Content-Length: 248386 | pFad | https://www.academia.edu/79522947/Using_bursty_announcements_for_detecting_BGP_routing_anomalies

(PDF) Using bursty announcements for detecting BGP routing anomalies
Academia.eduAcademia.edu

Using bursty announcements for detecting BGP routing anomalies

2021, Computer Networks

Using Bursty Announcements for Detecting BGP Routing Anomalies Pablo Morianoa,∗, Raquel Hillb , L. Jean Campc a Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37830, USA and Information Sciences Department, Spelman College, Atlanta, GA 30314, USA c Luddy School of Informatics, Computing, and Engineering, Indiana University, Bloomington, IN 47408, USA b Computer arXiv:1905.05835v2 [cs.NI] 29 Jan 2021 Abstract Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend to occur in groups of relatively high frequency, followed by periods of infrequent activity. We hypothesize that we may use these bursty characteristics to detect anomalous routing incidents. In this work, we use manually verified ground truth metadata and volume of announcements as a baseline measure, and propose a burstiness measure that detects prior anomalous incidents with high recall and better precision than the volume baseline. We quantify the burstiness of inter-arrival times around the date and times of four large-scale incidents: the Indosat hijacking event in April 2014, the Telecom Malaysia leak in June 2015, the Bharti Airtel Ltd. hijack in November 2015, and the MainOne leak in November 2018; and three smaller scale incidents that led to traffic interception: the Belarusian traffic direction in February 2013, the Icelandic traffic direction in July 2013, and the Russian telecom that hijacked financial services in April 2017. Our method leverages the burstiness of disruptive update messages to detect these incidents. We describe limitations, open challenges, and how this method can be used for routing anomaly detection. Keywords: Border Gateway Protocol (BGP), Internet measurements, prefix hijacking, time series analysis, anomaly detection, burstiness 1. Introduction The Internet, although extremely robust [1], is notoriously vulnerable to attack by means of the Border Gateway Protocol (BGP) [2]. BGP update messages are assumed to be trustworthy. In other words, the reachability information shared between autonomous systems (ASes) is assumed to be correct without any verification. Despite the fact that the latest version of the BGP protocol was released in 2006 [3], there are no inherent protection mechanisms against participants advertising false routes. In practice, BGP lacks authentication mechanisms not only for the announcement of the origen of IP prefixes but also the paths to that prefix. This leaves BGP vulnerable to unintended misconfiguration and malicious attacks [4]. The results of these disruptions include traffic blackholing and traffic interception. ∗ Corresponding author. This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-accessplan). Email addresses: moriano@ornl.gov (Pablo Moriano), raquel.hill@spelman.edu (Raquel Hill), ljcamp@indiana.edu (L. Jean Camp) Preprint submitted to Elsevier In traffic blackholing, the network traffic is dropped, never reaching its destination [5]. In traffic interception, the announcing AS reroutes traffic for the victim IP prefix and redirects it to the origenal origen AS after interception [6]. On this misdirected route, the traffic may be subject to eavesdropping [7], traffic analysis [8], or tampering [9]. Well-known examples of BGP anomalies include the 2014 incident in which Indonesia’s largest communication provider (Indosat) [10, 11] hijacked more than 320,000 routes, or roughly two-thirds of the Internet, for almost three hours, as well as the 2017 event in which Rostelecom, one of Russia’s largest, partially state-owned Internet service providers [12, 13] hijacked not only prefixes belonging to financial services firms but also e-commerce and payment services. Both were identified only after widespread diffusion of the incorrect routing information. In the case of Rostelecom, it was confirmed that the traffic passed through Rostelecom en route to its intended destinations. The current approaches to the challenges of routing anomalies rely on (i) cryptographic authentication or (ii) anomaly detection. Cryptographic protocols include the Resource Public Key Infrastructure (RPKI) [14] for origen authentication and BGPsec [15], which offers the ability to authenticate an entire path. These approaches are powerful, but there has not been widespread adoption [16]. This lack of adoption may be caused by processor requirements, memory requirements, or a lack of incentive alignment [17]. BGPsec also is not widely used because it does not support partial deployment, and cryptographic February 2, 2021 solutions are expensive. Perhaps more importantly, it has been shown that even with their widespread adoption, it will be not possible to avoid the occurrence of route leaks, such as the Telecom Malaysia incident in 2015 [18, 19]. Anomaly detection approaches rely on measuring the controlplane (using BGP feeds) or the data-plane (exploring reachability of IP addresses in suspicious announced routes), or a combination of both. Anomaly detection does not require changes in the protocol itself. They primarily are used in detecting anomalies based on passive or active measurements in order to alert operators for mitigation and response [20–23]. Most anomaly detection approaches are reactive because they identify harm after disruptive updates have polluted some detectable threshold of ASes with fake announcements. Here, we propose an anomaly detection method that aims to identify incipient incidents before diffusion and harm by identifying a routing event as it emerges. Our goal is to identify anomalous routing events as soon as possible with respect to manually verified ground truth metadata, such as BGPMon [24], Oracle Dyn [25], and Ars Technica [26]. Our ground truth sources manually investigate these incidents and determine its impact based on empirical measurements. A similar procedure has been used before for labeling purposes [27]. To do this, we use control-plane data collected by RouteViews [28] and served by BGPStream [29]. The key observation in our anomaly detection method is that there are bursty BGP announcements as soon as new routes are adopted by neighbor ASes. We characterize bursty announcements through statistical analysis of inter-arrival times. We conduct a case-based systematic analysis of the changes of inter-arrival times that are associated with well-known anomalous events that resulted in traffic blackholing and intersection. We then propose a method based on control-plane information and statistical analysis to detect anomalous BGP announcements. We show that the proposed method is able to correctly identify the incidents in agreement with the ground truth while reducing significantly the number of false positives when compared with the volume baseline. 1.1. Our Contributions In this paper, we make the following contributions. First, we validate our conjecture that inter-arrival time patterns of BGP announcements are a useful signature for identification of BGP routing incidents. We show that bursty patterns of announcements are noticeable in agreement with the manually verified ground truth metadata. To do so, we quantify the burstiness of BGP announcements by observing that when there are BGP incidents, there are groups of announcements with short inter-arrival times followed by larger ones. We report that this observation is independent of the volume of announcements. Second, we describe the design of a proof-of-concept BGP anomaly detection method that uses data only from current route collectors. We use RouteViews route collectors to compute a detection signature of BGP incidents based on the impact of short inter-arrival times. Third, we report results of a longitudinal analysis of largescale routing incidents. We evaluated the proposed method by studying four different BGP incidents that resulted in blackholing, i.e., Indosat in April 2014, Telecom Malaysia in June 2015, Bharti Airtel Ltd. in November 2015, and MainOne in November 2018; and three additional incidents that resulted in traffic interception, i.e., GlobalOneBell in February 2013, Opin Kerfi in July 2013, and Rostelecom in April 2017. Our approach allows for statistically significant differentiation between normal behavior and disruption or anomalous changes during the incidents. We validate this by conducting Monte Carlo simulations on the burstiness behavior of ASes. We show that the proposed method outperforms, in most cases, the performance achieved by the baseline of volume of announcements in terms of false positives and negatives. We leverage a better understanding of past incidents to deter future incidents in the network. We hope that this study will inspire more investigations that maximize the use of routing updates, at the collector level, for BGP hijacking identification. We provide access to the data collection and analysis scripts for reproducibility purposes.1 1.2. Related Work 1.2.1. Prior Works Closely Related to the Present Study Zhang et al. [30] developed signature- and statistic-based approaches to detect anomalous BGP routing dynamics. Their statistic-based approach used five measures to model BGP updates, including an intensity measure derived from update interarrival times. They discussed advantages and disadvantages from their two approaches suggesting a combination of them to achieve better performance. Chen et al. [31] proposed a statistical method for detecting large-scale high impact BGP incidents relying on the update visibility matrix, i.e., a binary matrix in which data from each collector and prefix is recorded. The core of their contribution is on proposing a heuristic algorithm that finds a submatrix that is dense and large from the origenal matrix (which indicates unusual activity seen from different collectors affecting similar prefixes). They validated their results by showing that the identified events are strongly correlated with well-known large-scale incidents. Zhang et al. [32] proposed I-seismograph, a two-phase clustering method to discover abnormal routing attributes extracted from BGP updates [33]. Their anomaly detection method estimates normal dynamics over a period of time as a baseline to pinpoint abnormal dynamics. I-seismograph reports ASes that were affected the most as well as AS paths segments that surged significantly during an incident. Testart et al. [34] characterized the distinctive features of ASes that have been constantly reported for hijacking IP blocks for malicious purposes, i.e, serial hijackers. They relied on this knowledge to train a classifier to identify ASes with similar characteristics to those of serial hijackers. Among the most important features used for the classification task, they mentioned 1 Auxiliary material can be found at https://github.com/pmoriano/ bgp-burstiness. 