Publication History

Abstract

BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or modifications to BGP that protect the Internet against it have been proposed. However, the reality is that most operators have not deployed them and are reluctant to do so in the near future. Instead, they rely on basic - and often inefficient - proactive defenses to reduce the impact of hijacking events, or on detection based on third party services and reactive approaches that might take up to several hours. In this work, we present the results of a survey we conducted among 75 network operators to study: (a) the operators' awareness of BGP prefix hijacking attacks, (b) presently used defenses (if any) against BGP prefix hijacking, (c) the willingness to adopt new defense mechanisms, and (d) reasons that may hinder the deployment of BGP prefix hijacking defenses. We expect the findings of this survey to increase the understanding of existing BGP hijacking defenses and the needs of network operators, as well as contribute towards designing new defense mechanisms that satisfy the requirements of the operators.

Supplementary Material

acmdl18-187/supplements/submitted__supplementary_material.pdf (submitted__supplementary_material.pdf)
Supplementary document (submitted__supplementary_material.pdf)

References

[1]
https://www.ripe.net/publications/news/industry-developments/youtube-hijacking-a-ripe-ncc-ris-case-study.
[2]
http://www.bgpmon.net/chinese-isp-hijacked-10-of-the-internet/.
[3]
https://www.wired.com/2014/08/isp-bitcoin-theft/.
[4]
http://seclists.org/nanog/2016/Sep/122.
[5]
http://dyn.com/blog/iran-leaks-censorship-via-bgp-hijacks/.
[6]
https://arstechnica.com/security/2017/04/russian-controlled-telecom-hijacks-financial-services-internet-traffic/.
[7]
https://bgpmon.net/bgp-leak-causing-internet-outages-in-japan-and-beyond/.
[8]
https://bgpmon.net/popular-destinations-rerouted-to-russia/.
[9]
BGPmon (commercial). http://www.bgpmon.net.
[10]
Survey on BGP prefix hijacking. http://tinyurl.com/hijack-survey.
[11]
YouTube Hijacking: A RIPE NCC RIS case study. http://www.ripe.net/internet-coordination/news/industry-developments/youtube-hijacking-a-ripe-ncc-ris-case-study, March 2008.
[12]
D. Cooper, E. Heilman, K. Brogle, L. Reyzin, and S. Goldberg. On the Risk of Misbehaving RPKI Authorities. In Proc. of ACM Workshop on Hot Topics in Networks (HotNets-XII), 2013.
[13]
W. George. Adventures in RPKI (non) Deployment. https://www.nanog.org/sites/default/files/wednesday_george_adventuresinrpki_62.9.pdf, 2014. NANOG presentation.
[14]
Y. Gilad, A. Cohen, A. Herzberg, M. Schapira, and H. Shulman. Are we there yet? on RPKI's deployment and security. In Proc. NDSS, 2016.
[15]
S. Goldberg. Why is it taking so long to secure internet routing? Communications of the ACM, 57(10):56–63, 2014.
[16]
S. Hares, Y. Rekhter, and T. Li. A border gateway protocol 4 (bgp-4). https://tools.ietf.org/html/rfc4271, 2006.
[17]
J. Karlin, S. Forrest, and J. Rexford. Pretty good bgp: Improving bgp by cautiously adopting routes. In Proc. IEEE ICNP, 2006.
[18]
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (s-bgp). IEEE Journal on Selected Areas in Communications, 18(4):582–592, 2000.
[19]
M. Lepinski. BGPSEC protocol specification. https://tools.ietf.org/html/rfc8205, 2015.
[20]
M. Lepinski, R. Barnes, and S. Kent. An infrastructure to support secure internet routing. https://tools.ietf.org/html/rfc6480, 2012.
[21]
R. Lychev, S. Goldberg, and M. Schapira. BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? In Proc. of ACM SIGCOMM, 2013.
[22]
S. Matsumoto, R. M. Reischuk, P. Szalachowski, T. H.-J. Kim, and A. Perrig. Authentication Challenges in a Global Environment. ACM Trans. Priv. Secur., 20:1:1–1:34, 2017.
[23]
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. ACM SIGCOMM Computer Communication Review, 36(4):291–302, 2006.
[24]
A. Reuter, R. Bush, Í. Cunha, E. Katz-Bassett, T. C. Schmidt, and M. Wählisch. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering. ACM SIGCOMM Computer Communication Review, 2018.
[25]
P. Sermpezis, V. Kotronis, A. Dainotti, and X. Dimitropoulos. A survey among network operators on BGP prefix hijacking. arXiv, http://arxiv.org/abs/1801.02918, 2018.
[26]
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for bgp. In Proc. NSDI, 2004.
[27]
P.-A. Vervier, O. Thonnard, and M. Dacier. Mind your blocks: On the stealthiness of malicious bgp hijacks. In Proc. NDSS, 2015.

Cited By

View all
  • (2025)BGP anomaly detection as a group dynamics problemComputer Networks10.1016/j.comnet.2024.110926257(110926)Online publication date: Feb-2025
  • (2024)A Survey of Advanced Border Gateway Protocol Attack Detection TechniquesSensors10.3390/s2419641424:19(6414)Online publication date: 3-Oct-2024
  • (2024)Hidden-SAGE: For the Inference of Complex Autonomous System Business Relationships Involving Hidden LinksElectronics10.3390/electronics1309161713:9(1617)Online publication date: 23-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 48, Issue 1
January 2018
80 pages
ISSN:0146-4833
DOI:10.1145/3211852
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 April 2018
Published in SIGCOMM-CCR Volume 48, Issue 1

Check for updates

Author Tag

  1. BGP

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)BGP anomaly detection as a group dynamics problemComputer Networks10.1016/j.comnet.2024.110926257(110926)Online publication date: Feb-2025
  • (2024)A Survey of Advanced Border Gateway Protocol Attack Detection TechniquesSensors10.3390/s2419641424:19(6414)Online publication date: 3-Oct-2024
  • (2024)Hidden-SAGE: For the Inference of Complex Autonomous System Business Relationships Involving Hidden LinksElectronics10.3390/electronics1309161713:9(1617)Online publication date: 23-Apr-2024
  • (2024)BGP prefix hijack detection algorithm based on MOAS event featureInternational Conference on Computer Network Security and Software Engineering (CNSSE 2024)10.1117/12.3032047(66)Online publication date: 6-Jun-2024
  • (2024)Improving Prefix Hijacking Defense of RPKI From an Evolutionary Game PerspectiveIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.337164421:6(5170-5184)Online publication date: Nov-2024
  • (2024)A Multidimensional Node Selection Method Towards MOAS Outsourcing Mitigation2024 IEEE 16th International Conference on Advanced Infocomm Technology (ICAIT)10.1109/ICAIT62580.2024.10807904(43-48)Online publication date: 16-Aug-2024
  • (2024)Matrix Profile data mining for BGP anomaly detectionComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110257242:COnline publication date: 1-Apr-2024
  • (2024)Detecting BGP Routing Anomalies Using Machine Learning: A ReviewForthcoming Networks and Sustainability in the AIoT Era10.1007/978-3-031-62871-9_13(145-164)Online publication date: 26-Jun-2024
  • (2023)Live Long and Prosper: Analyzing Long-Lived MOAS Prefixes in BGP2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198973(1-10)Online publication date: 26-Jun-2023
  • (2023)TENSOR: Lightweight BGP Non-Stop RoutingProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604852(108-121)Online publication date: 10-Sep-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media