skip to main content
invited-talk
Public Access

ARTEMIS: Neutralizing BGP Hijacking within a Minute

Published: 16 July 2018 Publication History

Abstract

BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. They suffer from: (i) lack of detection comprehensiveness, allowing sophisticated attackers to evade detection, (ii) limited accuracy, especially in the case of third-party detection, (iii) delayed verification and mitigation of incidents, reaching up to days, and (iv) lack of privacy and of flexibility in post-hijack counteractions, from the side of network operators. In this work, we propose ARTEMIS, a defense approach (a) based on accurate and fast detection operated by the AS itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards realtime streaming, thus (b) enabling flexible and fast mitigation of hijacking events. Compared to previous work, our approach combines characteristics desirable to network operators such as comprehensiveness, accuracy, speed, privacy, and flexibility. Finally, we show through real-world experiments that, with the ARTEMIS approach, prefix hijacking can be neutralized within a minute. Based on work under submission to IEEE/ACM Transactions on Networking. Sermpezis, P. and Kotronis, V. and Gigis, P. and Dimitropoulos, X. and Cicalese, D. and King, A. and Dainotti, A.; "ARTEMIS: Neutralizing BGP Hijacking within a Minute", https://arxiv.org/abs/1801.01085v3

Cited By

View all
  • (2024)Detecting BGP Routing Anomalies Using Machine Learning: A ReviewForthcoming Networks and Sustainability in the AIoT Era10.1007/978-3-031-62871-9_13(145-164)Online publication date: 26-Jun-2024
  • (2022)A Study of Network Attack Strategy Using AS Topology MapAdvances on Broad-Band Wireless Computing, Communication and Applications10.1007/978-3-031-20029-8_9(91-101)Online publication date: 18-Oct-2022
  • (2020)A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00027(894-909)Online publication date: May-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ANRW '18: Proceedings of the 2018 Applied Networking Research Workshop
July 2018
102 pages
ISBN:9781450355858
DOI:10.1145/3232755
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 July 2018

Check for updates

Qualifiers

  • Invited-talk
  • Research
  • Refereed limited

Funding Sources

Conference

ANRW '18
Sponsor:
ANRW '18: Applied Networking Research Workshop
July 16, 2018
QC, Montreal, Canada

Acceptance Rates

Overall Acceptance Rate 34 of 58 submissions, 59%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)6
Reflects downloads up to 24 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Detecting BGP Routing Anomalies Using Machine Learning: A ReviewForthcoming Networks and Sustainability in the AIoT Era10.1007/978-3-031-62871-9_13(145-164)Online publication date: 26-Jun-2024
  • (2022)A Study of Network Attack Strategy Using AS Topology MapAdvances on Broad-Band Wireless Computing, Communication and Applications10.1007/978-3-031-20029-8_9(91-101)Online publication date: 18-Oct-2022
  • (2020)A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00027(894-909)Online publication date: May-2020
  • (2020)To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI TodayPassive and Active Measurement10.1007/978-3-030-44081-7_5(71-87)Online publication date: 18-Mar-2020
  • (2019)Using Natural Language Constructs and Concepts to Aid Network Management2019 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICCNC.2019.8685639(802-808)Online publication date: Feb-2019
  • (2019)CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks2019 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2019.8802699(73-81)Online publication date: Jun-2019
  • (2018)BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security SolutionSymmetry10.3390/sym1009040810:9(408)Online publication date: 17-Sep-2018

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media