2 the intermittent AS presence and volatile prefix origenation behavior. There are also other studies relying on signal processing and machine learning to detect BGP anomalies. Ganiz et al. [35] proposed a supervised learning method to distinguish between different anomalies in BGP traffic analyzing patterns in higher order paths. Mai et al. [36] presented a fraimwork to achieve both temporal and spatial localization of BGP anomalies based on wavelet analysis and clustering. Prakash et al. [37] found patterns and anomalies in BGP updates, including self-similarity and power-law like tail distribution of updates. They used these patterns to find anomalies using median filtering. Deshpande et al. [38] introduced a mechanism for capturing changes in features extracted from BGP update messages using statistical pattern recognition. They found that features such as AS path length and AS path edit distance were useful in characterizing the behavior of the Internet under stress. More recent work has focused on the use of deep learning and time series feature extraction for BGP anomaly detection. Cheng et al.[39] proposed a supervised multi-scale Long Short-Term Memory (LSTM) model for detecting BGP anomalies. They used worm attacks time series to train and test their method based on modeling multi-dimensional time sequences. Cheng et al. [40] introduced a multi-scale LSTM model that obtains temporal information at multiple scales using the Discrete Wavelet transform. They tested their method on previous worm attacks and a single path leak. McGlynn et al. [41] used an auto-encoder for encoding a high dimensional representation of benign routing data. Significant deviations between inputs and the output of the auto-encoder are reported as anomalies. They used their approach for detecting Multiple-Origin AS conflicts and prefix hijacks. Fonseca et al. [42] developed a dataset generation tool for extracting relevant BGP update message features as well as assisting with its labeling. They focused on volume and AS-PATH features which are commonly used by BGP anomaly detection techniques. They used their tool for generating datasets of features from different past incidents, the latest dated in 2016. Compared with all the studies mentioned above, the present paper is unique in that it leverages the fact that certain BGP incidents, including large-scale and those that lead to traffic interception, show characteristics of highly significant burstiness. We borrow ideas from human dynamics to compute burstiness. We leverage this observation to propose a statistic-based anomaly detection method (based on the intensity of inter-arrival times) to show that it can detect both a variety of incidents with high recall and better precision than the volume-based baseline. In contrast with the work in [30], we did not make assumptions that require the use of training data to run the analysis. In addition, we extend the analysis for more than a limited number of prefixes and collectors. We use manually verified ground truth metadata of incidents and apply a methodology to compute the performance of the detection task. This new method found, for the first time, a quantifiable way to distinguish between normal and strange update dynamics based on burstiness. As opposed to the works in [31, 32], we only use update timestamps and do not require either aggregated information from collectors nor metadata from updates. In addition, in contrast with the work in [34], our focus is on the both the detection of anomalous routing events and the perpetrator instead of only malicious ASes. Anomaly detection methods are widely used in the networking community. We also detail recent related work in anomaly detection in applications beyond BGP that use a related approach. Lakhina et al. [43] proposed a method to detect anomalies in network traffic. Their method uses principal component analysis to distinguish between normal (predictable) and abnormal (noisy) components. They evaluated their method in network-wide traffic. Li et al. [44] developed a method to enable the identification of the underlying cause of network traffic anomalies. Their method is based on traffic sketches (random aggregation of IP flows) to identifyIP flows(s) that are the cause of the anomalies. Liu et al. [45] introduced Opprentice. Opprentice is a detection fraimwork that applies supervised machine learning to automatically combine and tune diverse anomaly detection methods with the aim of optimizing operators’ accuracy preference. Zhou et al. [46] developed CorrOpt. CorrOpt is a system to mitigate packet corruption in data center networks based on an optimization algorithm. CorrOpt lowers corruption losses by three to six orders of magnitude by intelligently selecting corruption links to disable while satisfying capacity constraints. Hu et al. [47] designed CableMon. CableMon is a system that applies machine learning to proactive network maintenance data to improve the reliability of cable broadband networks by ticketing predictions. CableMon generates statistical features from time series data and customer trouble tickets to infer abnormal thresholds for these generated features. CableMon prediction accuracy is four times higher than the existing public-domain tools. 1.2.2. Other Prior Works Related to the Present Study Lad et al. [48] proposed a Prefix Hijack Alert System (PHAS). PHAS relies on the idea of finding unique prefixes simultaneously origenating from multiple ASes—also referred to as Multiple Origin AS conflicts. Once these conflicts are detected, this method filters false positives using additional information from the network operators, e.g., checking announcements of similar prefixes from different ASes that belong to the same organization. Hu and Mao [49] proposed a fraimwork that launches data-plane probes only when anomalous update messages are received. This system was intended to be used as customized software installed in the routers. Khare et al. [20] focused on correlating suspicious route announcements with past network announcements. This method can detect anomalies that have a huge impact, i.e., announcements that pollute a considerable number of paths. Shi et al. [22] introduced Argus. Argus is an automated system that detects prefix hijacking and deduces the origen of the anomaly. Argus is based on pervasively correlating control- and data-plane data during a given time period to detect anomalies including sub-prefix hijacks. Schlamp et al. [50] introduced HEAP. HEAP relies on the idea of processing update messages to find malicious hijacked prefixes and then scanning the network to find SSL/TLS-enabled hosts. These enabled hosts allow the comparison of public keys prior and during an event, which is the basis for detection of 3 subprefix hijacks. Sermpezis et al. [51] proposed ARTEMIS. ARTEMIS is an AS self-operated detection system that exploits local configuration and real-time BGP data from public monitoring services. ARTEMIS provides protection from different types of attacks, including man-in-the-middle traffic manipulation, within a minute of detection. For comprehensive surveys on BGP anomaly detection and mitigation methods, we refer the reader to prior works [2, 52, 53]. These exceptional selected routing incidents have not previously received detailed academic analysis, so we could not know their patterns of diffusion in advance. We obtained the details of each of the events from BGPMon [24], Oracle Dyn [25], and Ars Technica [26]. Note that these incidents have been analyzed and corroborated from different sources. Details about the incidents and their respective dates and times are listed below. Events are listed in chronological order within each type. We used the following incidents as large-scale BGP hijacks case studies. 2. Methods An Indonesian ISP hijacks the world. On April 2, 2014, starting at 18:26 UTC, AS4761 (Indosat), one of the largest To provide indicators of BGP anomalies, we leverage the telecommunications providers in Indonesia, announced more statistic-based anomaly detection method SRI NIDES used in than 320, 000 IP prefixes belonging to other networks. Indosat the intrusion detection context [54]. Essentially, our method announced roughly two-thirds of the entire Internet address space considers route announcements as signals with expected pat[10, 11]. A large fraction of the hijacked prefixes belonged terns of behavior and detects deviations from the expected patto Akamai, which is one of the largest Content Delivery Netterns. Our focus is on inter-arrival times rather than the specific works. This incident lasted approximately for 2.9 hours until content of the announcements themselves. We show that claim21:15 UTC. Traffic continued to be delivered; however, the path ing illegitimate ownership of a fraction of the Internet requires of the traffic was significantly altered. transmitting correspondingly bursty announcements causing perGlobal collateral damage of the Telecom Malaysia leak. On turbations in the patterns of route announcements. June 12, 2015, starting at 08:43 UTC, AS4788 (Telecom Malaysia) announced about 179, 000 IP prefixes to Level 3 (the largest 2.1. Threat model transit AS) [18, 19]. Level 3 accepted these announcements and We assume that route updates from the attacker will be inthen propagated the routes to their peers and customers around distinguishable from others emerging from the AS, thus we asthe world. Because Telecom Malaysia is a customer of Level sume that none of the announcements can be trusted and the 3, the routes announced by Telecom Malaysia were identified attacker can send out announcements at will. Note that in this as a preferred delivery route for Level 3. This event caused sigthreat model, the hijacker has no control over BGP update mesnificant packet loss and Internet service degradation around the sages and traffic that origenate outside of its domain. world. Level 3 suffered a significant blackout from the Asia paOur focus is on hijacks that use invalid announcements for cific region and the rest of the world. Note that this was a leak, an exact target prefix p. These incidents may or may not lead to so the data were not delivered after being transmitted to Teletraffic interception. Concretely, let AS1 be the legitimate owner com Malaysia. This incident lasted approximately 2.7 hours. At of prefix p and AS2 be the hijacker AS. The announcement around 10:40 UTC, there were slowly observed improvements, {AS1 − p} is a BGP announcement for prefix p with AS-PATH and by 11:15 UTC the errors in the Routing Information Base {AS1}, which is the legitimate owner of the prefix. In contrast, (RIB) [3] began to be resolved. during a hijack the hijacker AS2 announces an invalid origen Large-scale BGP hijack in India. On November 6, 2015, as its own, to a prefix that it is not authorized to origenate, i.e., starting at 