ARTEMIS: Neutralizing BGP Hijacking within a Minute

01/03/2018
by   Pavlos Sermpezis, et al.
0

BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. They suffer from: (i) lack of detection comprehensiveness, allowing sophisticated attackers to evade detection, (ii) limited accuracy, especially in the case of third-party detection, (iii) delayed verification and mitigation of incidents, reaching up to days, and (iv) lack of privacy and of flexibility in post-hijack counteractions, from the side of network operators. In this work, we propose ARTEMIS, a defense approach (a) based on accurate and fast detection operated by the AS itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards real-time streaming, thus (b) enabling flexible and fast mitigation of hijacking events. Compared to previous work, our approach combines characteristics desirable to network operators such as comprehensiveness, accuracy, speed, privacy, and flexibility. Finally, we show through real-world experiments that, with the ARTEMIS approach, prefix hijacking can be neutralized within a minute.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/16/2020

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey

We are living in an era when online communication over social network se...
research
01/09/2018

A Survey among Network Operators on BGP Prefix Hijacking

BGP prefix hijacking is a threat to Internet operators and users. Severa...
research
12/11/2020

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT

The distributed denial of service (DDoS) attack is detrimental to the in...
research
04/01/2021

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid

The distributed denial of service (DDoS) attack is detrimental to busine...
research
05/28/2021

Chhoyhopper: A Moving Target Defense with IPv6

Services on the public Internet are frequently scanned, then subject to ...
research
06/13/2022

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Due to the computational cost of running inference for a neural network,...
research
12/27/2012

Localized Algorithm of Community Detection on Large-Scale Decentralized Social Networks

Despite the overwhelming success of the existing Social Networking Servi...

Please sign up or login with your details

Forgot password? Click here to reset