Estimating the Impact of BGP Prefix Hijacking

05/05/2021
by   Pavlos Sermpezis, et al.
0

BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate hijacking events, it has not been studied how to accurately quantify the impact of an ongoing hijack. When detecting a hijack, existing methods do not estimate how many networks in the Internet are affected (before and/or after its mitigation). In this paper, we study fundamental and practical aspects of the problem of estimating the impact of an ongoing hijack through network measurements. We derive analytical results for the involved trade-offs and limits, and investigate the performance of different measurement approaches (control/data-plane measurements) and use of public measurement infrastructure. Our findings provide useful insights for the design of accurate hijack impact estimation methodologies. Based on these insights, we design (i) a lightweight and practical estimation methodology that employs ping measurements, and (ii) an estimator that employs public infrastructure measurements and eliminates correlations between them to improve the accuracy. We validate the proposed methodologies and findings against results from hijacking experiments we conduct in the real Internet.

READ FULL TEXT
research
03/21/2023

Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

IP prefix hijacks allow adversaries to redirect and intercept traffic, p...
research
12/17/2020

Social Distancing and the Internet: What Can Network Performance Measurements Tell Us?

The COVID-19 pandemic and related restrictions forced many to work, lear...
research
01/22/2019

Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet's Control Plane

Internet-wide scans are a common active measurement approach to study th...
research
03/11/2019

Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms

The deployment of large-scale distributed systems, e.g., publish-subscri...
research
01/29/2019

An Internet Heartbeat

Obtaining sound inferences over remote networks via active or passive me...
research
09/07/2023

Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage

Multiple works have leveraged the public Bitcoin ledger to estimate the ...
research
10/21/2017

A Closer Look into Mobile Network Speed Measurements

As the demand for mobile connectivity continues to grow, there is a stro...

Please sign up or login with your details

Forgot password? Click here to reset