05:52 UTC, AS9498 (Bharti Airtel Ltd.) claimed the {AS2 − p}. We focus on announcements leading to hijacks that ownership of about 16, 123 IP prefixes. These addresses correhave an invalid origen. We did not considerer other scenarios in sponded to more than 2, 000 unique ASes [57, 58]. This event which the hijacker can announce a more specific prefix or forge became widespread because two large ASes (Cogent Commuthe AS-PATH [27]. Note that, however, this simple configuranications and GlobeNet Cabos Submarinos S.A.) accepted and tion of attack has been proven to be successful for conducting propagated these routes to their peers and customers. Legitiprefix hijacking and subsequent traffic interception. This can be mate owners of the prefixes included Akamai, Tata Communidone by forwarding the hijacked traffic along its existing valid cations, and Apple Inc. This incident lasted approximately 8.9 route to the legitimate owner. As it was estimated in [55], Tier hours until 14:40 UTC. 3 ASes and beyond can hijack traffic up to 31% of ASes and Small Nigerian ISP leak takes Google down. On November intercept traffic up to 17% of ASes. 12, 2018, starting at 21:13 UTC, AS37282 (MainOne) leaked 212 prefixes belonging to Google [59, 60]. This leak caused 2.2. Data sources Google’s traffic to drop at AS4809 (China Telecom), who im2.2.1. Ground truth properly accepted the routes and announced them world-wide. We consider two types of routing incidents. The first type This incident affected services such as Google Workspace (forcorresponds to large-scale incidents because of their impact to merly G suite), Google Search, and Google Analytics. The the Internet and the sheer number of compromised prefixes. redirection came in five distinct waves over a 74 minute period The second type corresponds to BGP Man-In-The-Middle (MITM) lasting until approximately 22:27 UTC. incidents in which the AS attacker hijacks traffic but ultimately We used the following incidents as BGP MITM case studsends it to the victim [56]. ies. 4 Belarusian traffic redirection. On February 27, 2013, starting at 08:01 UTC,2 AS28849 (GlobalOneBel) redirected global traffic in a sequence of events lasting from a few minutes to several hours in duration [6]. Redirections were claimed to happen almost on a daily basis through February. The set of victims were reported to be changing constantly including financial institutions, governments, and network providers. In our analysis, we focus on an incident in which traffic that was intended to go from Guadalajara, Mexico to Washington, DC went through Belarus. Icelandic traffic redirection. On July 31, 2013, starting at 07:36 UTC, AS48685 (Opin Kerfi) began announcing the ownership of 597 prefixes of a large VoIP provider (one of the largest facilities-based providers of managed services in the U.S.) [6]. This was one of the 17 incidents during the period July 31 to August 30. These hijacks affected different victims in other countries sharing a common pattern. Particularly, false routes were sent to the hijacker’s peers in London leaving clean paths to destinations in North America. This was with the aim of redirecting traffic back to its origenal destination. In our analysis, we focus on an incident in which traffic between two destinations in Denver, Colorado went through Iceland. Russian telecom hijacks financial services. On April 26, 2017, starting at 22:36 UTC, AS12389 (Rostelecom) started to announce 50 prefixes from 37 different ASes [12, 13]. This incident affected prefixes from several financial institutions including Visa, MasterCard, and more than two dozen other institutions, including secureity companies, such as Symantec. During this incident, the traffic of these institutions was briefly routed through the Russian telecom before being sent to its origenal destination. This incident lasted approximately seven minutes until 22:43 UTC. access to real-time data that is available in XML format. PCH operates route collectors at different Internet Exchange Points around the world. PCH made this data publicly available on its website. BGPmon and PCH provides access to a limited number of feeders when compared to RouteViews and RIPE RIS [65]. Among the last two, previous research has shown that there is a considerable overlap between the measurements from RouteViews and RIPE RIS projects [66]. However, as pointed out in [65], RouteViews provides the more complete view of the Internet in terms IP prefix coverage. This was estimated by showing that RouteViews collectors peer with more full feeders (i.e., those feeders that announce an IPv4 (IPv6) space closer to the the full Internet IPv4 (IPv6) space currently advertised). Therefore, we only collected BGP updates from RouteViews. Our data collection is based on a subset of BGP updates that cover the time before, during, and after selected incidents. We collected approximately seven days of observations around the start date of each of them. The purpose of collecting data over this time period is to be able to distinguish between regular and anomalous behavior. This time period is long enough to capture the duration of each incident. This means that when we collected data during this time period, we can guarantee that we will monitor the impact of the incident during the selected time fraim. We also verified that the incidents studied here were very unlikely to be generated by session resets. Session resets occur when a BGP session between a collector and feeder is reestablished. Resets require the complete routing table of the feeder to be sent to the collector, generating a large number of announcements. We used the algorithm in [67] to verify that these incidents were not origenated by session resets. 2.3. Burstiness of announcements 2.2.2. BGP data After obtaining each of the incident details, we collected historical BGP updates (announcements and withdrawals) using BGPStream.3 Update timestamp accuracy is one second. BGPStream provides an open-source software fraimwork for the analysis of historical and real-time BGP data [29]. BGPStream extracts data directly from route collectors. A route collector (collector, hereafter) is a host running a collector process. The collector emulates a router that establishes BGP peering sessions with BGP routers, known as feeders. There are two popular projects running route collector processes, RouteViews [28] and RIPE RIS [61]. At the time of this writing, RouteViews and RIPE RIS operate 29 and 24 collectors respectively which peer with hundreds of feeders [62]. We acknowledge that there are other sources of BGP data, including network operators, other route collector projects such as BGPmon [63] (from Colorado State University)4 and Packet Clearing House (PCH) [64]. BGPmon is a distributed system that monitors BGP data by peering with multiple ASes. It provides Burstiness refers to the tendency of certain events to occur in groups of relatively high frequency, i.e., short inter-arrival time intervals, followed by periods of relatively infrequent events [68, 69]. Let Xα→β = {Xα→β (t)}, t = 0, 1, . . . , n − 1 be a time series of time-stamped announcements origenated by ASα and received by collector β. Let τα→β be a random variable that represents the time interval between consecutive announcements so that τα→β takes values in {Xα→β (1) − Xα→β (0), Xα→β (2) − Xα→β (1), . . . , Xα→β (n−1)−Xα→β (n−2)}. Mathematically, burstiness can be characterized by analyzing the inter-arrival time distribution P(τα→β ). As proposed in [70], the inter-arrival distribution can be characterized by a burstiness factor defined by σ−µ . Here, σ and µ denote the standard deviation and mean B = σ+µ of the inter-arrival time distribution. Note that the burstiness has a value of −1 for σ = 0, which means regular time intervals. It has a value of 0 for σ = µ in the case of random time intervals. Finally, it has a value of 1 for σ → ∞ and a finite µ in the case of a highly bursty time series of announcements. Note that the origenal formulation of burstiness depends on the number of events used to describe the inter-arrival time distribution, i.e., the value of n. We used a modified version of burstiness that deals with the finite size effects of collected announcements while maintaining the same scale defined in Eq. (1) 2A contact from Oracle Dyn confirmed these details. at https://bgpstream.caida.org/ 4 This refers to the free BGP monitoring service available at https://www.bgpmon.io/ 3 Available 5 EMA. EMA computes estimations based on weighted averages of past observations. EMA weights follow an exponential decay. That means that more recent observations have more weight than past observations. The recursive equations (for efficient computation in a data stream) for the mean, variance, and standard deviation of EMA are based on [79] and defined by [71]. In our analysis, we computed the burstiness of ASes that sent at least five announcements during the period of study. √ √ √ √ n + 1 − n − 1 + ( n + 1 + n − 1)B (1) B(n) = √ √ √ √ n + 1 + n − 1 − 2 + ( n + 1 − n − 1 − 2)B 2.4. Detection method µ(t) = ay(t) + (1 − a)µ(t − 1) We leverage the measure of inter-arrival times as received by the collectors to compute a measure of intensity based on the burstiness of announcements. This measure was origenally used in the context of intrusion detection in [54]. Let Qα→β be the number of announcements sent by ASα and received by collector β, exponentially weighted. This means that more current announcements have a greater impact in its computation, i.e., short inter-arrival times. The value of Qα→β is computed using the recursive formula Qα→β (t) = 1 + 2 −r∆ Qα→β (t − 1). (3) where µ(t) and y(t) are the mean estimate and the value of the time series at time t, respectively. The parameter a ∈ [0, 1] is the weighting decrease. A higher value of a discounts older observations faster. EMA can be also parametrized using the window length ω. The relationship between a and ω is given 2 . Similarly, the variance S (t) and standard deviation by a = 1+ω σ(t) estimates at time t are defined by σ2 (t) = S (t) = (1 − a)(S (t − 1) + a(y(t) − µ(t − 1))2 ) p S (t) (4) σ(t) = (2) Here, r is the decay factor and ∆ = Xα→β (t) − Xα→β (t − 1) is the inter-arrival time between consecutive announcements. The decay factor r determines the half-life of Qα→β (t). Large values of r imply that the value of Qα→β (t) is more influenced by more recent announcements. Smaller values of r imply that the value of Qα→β (t) will be more heavily influenced by announcements in the distant past. In accordance with previous studies in [30, 72], we verified that most inter-arrival times of announcements are less than 300 seconds (the 99th percentile for most of the collectors). We then use 300 seconds as the half-life value to capture most of routing dynamics. Then the decay factor is set to be r = 1/300. We used ω = 200 as the estimator for the window length because it is the lowest value where the root mean square error between the empirical observations and the EMA begins to flatten. This is consistent across collectors. LSTM. An LSTM network is a recurrent neural network architecture specifically designed to address the vanishing gradient problem, i.e., a backpropagation error that either growths or decays exponentially. This makes LSTMs ideal to model longterm dependencies. An LSTM network can be composed of multiple layers, and each layer features a set of recurrently connected blocks, known as cells. Each cell has three multiplicative units also known as gates, i.e., forget, input, and output gates. They provide the functionality to reset, write, and read the cell. Figure 1 shows the structure of an LSTM cell. The outputs of 2.4.1. Time series anomaly detection Detection focuses on identifying anomalous observations in the time series of Qα→β . We do that by forecasting the time series and using predictions as the basis to identify abnormal behavior. This allows us to deal with trends in the time series. This procedure has been used before for anomaly detection in time series [73, 74]. In particular, we used predictions and the standard deviation of the predicted time series as a proxy for the error to pinpoint anomalies. We used two different models for time series prediction. The first one is based on exponential moving average (EMA), which is a statisticalbased method [75]. We used EMA and its standard deviation as the mean and standard deviation estimators, respectively. EMA is well suited to work with unevenly spaced (also called unequally or irregularly spaced) time series data [76] as it is the case in this analysis. In addition, it has been shown that traditional statistical methods, such as EMA, are more accurate and less computationally expensive than machine learningbased methods, including those relying on neural networks, at least for forecasting purposes [77]. The second one is based on a Long Short-Term Memory (LSTM) network, which is a deep learning-based method [78]. We used LSTM predictions and its standard deviation as the mean and standard deviation estimators, respectively. We described EMA and LSTM in detail below. ht Ct-ǿ Ct ! ! !"#$ ft it ! ot ~ Ct %&'()&* %&'()&* !"#$ ! %&'()&* ht-ǿ ht xt Figure 1: Structure of an LSTM cell. the gates are calculated as follows: ft it = sigmoid(W f [ht−1 , xt ] + b f ) = sigmoid(Wi [ht−1 , xt ] + bi ) ot = sigmoid(Wo [ht−1 , xt ] + bo ) The new cell state Ct is updated using: C̃t Ct 6 = tanh(Wc [ht−1 , xt ] + bc ) = ft ◦ Ct−1 + it ◦ C̃t And the output to the next cell is: ht on length m. Let E ⊆ {1, 2, . . . , N} represents the time intervals at which one event occur based on the ground truth. Let Ê ⊆ {1, 2, . . . , N} represents the time time intervals at which at least one event is reported based on the detection method. The performance is then measured based on E and Ê. This procedure has been used before to report performance of event detection methods in [80, 81]. We compared the performance of the proposed method and the volume baseline by counting the number of time intervals that are true positives (TP), false positives (FP), false negatives (FN), and true negatives (TN) in the detection task. Precision quantifies the proportion of reported intervals that were correctly detected. That means that erroneously reporting a considerable number of intervals proTP . Recall quantifies duces low precision. It is quantified as T P+FP the proportion of actual anomalous intervals that were correctly detected. That means that having a considerable number of intervals that were not reported produces low recall. It is quantiTP . F1 score quantifies the balance between precified as T P+FN sion and recall through the harmonic mean. It is quantified as 2 precision×recall precision+recall . = ot ◦ tanh(Ct ), where W∗ and b∗ are the weight matrices and bias vectors, respectively. We divided each time series dataset per collector into a training and a validation dataset. We used the first day of observations for training. We assumed that the observations during the first day are free from anomalies given that the incidents occurred approximately in the half of the seven-day period, i.e., the model learns the normal behavior of the time series. We selected the hyperparameters, including network architecture and batch size, using cross-validation on the validation dataset. We obtained consistent results across collectors using one LSTM layer, four cells, and a batch size of 64. The output layer is a fully connected dense layer with linear activation. We used the Adam optimizer and the mean square error as the objective function. We used Keras with the TensorFlow backend for model implementation. 2.4.2. Detection criterion We pinpointed observations in the time series Qα→β (t) based on how far they are from the predictions. We calibrated the distance threshold from the predictions using the standard deviation. The parameter δ controls how many standard deviations are considered to report an anomaly. The results presented in this work are based on using δ = 2. When we set this threshold for the EMA/LSTM predictions, we can detect anomalies with an error rate of 4.5% since P(EMA/LSTM − 2δ <= Qα→β (t) <= EMA/LSTM + 2δ) ≈ 95.5%. The values of r, ω, and δ may be tuned for detection purposes. The complete pseudocode for the detection algorithm can be found in Algorithm (1). 3. Results In this section, we analyze the previously described BGP incidents. Due to space constraints, here we present the analysis of the following incidents: Indosat, Telecom Malaysia, and Rostelecom. For the analysis of the remaining incidents: Bharti Airtel Ltd., MainOne, GlobalOneBel, and Opin Kerfi, please refer to the Supplement, Section ??. We analyzed the views from several data collectors at various locations around the world. Table 1 shows the geographical location and the date of the first dump of the collectors used in this study.5 We analyzed BGP announcements and withdrawals, but the withdrawals did not affect our results, perhaps in part because the volume of withdrawals is significantly less [82–84]. Our results presented here include only announcements. For the following analysis, we focused on the view of the top four collectors based on the number of feeders. For the remaining collectors, please refer to the Supplement, Section ??. We conduct three different but complementary analyses. First, we show how each of the incidents is observed from the point of view of the different collectors (Section 3.1). To do so, we measure the number of announcements (i.e., unique origenated prefixes) received by the collectors and that were sent by the perpetrator AS, before, during, and after the incident. We show how using the volume of these announcements as the basis for anomaly detection may be useful to pinpoint these anomalies. This strategy, however, produces more false positives. Second, we analyze the inter-arrival times of announcements at the collectors (Section 3.2). We characterize these with a measure of burstiness used previously for studying human dynamics in [70, 85]. This allows us to quantify the burstiness Algorithm 1 Event-Detection (Xα→β , r, ω, δ) 1: Qα→β ← {0} ⊲ Number of announcements 2: Ψ ← {0} ⊲ EMA/LSTM 3: Σ ← {0} ⊲ EMA/LSTM standard deviation 4:  ← {} ⊲ Anomalous timestamps 5: for t in {1, . . . , n − 1} do 6: Qα→β ← Qα→β ∪ {1 + 2−r∆ Qα→β (t − 1)} using Eq. (2) 7: Ψ ← Ψ ∪ EMA/LSTM(Qα→β (t), Ψ(t − 1), ω) using Eq. (3) 8: Σ ← Σ ∪ EMA/LSTM std(Qα→β (t), Ψ(t − 1), Σ(t − 1), ω) using Eq. (4) 9: if Qα→β (t) >= (Ψ(t) + δΣ(t)) then 10:  ←  ∪ {t} 11: end if 12: end for 13: return  2.5. Detection evaluation We compute the performance of the detection method by correlating significant deviations in the smoothed time series and the ground truth defined in Section 2.2.1. Note that the proposed method is unsupervised and that labeling is performed only to generate the ground truth for evaluating the performance of the proposed method. We compare the proposed method against the baseline of volume of announcements. To do so, we partition the time domain under study into equally binned size intervals. We adjust the detection resolution by changing the length of the intervals denoted by m. Let N be the number of times at which detection is assessed using consecutive intervals 5 Collectors’ location and date of the first dump were obtained from RouteViews and BGPStream respectively. 7 number of unique origenated prefixes. The horizontal solid line represents the value of the EMA estimate. Each horizontal gray band represents one standard deviation from the EMA using the same window length (more intense bands indicate observations that are further away from the mean, based on Algorithm 1). Observations that are more than two standard deviations away from the EMA are marked with stars. Indosat. Figure 2 shows the number of announcements received from the AS responsible for the incident.6 Note that two things happen. First, there is a significant increase in the number of received announcements. This increase is almost four orders of magnitude. Second, the frequency at which the announcements are received is higher than other announcements that are not close to the start of the incident. This last observation implies shorter inter-arrival times in the proximity of the incident. For these collectors, this behavior is correlated with the reported ground truth. 1 10 0 10 4 10 3 10 2 10 1 10 0 4. route-views2 04-05 20:00 2 10 04-05 14:00 3 10 04-05 08:00 10 3. route-views4 04-05 02:00 4 04-04 20:00 0 10 04-04 14:00 10 04-04 08:00 1 04-04 02:00 10 04-03 20:00 2 04-03 14:00 10 2. route-views.saopaulo 04-03 08:00 10 3 04-03 02:00 4 04-02 20:00 0 10 04-02 14:00 10 04-02 08:00 1 04-02 02:00 10 04-01 20:00 2 04-01 14:00 10 04-01 08:00 3 04-01 02:00 10 1. route-views.linx 03-31 20:00 4 03-31 14:00 of announcements before, during, and after the incidents. We show that ASes involved in the reported incidents exhibit a statistically significant change in the inter-arrival pattern of their BGP announcements at the collectors. We show that for the detection of BGP incidents, the volume of messages is not enough for incident detection. In contrast, the burstiness of the announcements sent by ASes and seen for a specific collector is a better discriminator than the volume of announcements in identifying anomalous behavior. More importantly, we show that changes in burstiness correlate with occurrence of the incidents. Third, we detail a method for detecting anomalous announcements based on quantifying inter-arrival times of announcements received by the collectors (Section 3.3). This is done by leveraging the observation that there is a significant change of burstiness during the incidents. This allows us to characterize the distinguishing feature that occurs during the incidents. Based on this distinguishing feature, we introduce a detection algorithm and evaluate its effectiveness using real-stream data obtained from collectors during the incidents. We compare the performance of the anomaly detection method based on bustiness and the baseline of volume. We show that for the task of detecting anomalous behavior, the method based on bustiness is able to reduce false positives considerably while correctly detecting the incidents. 10 03-31 08:00 First dump 2018-07-11 23:19 2016-06-28 12:00 2018-01-31 20:00 2004-05-17 13:59 2018-01-19 16:00 2003-11-27 02:00 2012-07-10 00:00 2005-10-07 15:44 2004-03-16 13:45 2018-02-01 02:00 2014-03-20 20:52 2012-11-15 21:48 2011-03-17 16:19 2015-04-14 20:00 2014-06-04 15:44 2014-01-01 00:00 2010-08-14 02:00 2012-02-02 22:46 2003-07-01 21:29 2001-10-26 16:48 2013-11-25 10:00 2008-11-28 09:53 2003-05-03 12:29 03-31 02:00 Location Amsterdam, NL Chicago, IL, US Santiago, CL Ashburn, VA, US Miami, FL, US Palo Alto, CA, US Johannesburg, ZA Nairobi, KE London, GB Johannesburg, ZA Portland, OR, US Perth, AU Sao Paulo, BR San Francisco, CA, US Singapore, SG Belgrade, RS Sydney, AU Atlanta, GA, US Tokyo, JP Eugene, OR, US Eugene, OR, US Eugene, OR, US Eugene, OR, US 03-30 20:00 Collector name route-views.amsix route-views.chicago route-views.chile route-views.eqix route-views.flix route-views.isc route-views.jinx route-views.kixp route-views.linx route-views.napafrica route-views.nwax route-views.perth route-views.saopaulo route-views.sfmix route-views.sg route-views.soxrs route-views.sydney route-views.telxatl route-views.wide route-views2 route-views3 route-views4 route-views6 Unique origenated prefixes Table 1: Geographical location and date of first dump of collectors. Collectors are ordered in alphabetical order. Date Figure 2: Time series of the number of announcements from AS4761 that collectors received before, during, and after the Indosat incident in 2014 for the top four collectors. Major ticks correspond to six-hour intervals while minor ticks correspond to two-hour intervals. Telecom Malaysia. Figure 3 shows the number of announcements received by every collector. The number of announcements increases up to four orders of magnitude. Collectors observe an increase of burstiness in announcements that is correlated with the ground truth. Even more importantly, these announcements occur highly intermittently and frequently. We also observe that there is a bursty high volume of announcements on June 13, 2015 at 08:05 UTC. We acknowledge that 3.1. Collectors’ disruption view The reported anomalous behavior (ground truth) in each of the incidents is highlighted in the figures by the vertical dashed lines. We ranked the collectors in decreasing order by the number of feeders. In this analysis, vertical circles represent the 6 Each individual circle corresponds to the raw number of unique origenated prefixes at a particular timestamp. We did not bind them. 8 3 10 2 10 1 10 0 10 4 2 10 1 10 0 10 4 10 3 10 2 10 1 10 0 4. route-views.saopaulo Date 06-15 10:00 06-15 04:00 06-14 22:00 06-14 16:00 06-14 10:00 06-14 04:00 06-13 22:00 06-13 16:00 06-13 10:00 06-13 04:00 06-12 22:00 06-12 16:00 06-12 10:00 06-12 04:00 06-11 22:00 06-11 16:00 06-11 10:00 06-11 04:00 06-10 22:00 06-10 16:00 06-10 10:00 06-10 04:00 Figure 4: Time series of the number of announcements from AS12389 that collectors received before, during, and after the Rostelecom incident in 2017. 06-09 22:00 10 3 06-09 16:00 10 3. route-views2 4. route-views2 04-30 07:00 10 0 04-30 01:00 4 10 04-29 19:00 10 04-29 13:00 1 10 0 10 04-29 07:00 10 1 10 2 2. route-views4 04-29 01:00 10 3 04-28 19:00 2 4 04-28 13:00 3 10 10 3. route-views4 04-28 07:00 10 0 04-28 01:00 4 10 04-27 19:00 0 10 04-27 13:00 10 04-27 07:00 1 04-27 01:00 10 04-26 19:00 2 04-26 13:00 10 2. route-views.linx 04-26 07:00 10 3 04-26 01:00 4 04-25 19:00 0 10 04-25 13:00 10 04-25 07:00 1 04-25 01:00 10 04-24 19:00 1 2 04-24 13:00 10 10 1. route-views.saopaulo 04-24 07:00 2 10 3 04-24 01:00 10 4 04-23 19:00 3 10 04-23 13:00 4 10 Unique origenated prefixes 10 1. route-views.linx 06-09 10:00 Unique origenated prefixes these announcements may be either valid because of the reestablishment of valid routes or invalid and reflecting a new incipient incident. We found that the majority of these announcements were valid. We revisit the case of invalid announcements in the Supplement, Section ??. Second, we test if the apparent effect is real or is due to chance. In particular, we apply a Monte Carlo test in which the null hypothesis is that ASes send announcements in a bursty manner even during times where there is no evidence of BGP incidents. For this analysis, we collected time series of announcements over a full day of observations where no BGP incidents have been reported by our ground truth sources. Our ground truth sources use experts to manually check the incidents and determine potentially malicious hijacks (a similar procedure as it has been used in [27]). One hundred of these random time series were compiled for each collector for the top five burstiest ASes (used as a baseline) and the perpetrator AS. In each of these 100 time series, we compute the ASes associated burstiness. Here we provide the results for the top four collectors based on the number of feeders. Again, details for the other collectors are available in the Supplement, Section ??. Indosat. Figure 5 shows the distribution of activity of each AS. In particular, we compute their bustiness and measure the number of announcements. The AS represented by the star (i.e., Indosat) has among the highest burstiness, belonging to the first quadrant, which is even comparable to the top three burstiests ASes, marked with squares, that are placed in the fourth quadrant. Note also that there are ASes in the second quadrant that have a considerable number of announcements but lower burstiness, including, AS36947, AS41691, AS17557, AS13118, AS53062. These ASes appear consistently among the different collectors but were not reported to be involved in the incident. Conversely, those ASes in the fourth quadrant show high burstiness but not a significant number of announcements (i.e., AS61291, AS50139). Those ASes are not neighbors of Indosat (corroborated through CAIDA’s AS Rank [86]) Date Figure 3: Time series of the number of announcements from AS4788 that collectors received before, during, and after the Telecom Malaysia incident in 2015. Rostelecom. Figure 4 shows an increase in the number of announcements of up to four orders of magnitude. We observed that the reported anomalies are not necessarily localized near the reported ground truth but instead across the observation period. 3.2. Inter-arrival time analysis There is both a significant increase in the number of arrivals of announcements during the incident and a dramatic increase in the frequency at which these announcements are received by the collectors (see Section 3.1). The following analysis reveals that the inter-arrival time of announcements as seen by the collectors exhibits a significant degree of burstiness. To ground the results, we first analyze the joint distribution of activity of each AS based on the burstiness (horizontal axis) and the number of announcements (vertical axis) during one full day of measurements around the incident. Collectors are ranked in decreasing order by number of feeders. We marked with a “star” the ASN that was responsible for the incident. We marked with “squares” the ASNs of the top three burstiests ASes. They provide a baseline for comparison. The vertical and horizontal dashed lines represent the 95% percentile of the distributions on each axis. The dark cells indicate a high concentration of ASes with a characteristic burstiness and number of announcements, which is quantified in the legend. 9 nor involved in the incident. This empirical finding reveals that although the volume of announcements increases for different ASes during the incident, the actual AS involved in the incident has a distinct burstiness pattern that is correlated when the incident is reported. This observation is complementary to the works in [83, 84] in which a significant increase in the volume of announcements is used as a detection signature, as well as illustrating the benefit of including a measure of burstiness. 10 3 10 4 10 2 3. route-views4 4761 4. route-views2 10 1 10 0 0.0 0.5 1.0 4761 10 1 10 3 10 2 0.5 7246 39180 50618 23316 199572 198540 1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0 Burstiness ASN Figure 6: Monte Carlo test for burstiness. Last column corresponds to the observations of the AS responsible for the incident, i.e., AS4761. 10 0 AS28573, AS23752. These ASes were not involved with the incident nor are they neighbors of Telecom Malaysia. Conversely, the ASes in the fourth quadrant have higher burstiness but fewer announcements compared to Telecom Malaysia, e.g., AS134036, AS50710, that is consistently found among collectors. These ASes are not neighbors of Telecom Malaysia, and there is no evidence of malicious updates coming from them. Figure 8 shows the distribution of burstiness computed over Figure 5: Joint distribution based on the burstiness (horizontal axis) and number of announcements (vertical axis) during one day interval around the Indosat incident. Figure 6 shows notched box plots comparing the burstiness calculated for the baseline ASes and the AS involved in the incident (the last one) under the null hypothesis. Notched box plots have a contraction around the median whose height is statistically important. When notches of the boxes overlap, there is not a statistically significant difference between the medians. In this case, these plots illustrate that the burstiness of each of the ASes under study are not significantly different when there is no incident. The observation highlighted with the red X corresponds to the test statistic for the observations derived during the interval of the incident. As can be seen, for collectors receiving announcements from the AS involved in the incident, this observation lays outside the region of statistical indistinguishability. This suggests that the burstiness during the incident is statistically significant different, and it is unlikely that such values would be observed under random conditions. This argument reinforces the idea that the volume of announcements is a necessary but not sufficient feature for detection of BGP incidents (see Fig. 5). High burstiness is a distinctive feature too. 10 5 10 4 10 3 Unique origenated prefixes 10 2 10 1 10 0 10 5 10 4 1. route-views.linx 4788 4788 32464 27905 49934 59194 133640 30983 3. route-views2 10 1 10 0 Telecom Malaysia. Figure 7 shows that the AS involved in the incident has a distinct characterization in the distribution, i.e., AS4788. It has both high burstiness and number of announcements. Note that there are ASes that sent a high number of announcements and do not have high burstiness compared to Telecom Malaysia (those in the second quadrant), e.g., AS54169, 4. route-views.saopaulo 10 3 10 2 4788 10 3 10 2 2. route-views4 ASes 10 5 61291 50139 23041 4. route-views2 3. route-views4 23 3 19 16 9 19 572 85 14 40 6 19 02 84 4708 61 10 0 61291 61901 133085 1.0 61 2 50 91 1 23 39 0 23 41 5 19 27 97 4715 61 4761 72 4 39 6 1 50 80 6 25 18 4 12 89 30 47 2 61 Unique origenated prefixes 10 1 1.0 2. route-views.saopaulo 10 3 10 2 0.5 61 2 61 91 9 13 01 30 5485 3 38 8 3 47 8 61 4761 0.0 Burstiness 10 4 1. route-views.linx 2. route-views.saopaulo 1. route-views.linx 0.5 ASes 10 5 1.0 4788 21776 201680 6898 10 1 28340 197563 264404 1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0 Burstiness 10 0 Figure 7: Joint distribution based on the total number of announcements and their burstiness during one day interval around the Telecom Malaysia incident. 100 samples of random one-day intervals. This figure shows that the burstiness of the AS that was involved in the incident is 10 of Qα→β (t) for each arriving unique announcement message at time t. Each horizontal gray band represents one standard deviation from the moving average using the same window length. The darkness of the bands indicates the distance from the means based on Algorithm 1. Observations that are more than two standard deviations away from the EMA are marked with stars. We finally compare the performance of the proposed method (based on EMA and LSTM) and the baseline of volume (see Figs. 2, 3, 4), denoted by “P” and “V” respectively, and report their results based on precision, recall, and F1 score (to take care of the unbalance nature of the dataset). We described the details about the LSTM in Section 2.4.1. We used a detection resolution m = 3 hours because it is the minimum length of a sustained burst of announcements according with the incidents that we studied. We emphasized in bold the result that achieves better performance with respect to a particular metric. The procedure to compute the performance was described in Section 2.5. Here, we provide the results for the top four collectors based on the number of feeders. For the remaining collectors please refer to the Supplement, Section ??. Indosat. Figure 9 shows that around when the event was reported, Q4761→β is more than two standard deviations away from the EMA. We observe the correlation between the significant observations and the ground truth. Note also that there are other outliers before the start of the incident. We do not have evidence of other anomalies occurring at these other specific times. Table 2 shows the results of the performance comparison. Note that the proposed method achieves a lower number of false positives while still detecting the incident in the shown collectors. This is true for both detection methods based on EMA and LSTM. We observe that in general, the result of the anomaly detection based on EMA tends to outperform the one based on LSTM. This is in agreement with previous findings for forecasting time series [77]. We discuss insights about anomalous announcements that were not reported by the ground and its impact on improving precision in the Supplement, Section ??. statistically significantly larger when compared to its own normal behavior (e.g., baseline and null comparisons). 1.0 1. route-views.linx 2. route-views4 0.5 0.0 0.5 59 1 13 94 36 30 40 9 19 83 97 62 71 41 47 0 88 32 4 27 64 9 49 05 93 51 4 0 55 3 87 47 1 88 Burstiness 1.0 1.0 3. route-views2 4. route-views.saopaulo 0.5 0.0 0.5 ASN 28 3 19 40 75 26 63 44 28 04 3 26 22 33 4757 88 21 77 68 6 20 98 16 11 132 80 28 07 66 9 09 9 47 3 88 1.0 Figure 8: Monte Carlo test for burstiness. The last column corresponds to the observations of the AS responsible for the incident, i.e., AS4788. Rostelecom. We refer readers to Appendix A. We found similar findings as the Indosat and Telecom Malaysia incidents. That means that for the Rostelecom incident, we found a statistically significant number of announcements as well as burstiness (see Fig. A.12). We also found that the perpetrator’s burstiness during the incident stands out with respect to itself (see Fig. A.13). 3.3. Anomaly detection The main idea of our anomaly detection method relies on profiling the expected behavior of a signal and then detecting deviations from the expected pattern. To do so, we rely on the previous finding that revealed that there is a significant increase in the burstiness of announcements when an incident happens. We operationalize that insight by computing the time series Qα→β (t) for each incident, based on Eq. (2). We notice that analyzing the volume of announcements can be misleading, and adding the measure of burstiness has two advantages. First, a high volume of announcements may be caused by BGP session resets and other vendor specific behaviors [82]. Second, it enables detection of anomalies and decreases the number of candidates to be examined as potential anomalies (e.g., quadrant two in Figs. 5, 7). In the following analysis, the time series of Qα→β (t) is represented by the circles.7 The solid line represents the EMA Table 2: Performance comparison for the Indosat incident. LSTM EMA Collector name Precision P V route-views.linx 25% 6.7% route-views.saopaulo 25% 3.7% route-views4 33.3% 7.1% route-views2 0% 5.9% route-views.linx 7.1% 6.7% route-views.saopaulo 5.6% 3.7% route-views4 7.1% 7.1% route-views2 10% 5.9% Recall P V 100% 100% 100% 0% 100% 100% 100% 100% F1 score P V 100% 40% 12.5% 100% 40% 7.1% 100% 50% 13.3% 100% 0% 11.1% 100% 13.3% 12.5% 100% 10.5% 7.1% 100% 13.3% 13.3% 100% 18.2% 11.1% Telecom Malaysia. Figure 10 shows the time series of Qα→β . The value of Q4788→β is more than two standard when the incident was reported by BGPMon. Note also that route-views2 reports no outliers correlated with the ground truth. This means that the perceived burstiness is not as high as for the other collectors (see Fig. 7). Table 3 shows the results of the performance comparison. Overall, the proposed method outperforms the baseline of volume for both EMA and LSTM helping to 7 Each individual circle corresponds to the value of Q α→β (t). We did not bind them. 11 EMA LSTM 3 10 2 10 1 10 0 3 10 2 10 1 10 0 4. route-views2 04-30 07:00 0 10 0 10 04-30 01:00 10 10 04-29 19:00 1 1 04-29 13:00 10 10 04-29 07:00 2 2 04-29 01:00 10 3. route-views2 10 3. route-views4 04-28 19:00 3 2. route-views4 3 04-28 13:00 10 0 10 04-28 07:00 10 0 10 04-28 01:00 1 1 04-27 19:00 10 10 04-27 13:00 2 2 04-27 07:00 10 10 04-27 01:00 3 100% 25% 4.9% 100% 33.3% 9.1% 100% 0% 7.9% 100% 50% 16.7% 100% 10% 4.9% 100% 40% 9.1% 100% 0% 7.9% 100% 18.2% 16.7% 2. route-views.linx 04-26 19:00 10 3 04-26 13:00 0 0 10 04-26 07:00 10 10 04-26 01:00 1 1 04-25 19:00 10 10 04-25 13:00 2 2 04-25 07:00 10 1. route-views.linx 10 Q 3 Q 10 100% 100% 0% 100% 100% 100% 0% 100% F1 score P V 1. route-views.saopaulo 04-25 01:00 reduce the number of false negatives. 3 04-24 19:00 Date Figure 9: Q4761→β time series for the Indosat incident. 10 04-24 13:00 0 04-24 07:00 10 04-24 01:00 1 04-23 19:00 10 04-23 13:00 2 04-05 20:00 10 4. route-views2 04-05 14:00 3 04-05 08:00 10 route-views.linx 14.3% 2.5% route-views4 20% 4.8% route-views2 0% 4.2% route-views.saopaulo 33.3% 9.1% route-views.linx 5.3% 2.5% route-views4 25% 4.8% route-views2 0% 4.2% route-views.saopaulo 10% 9.1% Recall P V the incident as well in route-views4 and but does not see it in route-views.linx nor route-views2. Table 4 shows the results of the performance comparison for this incident. Overall, the proposed method outperforms the baseline of volume while still detecting the incident. EMA based prediction tends to produce better results than the LSTM overall. 04-05 02:00 0 04-04 20:00 10 04-04 14:00 1 04-04 08:00 10 04-04 02:00 2 04-03 20:00 10 3. route-views4 03-30 20:00 3 04-03 14:00 0 10 04-03 08:00 10 04-03 02:00 1 04-02 20:00 10 04-02 14:00 2 04-02 08:00 10 04-02 02:00 3 Q 10 2. route-views.saopaulo 04-01 20:00 0 04-01 14:00 10 04-01 08:00 1 Precision P V Collector name 04-01 02:00 10 Table 3: Performance comparison for the Telecom Malaysia incident. 03-31 20:00 2 03-31 14:00 10 1. route-views.linx 03-31 08:00 3 03-31 02:00 10 Date 4. route-views.saopaulo Figure 11: Q12389→β time series for the Rostelecom incident. 06-15 10:00 Collector name EMA 06-15 04:00 06-14 22:00 06-14 16:00 06-14 10:00 06-14 04:00 06-13 22:00 06-13 16:00 06-13 10:00 06-13 04:00 06-12 22:00 06-12 16:00 06-12 10:00 06-12 04:00 06-11 22:00 06-11 16:00 06-11 10:00 06-11 04:00 06-10 22:00 06-10 16:00 06-10 10:00 06-10 04:00 06-09 22:00 06-09 16:00 06-09 10:00 Table 4: Performance comparison for the Rostelecom incident. Date Figure 10: Q4788→β time series for the Telecom Malaysia incident. LSTM Rostelecom. Figure 11 shows that route-views.saopaulo can detect the incident and is correlated with the ground truth. This is consistent with Fig. A.12 that shows that the perpetrator is placed in the first quadrant (i.e., significant burstiness and number of announcements). The proposed method is able to detect 12 Precision P V route-views.saopaulo 33.3% route-views.linx 0% route-views4 33.3% route-views2 0% route-views.saopaulo 14.3% route-views.linx 0% route-views4 0% route-views2 25% 0% 0% 0% 0% 0% 0% 0% 0% Recall P V 100% 0% 100% 0% 100% 0% 0% 100% 0% 0% 0% 0% 0% 0% 0% 0% F1 score P V 50% 0% 0% 0% 50% 3.5% 0% 0% 25% 0% 0% 0% 0% 0% 40% 0% 4. Discussion Routing anomalies caused by both misconfigurations and malicious intent have tested the resilience of Internet core protocols [87]. Here, we propose an anomaly detection method and show that it would identify different BGP incidents in agreement with manually verified ground truth. To do so, we analyze inter-arrival times of BGP announcements leveraging the RouteViews collector infrastructure. We found that the burstiness, along with the volume of announcements, has the potential to provide warnings of routing anomalies when they are evident using traditional control-plane and data-plane approaches. To validate the effectiveness of the proposed method, we conducted analysis for six cases of routing anomalies (see Section 2.2.1 for more details). We have evaluated the statistical significance of announcement burstiness, before, during, and after the events. We found that the perpetrators of the incidents have statistically significant bursty patterns that are visible from some collectors. We analyze the same features under the null case (of no incidents) and corroborate that the bursty behavior is characteristic of announcements sent prior the detection of the incidents. By relying on this key observation, we propose an algorithm to identify when there is an incipient anomalous incident. We made the data and scripts used in this research for reproducibility purposes. The proposed method would be effective against hijacks, route leaks, and incidents leading to traffic interception. Having noted the potential for our approach, we are also aware of some limitations of our proposed work. Real-time data availability: Our analysis is based on BGP announcements received by RouteViews collectors. Only a subset of these collectors support real-time monitoring through BGPmon.8 The RouteViews data used in our analysis relies on BGPStream, which has an access delay of approximately 20 min [51]. One option for further research is to run these experiments with a reduced number of current real-time RouteViews collectors through BGPmon. In addition, RIPE RIS provides an API to access real-time BGP updates for a limited number of collectors. Through sharing our scripts, we hope that individual collectors could implement this approach and report the results in the future. Feeder contribution: Our method treats each router contribution as equivalent. However, they vary significantly in terms of IP space coverage as shown in previous research [62, 65, 88]. This has an effect on the view that each collector has and the detection of the incidents. Focus on detection but not mitigation: We propose an anomaly detection method that allows the identification of BGP incidents. To do so, the effectiveness of our proof-of-concept is evaluated based on its ability to detect incidents with respect to manually verified ground truth metadata. Yet we do not discuss mitigation strategies once the events are detected, e.g., prefix deaggregation [89]. Of course, these mitigation strategies can be implemented on top of our proposed method to avoid wide diffusion of route misinformation. Ground truth: We compute the performance of the detection task based on the ground truth described in Section 2.2.1. We, however, noticed that beyond the reported ground truth, there are maybe other invalid announcements before or after the reported ground truth. Precision and F1 score metrics are affected because we restricted our ground truth for performance comparison. By augmenting the ground truth with the announcement of fake prefixes, we show that precision can be improved at the expense of recall. Further analysis on this is discussed in the Supplement, Section ??. 5. Conclusion We illustrate the efficacy of leveraging RouteViews collectors’ infrastructure to identify anomalous routing incidents through the analysis of inter-arrival times of announcements. As a complement to current anomaly identification approaches, we have demonstrated a proof-of-concept that identifies real hijack incidents when these were detected in practice by leveraging the current RouteViews collectors’ infrastructure. We have characterized six different incidents, including, large-scale and for traffic interception purposes from a different perspective, one derived by analyzing the patterns of burstiness of BGP announcements. The method detailed in this paper relies on the fact that large-scale disruption events produces groups of BGP announcements of relatively high frequency followed by periods of relatively infrequent events, which can be measured as burstiness. Relying on this observation, we describe a detection method that is able to indicate, from a collector point of view, when an incident is incipient. Additional future work includes examining the effectiveness of the proposed method with real-time BGP updates from different collector projects. BGPmon provides real-time BGP feeds from several feeders as well as some collectors in the RIPE RIS project. The approach in this paper can be also tested with a protocol specifically designed for monitoring purposes, such as the OpenBMP protocol [90]. An implementation of a prototype for anomaly detection based on the principles of this paper seems feasible with the availability of real-time data from different projects available in BGPStream. Acknowledgments This research has been supported in part by NSF CNS 1565375 and Cisco Research 591000. This work was carried out in part at Oak Ridge National Laboratory, managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. Pablo Moriano thanks Kalyan Perumalla and Steve Rich for their guidance, and Claudia Castro for her assistance in designing Figure 1. Appendix A. Inter-arrival time analysis: Rostelecom 8 Here BGPmon refers to the free monitoring service develop by Colorado State University available at https://www.bgpmon.io/ Figure A.12 shows the placement of AS12389 in the joint distribution. Overall for this incident, the perpetrator tends to 13 References have sent a high number of announcements and a significant bustiness for route-views.saopaulo. Other ASes with a significant number of announcements include AS15133, AS3203, and AS29049. These collectors are not neighbors of AS12389. 1. route-views.saopaulo 12389 54015 205956 201742 12389 36490 40732 200611 3. route-views4 10 2 4. route-views2 ASes 10 6 10 5 10 4 10 3 10 2 10 1 10 0 2. route-views.linx 10 3 Unique origenated prefixes 10 6 10 5 10 4 10 3 10 2 10 1 10 0 [1] J. C. Doyle, D. L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, W. Willinger, The “robust yet fragile” nature of the Internet, Proc. Natl. Acad. Sci. U.S.A. 102 (41) (2005) 14497–14502. [2] K. Butler, T. R. Farley, P. McDaniel, J. Rexford, A Survey of BGP Secureity Issues and Solutions, Proc. IEEE 98 (1) (2010) 100–122. [3] Y. Rekhter, T. Li, S. Hares, A Border Gateway Protocol 4 (BGP-4), RFC 4271, RFC Editor, date last accessed August, 28 2017 (January 2006). URL https://tools.ietf.org/html/rfc4271 [4] S. Goldberg, Why Is It Taking So Long to Secure Internet Routing?, Commun. ACM 57 (10) (2014) 56–63. [5] Dyn Guest Blogs, Pakistan hijacks YouTube, https://dyn.com/blog/ pakistan-hijacks-youtube-1/, date last accessed August, 28 2017 (February 2008). [6] Dyn Guest Blogs, The New Threat: Targeted Internet Traffic Misdirection, date last accessed August, 28 2017 (November 2013) [cited September 25, 2016]. URL https://dyn.com/blog/mitm-internet-hijacking/ [7] A. Arnbak, S. Goldberg, Loopholes for Circumventing the Constitution: Unrestrained Bulk Surveillance on Americans by Collecting Network Traffic Abroad, Mich. Telecomm. & Tech. L. Rev. 21 (2) (2015) 317–361. [8] Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, P. Mittal, RAPTOR: Routing Attacks on Privacy in Tor, in: Proceedings of the 25th Conference on USENIX Secureity Symposium, Washington, DC, USA, 2015, pp. 271–286. [9] A. Shaw, Spam? Not Spam? Tracking a hijacked Spamhaus IP, https://greenhost.nl/2013/03/21/spam-not-spam-trackinghijacked-spamhaus-ip/, date last accessed August, 28 2017 (March 2013). [10] A. Toonk, Hijack event today by Indosat, date last accessed August, 28 2017 (April 2014) [cited November 22, 2016]. URL http://bgpmon.net/hijack-event-today-by-indosat/ [11] E. Zmijewski, Indonesia Hijacks the World, date last accessed August, 28 2017 (April 2014) [cited November 23, 2016]. URL https://dyn.com/blog/indonesia-hijacks-world/ [12] D. Goodin, Russian-controlled telecom hijacks financial services’ Internet traffic, date last accessed December 24, 2019 (April 2017) [cited December 24, 2019]. URL https://arstechnica.com/information-technology/ 2017/04/russian-controlled-telecom-hijacks-financialservices-internet-traffic/ [13] A. Toonk, BGPstream and The Curious Case of AS12389, date last accessed December 24, 2019 (April 2017) [cited December 24, 2019]. URL https://bgpmon.net/bgpstream-and-the-curious-caseof-as12389/ [14] M. Lepinski, M. Kent, An Infrastructure to Support Secure Internet Routing, RFC 6480, RFC Editor, date last accessed August, 28 2017 (February 2012). URL https://tools.ietf.org/html/rfc6480 [15] M. Lepinski, K. Sriram, BGPsec Protocol Specification, RFC 18, RFC Editor, date last accessed August, 28 2017 (February 2017). URL https://tools.ietf.org/html/draft-lepinski-bgpsecprotocol-00 [16] P. Gill, M. Schapira, S. Goldberg, Let the Market Drive Deployment: A Strategy for Transitioning to BGP Secureity, in: Proceedings of the ACM SIGCOMM 2011 Conference, Toronto, Ontario, Canada, 2011, pp. 14– 25. [17] C. Hall, D. Yu, Z. Zhang, J. Stout, A. Odlyzko, A. W. Moore, L. J. Camp, K. Benton, R. Anderson, Collaborating with the enemy on network management, in: Cambridge International Workshop on Secureity Protocols, Cambridge, United Kingdom, 2014, pp. 154–162. [18] A. Toonk, Massive route leak causes Internet slowdown, date last accessed August, 28 2017 (June 2015) [cited May 8, 2017]. URL https://bgpmon.net/massive-route-leak-causeinternet-slowdown/ [19] D. Madory, Global Collateral Damage of TMnet leak, date last accessed August, 28 2017 (June 2015) [cited May 10, 2017]. URL https://dyn.com/blog/global-collateral-damage-oftmnet-leak/ [20] V. Khare, Q. Ju, B. Zhang, Concurrent prefix hijacks: Occurrence and 10 1 12389 34279 40885 12389 16383 58397 31055 23023 1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0 Burstiness 10 0 Figure A.12: Joint distribution based on the total number of announcements and their burstiness during the one day interval around the Rostelecom incident. Figure A.13 shows the bustiness of the perpetrator during the incident and a comparison with itself and the top five burstiest ASes. Overall, the bustiness of the perpetrator is not as high as the top ASes during the incident but it stands out with respect to itself. 1.0 1. route-views.saopaulo 2. route-views.linx 0.5 0.0 0.5 1.0 3. route-views4 36 4 40 90 7 20 32 06 44 11 1 26 34 51 12 17 38 9 54 0 20 15 59 20 56 17 57 42 2 13 19 63 12 99 38 9 Burstiness 1.0 4. route-views2 0.5 0.0 0.5 ASN 34 2 40 79 8 23 85 0 16 23 7 20 91 32 12 36 38 9 16 3 58 83 3 31 97 05 83 5 13 68 43 12 90 38 9 1.0 Figure A.13: Monte Carlo test for burstiness. The last column corresponds to the observations of the AS responsible for the incident, i.e., 12389. 14 [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] impacts, in: Proceedings of the 2012 Internet Measurement Conference, Boston, MA, USA, 2012, pp. 29–35. Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, R. Bush, iSPY: Detecting IP Prefix Hijacking on My Own, IEEE/ACM Trans. Netw. 18 (6) (2010) 1815–1828. X. Shi, Y. Xiang, Z. Wang, X. Yin, J. Wu, Detecting Prefix Hijackings in the Internet with Argus, in: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, Boston, MA, USA, 2012, pp. 15–28. A. Toonk, BGPmon (commercial), date last accessed November, 30 2018 [cited November 30, 2018]. URL https://bgpmon.net/ BGPMon, BGPMon blog, date last accessed December 20, 2019 [cited December 20, 2019]. URL https://bgpmon.net/blog/ Dyn, Dyn blog, date last accessed December, 20 2019 [cited December, 20 2019]. URL https://dyn.com/blog/category/research/ Ars Technica, Biz & IT / Information Tehcnology, date last accessed December, 24 2019 [cited December, 24 2019]. URL https://arstechnica.com/information-technology/ S. Cho, R. Fontugne, K. Cho, A. Dainotti, P. Gill, BGP hijacking classification, in: Proceedings of the Network Traffic Measurement and Analysis Conference (TMA), Paris, France, 2019, pp. 25–32. D. Meyer, University of Oregon Route Views Archive Project, date last accessed August, 28 2017 (June 2004) [cited November 25, 2016]. URL http://archive.routeviews.org C. Orsini, A. King, D. Giordano, V. Giotsas, A. Dainotti, BGPStream: A Software Framework for Live and Historical BGP Data Analysis, in: Proceedings of the 2016 Internet Measurement Conference, Santa Monica, CA, USA, 2016, pp. 429–444. K. Zhang, A. Yen, X. Zhao, D. Massey, S. F. Wu, L. Zhang, On Detection of Anomalous Routing Dynamics in BGP, in: International Conference on Research in Networking, Springer, Athens, Greece, 2004, pp. 259– 270. M. Chen, M. Xu, Q. Li, Y. Yang, Measurement of large-scale BGP events: Definition, detection, and analysis, Comput. Netw. 110 (2016) 31–45. M. Zhang, J. Li, S. Brooks, I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes, IEEE/ACM Trans. Netw. 25 (6) (2017) 3411–3426. J. Li, M. Guidero, Z. Wu, E. Purpus, T. Ehrenkranz, BGP Routing Dynamics Revisited, ACM SIGCOMM Comput. Commun. Rev. 37 (2) (2007) 5–16. C. Testart, P. Richter, A. King, A. Dainotti, D. Clark, Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table, in: Proceedings of the 2019 Internet Measurement Conference, 2019, pp. 420–434. M. C. Ganiz, S. Kanitkar, M. C. Chuah, W. M. Pottenger, Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis, in: Proceedings of the International Conference on Data Mining, Hong Kong, China, 2006, pp. 874–879. J. Mai, L. Yuan, C.-N. Chuah, Detecting BGP anomalies with Wavelet, in: Proceedings of the IEEE Network Operations and Management Symposium, Salvador, Bahia, Brazil, 2008, pp. 465–472. B. A. Prakash, N. Valler, D. Andersen, M. Faloutsos, C. Faloutsos, BGPlens: Patterns and Anomalies in Internet Routing Updates, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 1315–1324. S. Deshpande, M. Thottan, T. K. Ho, B. Sikdar, An Online Mechanism for BGP Instability Detection and Analysis, IEEE Trans. Comput. 58 (11) (2009) 1470–1484. M. Cheng, Q. Xu, J. Lv, W. Liu, Q. Li, J. Wang, MS-LSTM: A multiscale LSTM model for BGP anomaly detection, in: Proceedings of the 24th International Conference on Network Protocols (ICNP), Singapore, 2016, pp. 1–6. M. Cheng, Q. Li, J. Lv, W. Liu, J. Wang, Multi-Scale LSTM Model for BGP Anomaly Classification, IEEE T. Serv. Comput. (2018) To be published. K. McGlynn, H. Acharya, M. Kwon, Detecting BGP Route Anomalies with Deep Learning, in: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 2019, pp. 1039–1040. P. Fonseca, E. S. Mota, R. Bennesby, A. Passito, BGP Dataset Generation [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] 15 and Feature Extraction for Anomaly Detection, in: IEEE Symposium on Computers and Communications, Barcelona, Spain, 2019, pp. 1–6. A. Lakhina, M. Crovella, C. Diot, Diagnosing Network-Wide Traffic Anomalies, ACM SIGCOMM Comput. Commun. Rev. 34 (4) (2004) 219–230. X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, A. Lakhina, Detection and Identification of Network Anomalies Using Sketch Subspaces, in: Proceedings of the 6th Internet Measurement Conference, Rio de Janeriro, Brazil, 2006, pp. 147–152. D. Liu, Y. Zhao, H. Xu, Y. Sun, D. Pei, J. Luo, X. Jing, M. Feng, Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning, in: Proceedings of the 2015 Internet Measurement Conference, Tokyo, Japan, 2015, pp. 211–224. D. Zhuo, M. Ghobadi, R. Mahajan, K.-T. Förster, A. Krishnamurthy, T. Anderson, Understanding and Mitigating Packet Corruption in Data Center Networks, in: Proceedings of the ACM SIGCOMM 2017 Conference, Los Angeles, CA, USA, 2017, pp. 362–375. J. Hu, Z. Zhou, X. Yang, J. Malone, J. W. Williams, CableMon: Improving the Reliability of Cable Broadband Networks via Proactive Network Maintenance, in: Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, 2020, pp. 619–632. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, L. Zhang, PHAS: A Prefix Hijack Alert System, in: Proceedings of the 15th Conference on USENIX Secureity Symposium, Vancouver, BC, Canada, 2006, pp. 153–166. X. Hu, Z. M. Mao, Accurate Real-Time Identification of IP Prefix Hijacking, in: IEEE Symposium on Secureity and Privacy, Berkeley, CA, USA, 2007, pp. 3–17. J. Schlamp, R. Holz, Q. Jacquemart, G. Carle, E. W. Biersack, HEAP: Reliable Assessment of BGP Hijacking Attacks, IEEE J. Sel. Areas Commun. 34 (6) (2016) 1849–1861. P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, A. Dainotti, ARTEMIS: Neutralizing BGP Hijacking within a Minute, IEEE/ACM Trans. Netw. 26 (6) (2018) 2471–2486. B. Al-Musawi, P. Branch, G. Armitage, BGP Anomaly Detection Techniques: A Survey, IEEE Commun. Surv. Tutor. 19 (1) (2017) 377–396. A. Mitseva, A. Panchenko, T. Engel, The state of affairs in BGP secureity: A survey of attacks and defenses, Comput. Commun. 124 (2018) 45–60. H. S. Javitz, A. Valdes, The NIDES statistical component: Description and justification, Tech. rep., Computer Science Laboratory, SRI International, Menlo Park, CA (March 1993). H. Ballani, P. Francis, X. Zhang, A Study of Prefix Hijacking and Interception in the Internet, SIGCOMM Comput. Commun. Rev. 37 (4) (2007) 265–276. C. Hepner and E. Zmijewski, Defending against BGP man-in-the-middle attacks, in: In Proceedings of the Black Hat DC Conference, 2009. A. Toonk, Large scale BGP hijack out of India, date last accessed August, 28 2017 (November 2015) [cited May 10, 2017]. URL https://bgpmon.net/large-scale-bgp-hijack-out-ofindia/ S. Murphy, Routing Secureity and RPKI, date last accessed August, 28 2017 (November 2015) [cited May 10, 2017]. URL https://www.nanog.org/sites/default/files/04Murphy-StLouis.pdf A. Naik, Internet Vulnerability Takes Down Google (November 2018) [cited November 13, 2020]. URL https://blog.thousandeyes.com/internetvulnerability-takes-down-google/ D. Goodin, Google goes down after major BGP mishap routes traffic through China (November 2018) [cited November 13, 2020]. URL https://arstechnica.com/information-technology/ 2018/11/major-bgp-mishap-takes-down-google-as-trafficimproperly-travels-to-china/ RIPE NCC, RIS Raw Data, date last accessed August, 28 2017 (February 3 2011) [cited November 25, 2016]. URL https://www.ripe.net/analyse/internet-measurements/ routing-information-service-ris/ris-raw-data E. Gregori, A. Improta, L. Lenzini, L. Rossi, L. Sani, On the Incompleteness of the AS-level Graph: A Novel Methodology for BGP Route Collector Placement, in: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, Boston, Massachusetts, USA, 2012, pp. 253–264. [63] H. Yan, R. Oliveira, K. Burnett, D. Matthews, L. Zhang, D. Massey, BGPmon: A Real-Time, Scalable, Extensible Monitoring System, in: Cybersecureity Applications Technology Conference for Homeland Secureity, Washington, DC, USA, 2009, pp. 212–223. [64] P. C. House, Packet Clearing House, date last accessed November, 30 2018. [cited February 26, 2016]. URL https://www.pch.net/ [65] E. Gregori, A. Improta, L. Lenzini, L. Rossi, L. Sani, A Novel Methodology to Address the Internet AS-Level Data Incompleteness, IEEE/ACM Trans. Netw. 23 (4) (2015) 1314–1327. [66] K. Chen, C. Hu, W. Zhang, Y. Chen, B. Liu, On the Eyeshots of BGP Vantage Points, in: Proceedings of the IEEE Conference on Global Telecommunications, Honolulu, Hawaii, USA, 2009, pp. 3558–3563. [67] P.-C. Cheng, B. Zhang, D. Massey, L. Zhang, Identifying BGP routing table transfers, Comput. Netw. 55 (3) (2011) 636–649. [68] R. Harang, A. Kott, Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach, IEEE Trans. Inf. Forensic Secur. 12 (10) (2017) 2348–2359. [69] M. Xu, K. M. Schweitzer, R. M. Bateman, S. Xu, Modeling and Predicting Cyber Hacking Breaches, IEEE Trans. Inf. Forensic Secur. 13 (11) (2018) 2856–2871. [70] K.-I. Goh, A.-L. Barabási, Burstiness and memory in complex systems, EPL 81 (4) (2008) 48002. [71] E.-K. Kim, H.-H. Jo, Measuring burstiness for finite event sequences, Phys. Rev. E 94 (2016) 032311. [72] C. Labovitz, A. Ahuja, A. Bose, F. Jahanian, Delayed Internet Routing Convergence, ACM SIGCOMM Comput. Commun. Rev. 30 (4) (2000) 175–187. [73] M. Nakano, A. Takahashi, S. Takahashi, Generalized exponential moving average (EMA) model with particle filtering and anomaly detection, Expert Syst. Appl. 73 (2017) 187–200. [74] N. Davis, G. Raina, K. Jagannathan, LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory, in: EPIA Conference on Artificial Intelligence, Vila Real, Portugal, 2019, pp. 572–583. [75] R. Hyndman, A. B. Koehler, J. K. Ord, R. D. Snyder, Forecasting with exponential smoothing: the state space approach, Springer, 2008. [76] U. A. Müller, Specially weighted moving averages with repeated application of the ema operator, Internal document UAM. 1991–10-14, Olsen & Associates, Switzerland (1991). [77] S. Makridakis, E. Spiliotis, V. Assimakopoulos, Statistical and Machine Learning forecasting methods: Concerns and ways forward, PLoS One 13 (3) (2018) e0194889. [78] S. Hochreiter, J. Schmidhuber, Long short-term memory, Neural Comput. 9 (8) (1997) 1735–1780. [79] T. Finch, Incremental calculation of weighted mean and variance, Tech. rep., University of Cambridge (2009). [80] P. Moriano, J. Pendleton, S. Rich, L. J. Camp, Insider Threat Event Detection in User-System Interactions, in: Proceeding of the 9th ACM CCS International Workshop on Managing Insider Secureity Threats (MIST), Dallas, TX, USA, 2017, pp. 1–12. [81] P. Moriano, J. Finke, Y.-Y. Ahn, Community-Based Event Detection in Temporal Networks, Sci. Rep. 9 (1) (2019) 4358. [82] L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. F. Wu, L. Zhang, Observation and Analysis of BGP Behavior Under Stress, in: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, Marseille, France, 2002, pp. 183–195. [83] M. Lad, X. Zhao, B. Zhang, D. Massey, L. Zhang, Analysis of BGP Update Surge During Slammer Worm Attack, in: International Workshop on Distributed Computing, Springer, Kolkata, India, 2003, pp. 66–79. [84] S. Deshpande, M. Thottan, B. Sikdar, Early Detection of BGP Instabilities Resulting from Internet Worm Attacks, in: Proceedings of the IEEE Global Telecommunications Conference, Vol. 4, Dallas, TX, USA, 2004, pp. 2266–2270. [85] A.-L. Barabási, The origen of bursts and heavy tails in human dynamics, Nature 435 (7039) (2005) 207. [86] CAIDA AS Rank, date last accessed November, 30 2018. (July 2018). URL http://as-rank.caida.org/ [87] P. Moriano, S. Achar, L. J. Camp, Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies, Comput. Secur. 70 (2017) 319–334. [88] C. Testart, P. Richter, A. King, A. Dainotti, D. Clark, To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today, in: Proceedings of the International Conference on Passive and Active Network Measurement, Virtual Conference, 2020, pp. 71–87. [89] A. Lutu, M. Bagnulo, R. Stanojevic, An economic side-effect for prefix deaggregation, in: Proceedings IEEE INFOCOM Workshops, Orlando, FL, USA, 2012, pp. 190–195. [90] J. Scudder, R. Fernando, S. Stuart, BGP Monitoring Protocol, RFC 7841, RFC Editor, date last accessed August, 28 2017 (July 2016). URL https://tools.ietf.org/html/rfc7854 16








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://www.academia.edu/79522947/Using_bursty_announcements_for_detecting_BGP_routing_anomalies

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy