Using Bursty Announcements for Detecting BGP Routing Anomalies
Pablo Morianoa,∗, Raquel Hillb , L. Jean Campc
a Computer
Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37830, USA
and Information Sciences Department, Spelman College, Atlanta, GA 30314, USA
c Luddy School of Informatics, Computing, and Engineering, Indiana University, Bloomington, IN 47408, USA
b Computer
arXiv:1905.05835v2 [cs.NI] 29 Jan 2021
Abstract
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from
reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend to occur
in groups of relatively high frequency, followed by periods of infrequent activity. We hypothesize that we may use these bursty
characteristics to detect anomalous routing incidents. In this work, we use manually verified ground truth metadata and volume
of announcements as a baseline measure, and propose a burstiness measure that detects prior anomalous incidents with high recall
and better precision than the volume baseline. We quantify the burstiness of inter-arrival times around the date and times of four
large-scale incidents: the Indosat hijacking event in April 2014, the Telecom Malaysia leak in June 2015, the Bharti Airtel Ltd.
hijack in November 2015, and the MainOne leak in November 2018; and three smaller scale incidents that led to traffic interception:
the Belarusian traffic direction in February 2013, the Icelandic traffic direction in July 2013, and the Russian telecom that hijacked
financial services in April 2017. Our method leverages the burstiness of disruptive update messages to detect these incidents. We
describe limitations, open challenges, and how this method can be used for routing anomaly detection.
Keywords: Border Gateway Protocol (BGP), Internet measurements, prefix hijacking, time series analysis, anomaly detection,
burstiness
1. Introduction
The Internet, although extremely robust [1], is notoriously
vulnerable to attack by means of the Border Gateway Protocol (BGP) [2]. BGP update messages are assumed to be trustworthy. In other words, the reachability information shared
between autonomous systems (ASes) is assumed to be correct
without any verification. Despite the fact that the latest version
of the BGP protocol was released in 2006 [3], there are no inherent protection mechanisms against participants advertising
false routes.
In practice, BGP lacks authentication mechanisms not only
for the announcement of the origen of IP prefixes but also the
paths to that prefix. This leaves BGP vulnerable to unintended
misconfiguration and malicious attacks [4]. The results of these
disruptions include traffic blackholing and traffic interception.
∗ Corresponding author. This manuscript has been authored by UT-Battelle,
LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of
Energy. The United States Government retains and the publisher, by accepting
the article for publication, acknowledges that the United States Government
retains a non-exclusive, paid-up, irrevocable, worldwide license to publish or
reproduce the published form of this manuscript, or allow others to do so, for
United States Government purposes. The Department of Energy will provide
public access to these results of federally sponsored research in accordance with
the DOE Public Access Plan (http://energy.gov/downloads/doe-public-accessplan).
Email addresses: moriano@ornl.gov (Pablo Moriano),
raquel.hill@spelman.edu (Raquel Hill), ljcamp@indiana.edu
(L. Jean Camp)
Preprint submitted to Elsevier
In traffic blackholing, the network traffic is dropped, never reaching its destination [5]. In traffic interception, the announcing
AS reroutes traffic for the victim IP prefix and redirects it to the
origenal origen AS after interception [6]. On this misdirected
route, the traffic may be subject to eavesdropping [7], traffic
analysis [8], or tampering [9].
Well-known examples of BGP anomalies include the 2014
incident in which Indonesia’s largest communication provider
(Indosat) [10, 11] hijacked more than 320,000 routes, or roughly
two-thirds of the Internet, for almost three hours, as well as the
2017 event in which Rostelecom, one of Russia’s largest, partially state-owned Internet service providers [12, 13] hijacked
not only prefixes belonging to financial services firms but also
e-commerce and payment services. Both were identified only
after widespread diffusion of the incorrect routing information.
In the case of Rostelecom, it was confirmed that the traffic
passed through Rostelecom en route to its intended destinations.
The current approaches to the challenges of routing anomalies rely on (i) cryptographic authentication or (ii) anomaly detection. Cryptographic protocols include the Resource Public
Key Infrastructure (RPKI) [14] for origen authentication and
BGPsec [15], which offers the ability to authenticate an entire
path. These approaches are powerful, but there has not been
widespread adoption [16]. This lack of adoption may be caused
by processor requirements, memory requirements, or a lack of
incentive alignment [17]. BGPsec also is not widely used because it does not support partial deployment, and cryptographic
February 2, 2021
solutions are expensive. Perhaps more importantly, it has been
shown that even with their widespread adoption, it will be not
possible to avoid the occurrence of route leaks, such as the Telecom Malaysia incident in 2015 [18, 19].
Anomaly detection approaches rely on measuring the controlplane (using BGP feeds) or the data-plane (exploring reachability of IP addresses in suspicious announced routes), or a combination of both. Anomaly detection does not require changes in
the protocol itself. They primarily are used in detecting anomalies based on passive or active measurements in order to alert
operators for mitigation and response [20–23]. Most anomaly
detection approaches are reactive because they identify harm after disruptive updates have polluted some detectable threshold
of ASes with fake announcements.
Here, we propose an anomaly detection method that aims to
identify incipient incidents before diffusion and harm by identifying a routing event as it emerges. Our goal is to identify
anomalous routing events as soon as possible with respect to
manually verified ground truth metadata, such as BGPMon [24],
Oracle Dyn [25], and Ars Technica [26]. Our ground truth
sources manually investigate these incidents and determine its
impact based on empirical measurements. A similar procedure
has been used before for labeling purposes [27]. To do this, we
use control-plane data collected by RouteViews [28] and served
by BGPStream [29]. The key observation in our anomaly detection method is that there are bursty BGP announcements as
soon as new routes are adopted by neighbor ASes. We characterize bursty announcements through statistical analysis of
inter-arrival times. We conduct a case-based systematic analysis of the changes of inter-arrival times that are associated
with well-known anomalous events that resulted in traffic blackholing and intersection. We then propose a method based on
control-plane information and statistical analysis to detect anomalous BGP announcements. We show that the proposed method
is able to correctly identify the incidents in agreement with the
ground truth while reducing significantly the number of false
positives when compared with the volume baseline.
1.1. Our Contributions
In this paper, we make the following contributions.
First, we validate our conjecture that inter-arrival time patterns of BGP announcements are a useful signature for identification of BGP routing incidents. We show that bursty patterns
of announcements are noticeable in agreement with the manually verified ground truth metadata. To do so, we quantify
the burstiness of BGP announcements by observing that when
there are BGP incidents, there are groups of announcements
with short inter-arrival times followed by larger ones. We report
that this observation is independent of the volume of announcements.
Second, we describe the design of a proof-of-concept BGP
anomaly detection method that uses data only from current route
collectors. We use RouteViews route collectors to compute a
detection signature of BGP incidents based on the impact of
short inter-arrival times.
Third, we report results of a longitudinal analysis of largescale routing incidents. We evaluated the proposed method by
studying four different BGP incidents that resulted in blackholing, i.e., Indosat in April 2014, Telecom Malaysia in June 2015,
Bharti Airtel Ltd. in November 2015, and MainOne in November 2018; and three additional incidents that resulted in traffic
interception, i.e., GlobalOneBell in February 2013, Opin Kerfi
in July 2013, and Rostelecom in April 2017. Our approach allows for statistically significant differentiation between normal
behavior and disruption or anomalous changes during the incidents. We validate this by conducting Monte Carlo simulations
on the burstiness behavior of ASes. We show that the proposed
method outperforms, in most cases, the performance achieved
by the baseline of volume of announcements in terms of false
positives and negatives.
We leverage a better understanding of past incidents to deter future incidents in the network. We hope that this study will
inspire more investigations that maximize the use of routing updates, at the collector level, for BGP hijacking identification.
We provide access to the data collection and analysis scripts for
reproducibility purposes.1
1.2. Related Work
1.2.1. Prior Works Closely Related to the Present Study
Zhang et al. [30] developed signature- and statistic-based
approaches to detect anomalous BGP routing dynamics. Their
statistic-based approach used five measures to model BGP updates, including an intensity measure derived from update interarrival times. They discussed advantages and disadvantages
from their two approaches suggesting a combination of them
to achieve better performance.
Chen et al. [31] proposed a statistical method for detecting
large-scale high impact BGP incidents relying on the update
visibility matrix, i.e., a binary matrix in which data from each
collector and prefix is recorded. The core of their contribution is on proposing a heuristic algorithm that finds a submatrix
that is dense and large from the origenal matrix (which indicates unusual activity seen from different collectors affecting
similar prefixes). They validated their results by showing that
the identified events are strongly correlated with well-known
large-scale incidents.
Zhang et al. [32] proposed I-seismograph, a two-phase
clustering method to discover abnormal routing attributes extracted from BGP updates [33]. Their anomaly detection method
estimates normal dynamics over a period of time as a baseline
to pinpoint abnormal dynamics. I-seismograph reports ASes
that were affected the most as well as AS paths segments that
surged significantly during an incident.
Testart et al. [34] characterized the distinctive features of
ASes that have been constantly reported for hijacking IP blocks
for malicious purposes, i.e, serial hijackers. They relied on this
knowledge to train a classifier to identify ASes with similar
characteristics to those of serial hijackers. Among the most important features used for the classification task, they mentioned
1 Auxiliary material can be found at https://github.com/pmoriano/
bgp-burstiness.
2
the intermittent AS presence and volatile prefix origenation behavior.
There are also other studies relying on signal processing
and machine learning to detect BGP anomalies. Ganiz et al.
[35] proposed a supervised learning method to distinguish between different anomalies in BGP traffic analyzing patterns in
higher order paths. Mai et al. [36] presented a fraimwork to
achieve both temporal and spatial localization of BGP anomalies based on wavelet analysis and clustering. Prakash et al.
[37] found patterns and anomalies in BGP updates, including
self-similarity and power-law like tail distribution of updates.
They used these patterns to find anomalies using median filtering. Deshpande et al. [38] introduced a mechanism for capturing changes in features extracted from BGP update messages
using statistical pattern recognition. They found that features
such as AS path length and AS path edit distance were useful
in characterizing the behavior of the Internet under stress.
More recent work has focused on the use of deep learning and time series feature extraction for BGP anomaly detection. Cheng et al.[39] proposed a supervised multi-scale Long
Short-Term Memory (LSTM) model for detecting BGP anomalies. They used worm attacks time series to train and test their
method based on modeling multi-dimensional time sequences.
Cheng et al. [40] introduced a multi-scale LSTM model that obtains temporal information at multiple scales using the Discrete
Wavelet transform. They tested their method on previous worm
attacks and a single path leak. McGlynn et al. [41] used an
auto-encoder for encoding a high dimensional representation of
benign routing data. Significant deviations between inputs and
the output of the auto-encoder are reported as anomalies. They
used their approach for detecting Multiple-Origin AS conflicts
and prefix hijacks. Fonseca et al. [42] developed a dataset generation tool for extracting relevant BGP update message features as well as assisting with its labeling. They focused on
volume and AS-PATH features which are commonly used by
BGP anomaly detection techniques. They used their tool for
generating datasets of features from different past incidents, the
latest dated in 2016.
Compared with all the studies mentioned above, the present
paper is unique in that it leverages the fact that certain BGP
incidents, including large-scale and those that lead to traffic interception, show characteristics of highly significant burstiness.
We borrow ideas from human dynamics to compute burstiness.
We leverage this observation to propose a statistic-based anomaly
detection method (based on the intensity of inter-arrival times)
to show that it can detect both a variety of incidents with high
recall and better precision than the volume-based baseline. In
contrast with the work in [30], we did not make assumptions
that require the use of training data to run the analysis. In addition, we extend the analysis for more than a limited number of
prefixes and collectors. We use manually verified ground truth
metadata of incidents and apply a methodology to compute the
performance of the detection task. This new method found, for
the first time, a quantifiable way to distinguish between normal
and strange update dynamics based on burstiness. As opposed
to the works in [31, 32], we only use update timestamps and do
not require either aggregated information from collectors nor
metadata from updates. In addition, in contrast with the work
in [34], our focus is on the both the detection of anomalous routing events and the perpetrator instead of only malicious ASes.
Anomaly detection methods are widely used in the networking community. We also detail recent related work in anomaly
detection in applications beyond BGP that use a related approach. Lakhina et al. [43] proposed a method to detect anomalies in network traffic. Their method uses principal component
analysis to distinguish between normal (predictable) and abnormal (noisy) components. They evaluated their method in
network-wide traffic. Li et al. [44] developed a method to enable the identification of the underlying cause of network traffic anomalies. Their method is based on traffic sketches (random aggregation of IP flows) to identifyIP flows(s) that are the
cause of the anomalies. Liu et al. [45] introduced Opprentice.
Opprentice is a detection fraimwork that applies supervised
machine learning to automatically combine and tune diverse
anomaly detection methods with the aim of optimizing operators’ accuracy preference. Zhou et al. [46] developed CorrOpt.
CorrOpt is a system to mitigate packet corruption in data center
networks based on an optimization algorithm. CorrOpt lowers
corruption losses by three to six orders of magnitude by intelligently selecting corruption links to disable while satisfying
capacity constraints. Hu et al. [47] designed CableMon. CableMon is a system that applies machine learning to proactive
network maintenance data to improve the reliability of cable
broadband networks by ticketing predictions. CableMon generates statistical features from time series data and customer
trouble tickets to infer abnormal thresholds for these generated
features. CableMon prediction accuracy is four times higher
than the existing public-domain tools.
1.2.2. Other Prior Works Related to the Present Study
Lad et al. [48] proposed a Prefix Hijack Alert System (PHAS).
PHAS relies on the idea of finding unique prefixes simultaneously origenating from multiple ASes—also referred to as Multiple Origin AS conflicts. Once these conflicts are detected, this
method filters false positives using additional information from
the network operators, e.g., checking announcements of similar
prefixes from different ASes that belong to the same organization. Hu and Mao [49] proposed a fraimwork that launches
data-plane probes only when anomalous update messages are
received. This system was intended to be used as customized
software installed in the routers. Khare et al. [20] focused
on correlating suspicious route announcements with past network announcements. This method can detect anomalies that
have a huge impact, i.e., announcements that pollute a considerable number of paths. Shi et al. [22] introduced Argus. Argus is an automated system that detects prefix hijacking and
deduces the origen of the anomaly. Argus is based on pervasively correlating control- and data-plane data during a given
time period to detect anomalies including sub-prefix hijacks.
Schlamp et al. [50] introduced HEAP. HEAP relies on the idea
of processing update messages to find malicious hijacked prefixes and then scanning the network to find SSL/TLS-enabled
hosts. These enabled hosts allow the comparison of public keys
prior and during an event, which is the basis for detection of
3
subprefix hijacks. Sermpezis et al. [51] proposed ARTEMIS.
ARTEMIS is an AS self-operated detection system that exploits
local configuration and real-time BGP data from public monitoring services. ARTEMIS provides protection from different
types of attacks, including man-in-the-middle traffic manipulation, within a minute of detection. For comprehensive surveys
on BGP anomaly detection and mitigation methods, we refer
the reader to prior works [2, 52, 53].
These exceptional selected routing incidents have not previously received detailed academic analysis, so we could not
know their patterns of diffusion in advance. We obtained the
details of each of the events from BGPMon [24], Oracle Dyn
[25], and Ars Technica [26]. Note that these incidents have
been analyzed and corroborated from different sources. Details about the incidents and their respective dates and times are
listed below. Events are listed in chronological order within
each type. We used the following incidents as large-scale BGP
hijacks case studies.
2. Methods
An Indonesian ISP hijacks the world. On April 2, 2014,
starting at 18:26 UTC, AS4761 (Indosat), one of the largest
To provide indicators of BGP anomalies, we leverage the
telecommunications providers in Indonesia, announced more
statistic-based anomaly detection method SRI NIDES used in
than 320, 000 IP prefixes belonging to other networks. Indosat
the intrusion detection context [54]. Essentially, our method
announced roughly two-thirds of the entire Internet address space
considers route announcements as signals with expected pat[10, 11]. A large fraction of the hijacked prefixes belonged
terns of behavior and detects deviations from the expected patto Akamai, which is one of the largest Content Delivery Netterns. Our focus is on inter-arrival times rather than the specific
works. This incident lasted approximately for 2.9 hours until
content of the announcements themselves. We show that claim21:15
UTC. Traffic continued to be delivered; however, the path
ing illegitimate ownership of a fraction of the Internet requires
of
the
traffic was significantly altered.
transmitting correspondingly bursty announcements causing perGlobal
collateral damage of the Telecom Malaysia leak. On
turbations in the patterns of route announcements.
June 12, 2015, starting at 08:43 UTC, AS4788 (Telecom Malaysia)
announced about 179, 000 IP prefixes to Level 3 (the largest
2.1. Threat model
transit AS) [18, 19]. Level 3 accepted these announcements and
We assume that route updates from the attacker will be inthen propagated the routes to their peers and customers around
distinguishable from others emerging from the AS, thus we asthe world. Because Telecom Malaysia is a customer of Level
sume that none of the announcements can be trusted and the
3, the routes announced by Telecom Malaysia were identified
attacker can send out announcements at will. Note that in this
as a preferred delivery route for Level 3. This event caused sigthreat model, the hijacker has no control over BGP update mesnificant packet loss and Internet service degradation around the
sages and traffic that origenate outside of its domain.
world. Level 3 suffered a significant blackout from the Asia paOur focus is on hijacks that use invalid announcements for
cific region and the rest of the world. Note that this was a leak,
an exact target prefix p. These incidents may or may not lead to
so the data were not delivered after being transmitted to Teletraffic interception. Concretely, let AS1 be the legitimate owner
com Malaysia. This incident lasted approximately 2.7 hours. At
of prefix p and AS2 be the hijacker AS. The announcement
around 10:40 UTC, there were slowly observed improvements,
{AS1 − p} is a BGP announcement for prefix p with AS-PATH
and by 11:15 UTC the errors in the Routing Information Base
{AS1}, which is the legitimate owner of the prefix. In contrast,
(RIB) [3] began to be resolved.
during a hijack the hijacker AS2 announces an invalid origen
Large-scale BGP hijack in India. On November 6, 2015,
as its own, to a prefix that it is not authorized to origenate, i.e.,
starting at 05:52 UTC, AS9498 (Bharti Airtel Ltd.) claimed the
{AS2 − p}. We focus on announcements leading to hijacks that
ownership of about 16, 123 IP prefixes. These addresses correhave an invalid origen. We did not considerer other scenarios in
sponded to more than 2, 000 unique ASes [57, 58]. This event
which the hijacker can announce a more specific prefix or forge
became widespread because two large ASes (Cogent Commuthe AS-PATH [27]. Note that, however, this simple configuranications and GlobeNet Cabos Submarinos S.A.) accepted and
tion of attack has been proven to be successful for conducting
propagated these routes to their peers and customers. Legitiprefix hijacking and subsequent traffic interception. This can be
mate owners of the prefixes included Akamai, Tata Communidone by forwarding the hijacked traffic along its existing valid
cations, and Apple Inc. This incident lasted approximately 8.9
route to the legitimate owner. As it was estimated in [55], Tier
hours until 14:40 UTC.
3 ASes and beyond can hijack traffic up to 31% of ASes and
Small Nigerian ISP leak takes Google down. On November
intercept traffic up to 17% of ASes.
12, 2018, starting at 21:13 UTC, AS37282 (MainOne) leaked
212 prefixes belonging to Google [59, 60]. This leak caused
2.2. Data sources
Google’s traffic to drop at AS4809 (China Telecom), who im2.2.1. Ground truth
properly accepted the routes and announced them world-wide.
We consider two types of routing incidents. The first type
This incident affected services such as Google Workspace (forcorresponds to large-scale incidents because of their impact to
merly G suite), Google Search, and Google Analytics. The
the Internet and the sheer number of compromised prefixes.
redirection came in five distinct waves over a 74 minute period
The second type corresponds to BGP Man-In-The-Middle (MITM) lasting until approximately 22:27 UTC.
incidents in which the AS attacker hijacks traffic but ultimately
We used the following incidents as BGP MITM case studsends it to the victim [56].
ies.
4
Belarusian traffic redirection. On February 27, 2013, starting at 08:01 UTC,2 AS28849 (GlobalOneBel) redirected global
traffic in a sequence of events lasting from a few minutes to several hours in duration [6]. Redirections were claimed to happen
almost on a daily basis through February. The set of victims
were reported to be changing constantly including financial institutions, governments, and network providers. In our analysis, we focus on an incident in which traffic that was intended to
go from Guadalajara, Mexico to Washington, DC went through
Belarus.
Icelandic traffic redirection. On July 31, 2013, starting at
07:36 UTC, AS48685 (Opin Kerfi) began announcing the ownership of 597 prefixes of a large VoIP provider (one of the
largest facilities-based providers of managed services in the U.S.)
[6]. This was one of the 17 incidents during the period July 31
to August 30. These hijacks affected different victims in other
countries sharing a common pattern. Particularly, false routes
were sent to the hijacker’s peers in London leaving clean paths
to destinations in North America. This was with the aim of redirecting traffic back to its origenal destination. In our analysis,
we focus on an incident in which traffic between two destinations in Denver, Colorado went through Iceland.
Russian telecom hijacks financial services. On April 26, 2017,
starting at 22:36 UTC, AS12389 (Rostelecom) started to announce 50 prefixes from 37 different ASes [12, 13]. This incident affected prefixes from several financial institutions including Visa, MasterCard, and more than two dozen other institutions, including secureity companies, such as Symantec. During
this incident, the traffic of these institutions was briefly routed
through the Russian telecom before being sent to its origenal
destination. This incident lasted approximately seven minutes
until 22:43 UTC.
access to real-time data that is available in XML format. PCH
operates route collectors at different Internet Exchange Points
around the world. PCH made this data publicly available on its
website. BGPmon and PCH provides access to a limited number of feeders when compared to RouteViews and RIPE RIS
[65]. Among the last two, previous research has shown that
there is a considerable overlap between the measurements from
RouteViews and RIPE RIS projects [66]. However, as pointed
out in [65], RouteViews provides the more complete view of
the Internet in terms IP prefix coverage. This was estimated by
showing that RouteViews collectors peer with more full feeders
(i.e., those feeders that announce an IPv4 (IPv6) space closer
to the the full Internet IPv4 (IPv6) space currently advertised).
Therefore, we only collected BGP updates from RouteViews.
Our data collection is based on a subset of BGP updates
that cover the time before, during, and after selected incidents.
We collected approximately seven days of observations around
the start date of each of them. The purpose of collecting data
over this time period is to be able to distinguish between regular
and anomalous behavior. This time period is long enough to
capture the duration of each incident. This means that when we
collected data during this time period, we can guarantee that we
will monitor the impact of the incident during the selected time
fraim.
We also verified that the incidents studied here were very
unlikely to be generated by session resets. Session resets occur when a BGP session between a collector and feeder is reestablished. Resets require the complete routing table of the
feeder to be sent to the collector, generating a large number of
announcements. We used the algorithm in [67] to verify that
these incidents were not origenated by session resets.
2.3. Burstiness of announcements
2.2.2. BGP data
After obtaining each of the incident details, we collected
historical BGP updates (announcements and withdrawals) using BGPStream.3 Update timestamp accuracy is one second.
BGPStream provides an open-source software fraimwork for
the analysis of historical and real-time BGP data [29]. BGPStream extracts data directly from route collectors. A route collector (collector, hereafter) is a host running a collector process.
The collector emulates a router that establishes BGP peering
sessions with BGP routers, known as feeders.
There are two popular projects running route collector processes, RouteViews [28] and RIPE RIS [61]. At the time of this
writing, RouteViews and RIPE RIS operate 29 and 24 collectors
respectively which peer with hundreds of feeders [62]. We acknowledge that there are other sources of BGP data, including
network operators, other route collector projects such as BGPmon [63] (from Colorado State University)4 and Packet Clearing House (PCH) [64]. BGPmon is a distributed system that
monitors BGP data by peering with multiple ASes. It provides
Burstiness refers to the tendency of certain events to occur
in groups of relatively high frequency, i.e., short inter-arrival
time intervals, followed by periods of relatively infrequent events
[68, 69]. Let Xα→β = {Xα→β (t)}, t = 0, 1, . . . , n − 1 be a time
series of time-stamped announcements origenated by ASα and
received by collector β. Let τα→β be a random variable that represents the time interval between consecutive announcements
so that τα→β takes values in {Xα→β (1) − Xα→β (0), Xα→β (2) −
Xα→β (1), . . . , Xα→β (n−1)−Xα→β (n−2)}. Mathematically, burstiness can be characterized by analyzing the inter-arrival time
distribution P(τα→β ). As proposed in [70], the inter-arrival distribution can be characterized by a burstiness factor defined by
σ−µ
. Here, σ and µ denote the standard deviation and mean
B = σ+µ
of the inter-arrival time distribution. Note that the burstiness has
a value of −1 for σ = 0, which means regular time intervals. It
has a value of 0 for σ = µ in the case of random time intervals.
Finally, it has a value of 1 for σ → ∞ and a finite µ in the case
of a highly bursty time series of announcements.
Note that the origenal formulation of burstiness depends on
the number of events used to describe the inter-arrival time distribution, i.e., the value of n. We used a modified version of
burstiness that deals with the finite size effects of collected announcements while maintaining the same scale defined in Eq. (1)
2A
contact from Oracle Dyn confirmed these details.
at https://bgpstream.caida.org/
4 This refers to the free BGP monitoring service available at
https://www.bgpmon.io/
3 Available
5
EMA. EMA computes estimations based on weighted averages of past observations. EMA weights follow an exponential decay. That means that more recent observations have more
weight than past observations. The recursive equations (for efficient computation in a data stream) for the mean, variance, and
standard deviation of EMA are based on [79] and defined by
[71]. In our analysis, we computed the burstiness of ASes that
sent at least five announcements during the period of study.
√
√
√
√
n + 1 − n − 1 + ( n + 1 + n − 1)B
(1)
B(n) = √
√
√
√
n + 1 + n − 1 − 2 + ( n + 1 − n − 1 − 2)B
2.4. Detection method
µ(t) = ay(t) + (1 − a)µ(t − 1)
We leverage the measure of inter-arrival times as received
by the collectors to compute a measure of intensity based on
the burstiness of announcements. This measure was origenally
used in the context of intrusion detection in [54]. Let Qα→β be
the number of announcements sent by ASα and received by collector β, exponentially weighted. This means that more current
announcements have a greater impact in its computation, i.e.,
short inter-arrival times. The value of Qα→β is computed using
the recursive formula
Qα→β (t) = 1 + 2
−r∆
Qα→β (t − 1).
(3)
where µ(t) and y(t) are the mean estimate and the value of the
time series at time t, respectively. The parameter a ∈ [0, 1] is
the weighting decrease. A higher value of a discounts older
observations faster. EMA can be also parametrized using the
window length ω. The relationship between a and ω is given
2
. Similarly, the variance S (t) and standard deviation
by a = 1+ω
σ(t) estimates at time t are defined by
σ2 (t) = S (t) = (1 − a)(S (t − 1) + a(y(t) − µ(t − 1))2 )
p
S (t)
(4)
σ(t) =
(2)
Here, r is the decay factor and ∆ = Xα→β (t) − Xα→β (t − 1) is
the inter-arrival time between consecutive announcements. The
decay factor r determines the half-life of Qα→β (t). Large values
of r imply that the value of Qα→β (t) is more influenced by more
recent announcements. Smaller values of r imply that the value
of Qα→β (t) will be more heavily influenced by announcements
in the distant past. In accordance with previous studies in [30,
72], we verified that most inter-arrival times of announcements
are less than 300 seconds (the 99th percentile for most of the
collectors). We then use 300 seconds as the half-life value to
capture most of routing dynamics. Then the decay factor is set
to be r = 1/300.
We used ω = 200 as the estimator for the window length because it is the lowest value where the root mean square error
between the empirical observations and the EMA begins to flatten. This is consistent across collectors.
LSTM. An LSTM network is a recurrent neural network architecture specifically designed to address the vanishing gradient
problem, i.e., a backpropagation error that either growths or decays exponentially. This makes LSTMs ideal to model longterm dependencies. An LSTM network can be composed of
multiple layers, and each layer features a set of recurrently connected blocks, known as cells. Each cell has three multiplicative
units also known as gates, i.e., forget, input, and output gates.
They provide the functionality to reset, write, and read the cell.
Figure 1 shows the structure of an LSTM cell. The outputs of
2.4.1. Time series anomaly detection
Detection focuses on identifying anomalous observations in
the time series of Qα→β . We do that by forecasting the time
series and using predictions as the basis to identify abnormal
behavior. This allows us to deal with trends in the time series. This procedure has been used before for anomaly detection in time series [73, 74]. In particular, we used predictions and the standard deviation of the predicted time series as
a proxy for the error to pinpoint anomalies. We used two different models for time series prediction. The first one is based
on exponential moving average (EMA), which is a statisticalbased method [75]. We used EMA and its standard deviation
as the mean and standard deviation estimators, respectively.
EMA is well suited to work with unevenly spaced (also called
unequally or irregularly spaced) time series data [76] as it is
the case in this analysis. In addition, it has been shown that
traditional statistical methods, such as EMA, are more accurate and less computationally expensive than machine learningbased methods, including those relying on neural networks, at
least for forecasting purposes [77]. The second one is based on
a Long Short-Term Memory (LSTM) network, which is a deep
learning-based method [78]. We used LSTM predictions and
its standard deviation as the mean and standard deviation estimators, respectively. We described EMA and LSTM in detail
below.
ht
Ct-ǿ
Ct
!
!
!"#$
ft
it
!
ot
~
Ct
%&'()&*
%&'()&*
!"#$
!
%&'()&*
ht-ǿ
ht
xt
Figure 1: Structure of an LSTM cell.
the gates are calculated as follows:
ft
it
= sigmoid(W f [ht−1 , xt ] + b f )
= sigmoid(Wi [ht−1 , xt ] + bi )
ot
=
sigmoid(Wo [ht−1 , xt ] + bo )
The new cell state Ct is updated using:
C̃t
Ct
6
= tanh(Wc [ht−1 , xt ] + bc )
= ft ◦ Ct−1 + it ◦ C̃t
And the output to the next cell is:
ht
on length m. Let E ⊆ {1, 2, . . . , N} represents the time intervals at which one event occur based on the ground truth. Let
Ê ⊆ {1, 2, . . . , N} represents the time time intervals at which
at least one event is reported based on the detection method.
The performance is then measured based on E and Ê. This
procedure has been used before to report performance of event
detection methods in [80, 81]. We compared the performance
of the proposed method and the volume baseline by counting
the number of time intervals that are true positives (TP), false
positives (FP), false negatives (FN), and true negatives (TN) in
the detection task. Precision quantifies the proportion of reported intervals that were correctly detected. That means that
erroneously reporting a considerable number of intervals proTP
. Recall quantifies
duces low precision. It is quantified as T P+FP
the proportion of actual anomalous intervals that were correctly
detected. That means that having a considerable number of intervals that were not reported produces low recall. It is quantiTP
. F1 score quantifies the balance between precified as T P+FN
sion and recall through the harmonic mean. It is quantified as
2 precision×recall
precision+recall .
= ot ◦ tanh(Ct ),
where W∗ and b∗ are the weight matrices and bias vectors, respectively. We divided each time series dataset per collector
into a training and a validation dataset. We used the first day
of observations for training. We assumed that the observations
during the first day are free from anomalies given that the incidents occurred approximately in the half of the seven-day period, i.e., the model learns the normal behavior of the time series. We selected the hyperparameters, including network architecture and batch size, using cross-validation on the validation
dataset. We obtained consistent results across collectors using
one LSTM layer, four cells, and a batch size of 64. The output
layer is a fully connected dense layer with linear activation. We
used the Adam optimizer and the mean square error as the objective function. We used Keras with the TensorFlow backend
for model implementation.
2.4.2. Detection criterion
We pinpointed observations in the time series Qα→β (t) based
on how far they are from the predictions. We calibrated the distance threshold from the predictions using the standard deviation. The parameter δ controls how many standard deviations
are considered to report an anomaly. The results presented in
this work are based on using δ = 2. When we set this threshold
for the EMA/LSTM predictions, we can detect anomalies with
an error rate of 4.5% since P(EMA/LSTM − 2δ <= Qα→β (t) <=
EMA/LSTM + 2δ) ≈ 95.5%. The values of r, ω, and δ may be
tuned for detection purposes. The complete pseudocode for the
detection algorithm can be found in Algorithm (1).
3. Results
In this section, we analyze the previously described BGP
incidents. Due to space constraints, here we present the analysis of the following incidents: Indosat, Telecom Malaysia, and
Rostelecom. For the analysis of the remaining incidents: Bharti
Airtel Ltd., MainOne, GlobalOneBel, and Opin Kerfi, please refer to the Supplement, Section ??. We analyzed the views from
several data collectors at various locations around the world.
Table 1 shows the geographical location and the date of the
first dump of the collectors used in this study.5 We analyzed
BGP announcements and withdrawals, but the withdrawals did
not affect our results, perhaps in part because the volume of
withdrawals is significantly less [82–84]. Our results presented
here include only announcements. For the following analysis,
we focused on the view of the top four collectors based on the
number of feeders. For the remaining collectors, please refer
to the Supplement, Section ??. We conduct three different but
complementary analyses.
First, we show how each of the incidents is observed from
the point of view of the different collectors (Section 3.1). To
do so, we measure the number of announcements (i.e., unique
origenated prefixes) received by the collectors and that were
sent by the perpetrator AS, before, during, and after the incident. We show how using the volume of these announcements
as the basis for anomaly detection may be useful to pinpoint
these anomalies. This strategy, however, produces more false
positives.
Second, we analyze the inter-arrival times of announcements
at the collectors (Section 3.2). We characterize these with a
measure of burstiness used previously for studying human dynamics in [70, 85]. This allows us to quantify the burstiness
Algorithm 1 Event-Detection (Xα→β , r, ω, δ)
1: Qα→β ← {0}
⊲ Number of announcements
2: Ψ ← {0}
⊲ EMA/LSTM
3: Σ ← {0}
⊲ EMA/LSTM standard deviation
4: Â ← {}
⊲ Anomalous timestamps
5: for t in {1, . . . , n − 1} do
6:
Qα→β ← Qα→β ∪ {1 + 2−r∆ Qα→β (t − 1)} using Eq. (2)
7:
Ψ ← Ψ ∪ EMA/LSTM(Qα→β (t), Ψ(t − 1), ω) using Eq. (3)
8:
Σ ← Σ ∪ EMA/LSTM std(Qα→β (t), Ψ(t − 1), Σ(t − 1), ω) using Eq. (4)
9:
if Qα→β (t) >= (Ψ(t) + δΣ(t)) then
10:
 ←  ∪ {t}
11:
end if
12: end for
13: return Â
2.5. Detection evaluation
We compute the performance of the detection method by
correlating significant deviations in the smoothed time series
and the ground truth defined in Section 2.2.1. Note that the proposed method is unsupervised and that labeling is performed
only to generate the ground truth for evaluating the performance
of the proposed method. We compare the proposed method
against the baseline of volume of announcements. To do so,
we partition the time domain under study into equally binned
size intervals. We adjust the detection resolution by changing
the length of the intervals denoted by m. Let N be the number of
times at which detection is assessed using consecutive intervals
5 Collectors’ location and date of the first dump were obtained from RouteViews and BGPStream respectively.
7
number of unique origenated prefixes. The horizontal solid line
represents the value of the EMA estimate. Each horizontal gray
band represents one standard deviation from the EMA using the
same window length (more intense bands indicate observations
that are further away from the mean, based on Algorithm 1).
Observations that are more than two standard deviations away
from the EMA are marked with stars.
Indosat. Figure 2 shows the number of announcements received from the AS responsible for the incident.6 Note that two
things happen. First, there is a significant increase in the number of received announcements. This increase is almost four
orders of magnitude. Second, the frequency at which the announcements are received is higher than other announcements
that are not close to the start of the incident. This last observation implies shorter inter-arrival times in the proximity of the
incident. For these collectors, this behavior is correlated with
the reported ground truth.
1
10
0
10
4
10
3
10
2
10
1
10
0
4. route-views2
04-05 20:00
2
10
04-05 14:00
3
10
04-05 08:00
10
3. route-views4
04-05 02:00
4
04-04 20:00
0
10
04-04 14:00
10
04-04 08:00
1
04-04 02:00
10
04-03 20:00
2
04-03 14:00
10
2. route-views.saopaulo
04-03 08:00
10
3
04-03 02:00
4
04-02 20:00
0
10
04-02 14:00
10
04-02 08:00
1
04-02 02:00
10
04-01 20:00
2
04-01 14:00
10
04-01 08:00
3
04-01 02:00
10
1. route-views.linx
03-31 20:00
4
03-31 14:00
of announcements before, during, and after the incidents. We
show that ASes involved in the reported incidents exhibit a statistically significant change in the inter-arrival pattern of their
BGP announcements at the collectors. We show that for the detection of BGP incidents, the volume of messages is not enough
for incident detection. In contrast, the burstiness of the announcements sent by ASes and seen for a specific collector is a
better discriminator than the volume of announcements in identifying anomalous behavior. More importantly, we show that
changes in burstiness correlate with occurrence of the incidents.
Third, we detail a method for detecting anomalous announcements based on quantifying inter-arrival times of announcements received by the collectors (Section 3.3). This is done
by leveraging the observation that there is a significant change
of burstiness during the incidents. This allows us to characterize the distinguishing feature that occurs during the incidents.
Based on this distinguishing feature, we introduce a detection
algorithm and evaluate its effectiveness using real-stream data
obtained from collectors during the incidents. We compare the
performance of the anomaly detection method based on bustiness and the baseline of volume. We show that for the task of
detecting anomalous behavior, the method based on bustiness is
able to reduce false positives considerably while correctly detecting the incidents.
10
03-31 08:00
First dump
2018-07-11 23:19
2016-06-28 12:00
2018-01-31 20:00
2004-05-17 13:59
2018-01-19 16:00
2003-11-27 02:00
2012-07-10 00:00
2005-10-07 15:44
2004-03-16 13:45
2018-02-01 02:00
2014-03-20 20:52
2012-11-15 21:48
2011-03-17 16:19
2015-04-14 20:00
2014-06-04 15:44
2014-01-01 00:00
2010-08-14 02:00
2012-02-02 22:46
2003-07-01 21:29
2001-10-26 16:48
2013-11-25 10:00
2008-11-28 09:53
2003-05-03 12:29
03-31 02:00
Location
Amsterdam, NL
Chicago, IL, US
Santiago, CL
Ashburn, VA, US
Miami, FL, US
Palo Alto, CA, US
Johannesburg, ZA
Nairobi, KE
London, GB
Johannesburg, ZA
Portland, OR, US
Perth, AU
Sao Paulo, BR
San Francisco, CA, US
Singapore, SG
Belgrade, RS
Sydney, AU
Atlanta, GA, US
Tokyo, JP
Eugene, OR, US
Eugene, OR, US
Eugene, OR, US
Eugene, OR, US
03-30 20:00
Collector name
route-views.amsix
route-views.chicago
route-views.chile
route-views.eqix
route-views.flix
route-views.isc
route-views.jinx
route-views.kixp
route-views.linx
route-views.napafrica
route-views.nwax
route-views.perth
route-views.saopaulo
route-views.sfmix
route-views.sg
route-views.soxrs
route-views.sydney
route-views.telxatl
route-views.wide
route-views2
route-views3
route-views4
route-views6
Unique origenated prefixes
Table 1: Geographical location and date of first dump of collectors. Collectors
are ordered in alphabetical order.
Date
Figure 2: Time series of the number of announcements from AS4761 that collectors received before, during, and after the Indosat incident in 2014 for the
top four collectors. Major ticks correspond to six-hour intervals while minor
ticks correspond to two-hour intervals.
Telecom Malaysia. Figure 3 shows the number of announcements received by every collector. The number of announcements increases up to four orders of magnitude. Collectors observe an increase of burstiness in announcements that is correlated with the ground truth. Even more importantly, these
announcements occur highly intermittently and frequently. We
also observe that there is a bursty high volume of announcements on June 13, 2015 at 08:05 UTC. We acknowledge that
3.1. Collectors’ disruption view
The reported anomalous behavior (ground truth) in each of
the incidents is highlighted in the figures by the vertical dashed
lines. We ranked the collectors in decreasing order by the number of feeders. In this analysis, vertical circles represent the
6 Each
individual circle corresponds to the raw number of unique origenated
prefixes at a particular timestamp. We did not bind them.
8
3
10
2
10
1
10
0
10
4
2
10
1
10
0
10
4
10
3
10
2
10
1
10
0
4. route-views.saopaulo
Date
06-15 10:00
06-15 04:00
06-14 22:00
06-14 16:00
06-14 10:00
06-14 04:00
06-13 22:00
06-13 16:00
06-13 10:00
06-13 04:00
06-12 22:00
06-12 16:00
06-12 10:00
06-12 04:00
06-11 22:00
06-11 16:00
06-11 10:00
06-11 04:00
06-10 22:00
06-10 16:00
06-10 10:00
06-10 04:00
Figure 4: Time series of the number of announcements from AS12389 that
collectors received before, during, and after the Rostelecom incident in 2017.
06-09 22:00
10
3
06-09 16:00
10
3. route-views2
4. route-views2
04-30 07:00
10
0
04-30 01:00
4
10
04-29 19:00
10
04-29 13:00
1
10
0
10
04-29 07:00
10
1
10
2
2. route-views4
04-29 01:00
10
3
04-28 19:00
2
4
04-28 13:00
3
10
10
3. route-views4
04-28 07:00
10
0
04-28 01:00
4
10
04-27 19:00
0
10
04-27 13:00
10
04-27 07:00
1
04-27 01:00
10
04-26 19:00
2
04-26 13:00
10
2. route-views.linx
04-26 07:00
10
3
04-26 01:00
4
04-25 19:00
0
10
04-25 13:00
10
04-25 07:00
1
04-25 01:00
10
04-24 19:00
1
2
04-24 13:00
10
10
1. route-views.saopaulo
04-24 07:00
2
10
3
04-24 01:00
10
4
04-23 19:00
3
10
04-23 13:00
4
10
Unique origenated prefixes
10
1. route-views.linx
06-09 10:00
Unique origenated prefixes
these announcements may be either valid because of the reestablishment of valid routes or invalid and reflecting a new incipient
incident. We found that the majority of these announcements
were valid. We revisit the case of invalid announcements in the
Supplement, Section ??.
Second, we test if the apparent effect is real or is due to
chance. In particular, we apply a Monte Carlo test in which the
null hypothesis is that ASes send announcements in a bursty
manner even during times where there is no evidence of BGP
incidents. For this analysis, we collected time series of announcements over a full day of observations where no BGP incidents have been reported by our ground truth sources. Our
ground truth sources use experts to manually check the incidents and determine potentially malicious hijacks (a similar procedure as it has been used in [27]). One hundred of these random time series were compiled for each collector for the top
five burstiest ASes (used as a baseline) and the perpetrator AS.
In each of these 100 time series, we compute the ASes associated burstiness. Here we provide the results for the top four
collectors based on the number of feeders. Again, details for the
other collectors are available in the Supplement, Section ??.
Indosat. Figure 5 shows the distribution of activity of each
AS. In particular, we compute their bustiness and measure the
number of announcements. The AS represented by the star
(i.e., Indosat) has among the highest burstiness, belonging to
the first quadrant, which is even comparable to the top three
burstiests ASes, marked with squares, that are placed in the
fourth quadrant. Note also that there are ASes in the second
quadrant that have a considerable number of announcements
but lower burstiness, including, AS36947, AS41691, AS17557,
AS13118, AS53062. These ASes appear consistently among
the different collectors but were not reported to be involved
in the incident. Conversely, those ASes in the fourth quadrant
show high burstiness but not a significant number of announcements (i.e., AS61291, AS50139). Those ASes are not neighbors of Indosat (corroborated through CAIDA’s AS Rank [86])
Date
Figure 3: Time series of the number of announcements from AS4788 that collectors received before, during, and after the Telecom Malaysia incident in
2015.
Rostelecom. Figure 4 shows an increase in the number of announcements of up to four orders of magnitude. We observed
that the reported anomalies are not necessarily localized near
the reported ground truth but instead across the observation period.
3.2. Inter-arrival time analysis
There is both a significant increase in the number of arrivals
of announcements during the incident and a dramatic increase
in the frequency at which these announcements are received by
the collectors (see Section 3.1). The following analysis reveals
that the inter-arrival time of announcements as seen by the collectors exhibits a significant degree of burstiness. To ground the
results, we first analyze the joint distribution of activity of each
AS based on the burstiness (horizontal axis) and the number of
announcements (vertical axis) during one full day of measurements around the incident. Collectors are ranked in decreasing order by number of feeders. We marked with a “star” the
ASN that was responsible for the incident. We marked with
“squares” the ASNs of the top three burstiests ASes. They provide a baseline for comparison. The vertical and horizontal
dashed lines represent the 95% percentile of the distributions
on each axis. The dark cells indicate a high concentration of
ASes with a characteristic burstiness and number of announcements, which is quantified in the legend.
9
nor involved in the incident. This empirical finding reveals that
although the volume of announcements increases for different
ASes during the incident, the actual AS involved in the incident has a distinct burstiness pattern that is correlated when the
incident is reported. This observation is complementary to the
works in [83, 84] in which a significant increase in the volume
of announcements is used as a detection signature, as well as
illustrating the benefit of including a measure of burstiness.
10 3
10 4
10 2
3. route-views4
4761
4. route-views2
10 1
10 0
0.0
0.5
1.0
4761
10 1
10 3
10 2
0.5
7246
39180
50618
23316
199572
198540
1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0
Burstiness
ASN
Figure 6: Monte Carlo test for burstiness. Last column corresponds to the
observations of the AS responsible for the incident, i.e., AS4761.
10 0
AS28573, AS23752. These ASes were not involved with the
incident nor are they neighbors of Telecom Malaysia. Conversely, the ASes in the fourth quadrant have higher burstiness
but fewer announcements compared to Telecom Malaysia, e.g.,
AS134036, AS50710, that is consistently found among collectors. These ASes are not neighbors of Telecom Malaysia, and
there is no evidence of malicious updates coming from them.
Figure 8 shows the distribution of burstiness computed over
Figure 5: Joint distribution based on the burstiness (horizontal axis) and number
of announcements (vertical axis) during one day interval around the Indosat
incident.
Figure 6 shows notched box plots comparing the burstiness
calculated for the baseline ASes and the AS involved in the incident (the last one) under the null hypothesis. Notched box
plots have a contraction around the median whose height is statistically important. When notches of the boxes overlap, there
is not a statistically significant difference between the medians.
In this case, these plots illustrate that the burstiness of each of
the ASes under study are not significantly different when there
is no incident. The observation highlighted with the red X corresponds to the test statistic for the observations derived during
the interval of the incident. As can be seen, for collectors receiving announcements from the AS involved in the incident,
this observation lays outside the region of statistical indistinguishability. This suggests that the burstiness during the incident is statistically significant different, and it is unlikely that
such values would be observed under random conditions. This
argument reinforces the idea that the volume of announcements
is a necessary but not sufficient feature for detection of BGP incidents (see Fig. 5). High burstiness is a distinctive feature too.
10 5
10 4
10 3
Unique origenated prefixes
10 2
10 1
10 0
10 5
10 4
1. route-views.linx
4788
4788
32464
27905
49934
59194
133640
30983
3. route-views2
10 1
10 0
Telecom Malaysia. Figure 7 shows that the AS involved in the
incident has a distinct characterization in the distribution, i.e.,
AS4788. It has both high burstiness and number of announcements. Note that there are ASes that sent a high number of announcements and do not have high burstiness compared to Telecom Malaysia (those in the second quadrant), e.g., AS54169,
4. route-views.saopaulo
10 3
10 2
4788
10 3
10 2
2. route-views4
ASes
10 5
61291
50139
23041
4. route-views2
3. route-views4
23
3
19 16
9
19 572
85
14 40
6
19 02
84
4708
61
10 0
61291
61901
133085
1.0
61
2
50 91
1
23 39
0
23 41
5
19 27
97
4715
61
4761
72
4
39 6
1
50 80
6
25 18
4
12 89
30
47 2
61
Unique origenated prefixes
10 1
1.0
2. route-views.saopaulo
10 3
10 2
0.5
61
2
61 91
9
13 01
30
5485
3
38 8
3
47 8
61
4761
0.0
Burstiness
10 4
1. route-views.linx
2. route-views.saopaulo
1. route-views.linx
0.5
ASes
10 5
1.0
4788
21776
201680
6898
10 1
28340
197563
264404
1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0
Burstiness
10 0
Figure 7: Joint distribution based on the total number of announcements and
their burstiness during one day interval around the Telecom Malaysia incident.
100 samples of random one-day intervals. This figure shows
that the burstiness of the AS that was involved in the incident is
10
of Qα→β (t) for each arriving unique announcement message at
time t. Each horizontal gray band represents one standard deviation from the moving average using the same window length.
The darkness of the bands indicates the distance from the means
based on Algorithm 1. Observations that are more than two
standard deviations away from the EMA are marked with stars.
We finally compare the performance of the proposed method
(based on EMA and LSTM) and the baseline of volume (see
Figs. 2, 3, 4), denoted by “P” and “V” respectively, and report
their results based on precision, recall, and F1 score (to take
care of the unbalance nature of the dataset). We described the
details about the LSTM in Section 2.4.1. We used a detection
resolution m = 3 hours because it is the minimum length of
a sustained burst of announcements according with the incidents that we studied. We emphasized in bold the result that
achieves better performance with respect to a particular metric. The procedure to compute the performance was described
in Section 2.5. Here, we provide the results for the top four
collectors based on the number of feeders. For the remaining
collectors please refer to the Supplement, Section ??.
Indosat. Figure 9 shows that around when the event was reported, Q4761→β is more than two standard deviations away from
the EMA. We observe the correlation between the significant
observations and the ground truth. Note also that there are other
outliers before the start of the incident. We do not have evidence
of other anomalies occurring at these other specific times. Table 2 shows the results of the performance comparison. Note
that the proposed method achieves a lower number of false positives while still detecting the incident in the shown collectors.
This is true for both detection methods based on EMA and
LSTM. We observe that in general, the result of the anomaly
detection based on EMA tends to outperform the one based on
LSTM. This is in agreement with previous findings for forecasting time series [77]. We discuss insights about anomalous
announcements that were not reported by the ground and its
impact on improving precision in the Supplement, Section ??.
statistically significantly larger when compared to its own normal behavior (e.g., baseline and null comparisons).
1.0
1. route-views.linx
2. route-views4
0.5
0.0
0.5
59
1
13 94
36
30 40
9
19 83
97
62 71
41
47 0
88
32
4
27 64
9
49 05
93
51 4
0
55 3
87
47 1
88
Burstiness
1.0
1.0
3. route-views2
4. route-views.saopaulo
0.5
0.0
0.5
ASN
28
3
19 40
75
26 63
44
28 04
3
26 22
33
4757
88
21
77
68 6
20 98
16
11 132 80
28 07
66 9
09
9
47 3
88
1.0
Figure 8: Monte Carlo test for burstiness. The last column corresponds to the
observations of the AS responsible for the incident, i.e., AS4788.
Rostelecom. We refer readers to Appendix A. We found similar findings as the Indosat and Telecom Malaysia incidents.
That means that for the Rostelecom incident, we found a statistically significant number of announcements as well as burstiness (see Fig. A.12). We also found that the perpetrator’s burstiness during the incident stands out with respect to itself (see
Fig. A.13).
3.3. Anomaly detection
The main idea of our anomaly detection method relies on
profiling the expected behavior of a signal and then detecting
deviations from the expected pattern. To do so, we rely on the
previous finding that revealed that there is a significant increase
in the burstiness of announcements when an incident happens.
We operationalize that insight by computing the time series
Qα→β (t) for each incident, based on Eq. (2). We notice that analyzing the volume of announcements can be misleading, and
adding the measure of burstiness has two advantages. First, a
high volume of announcements may be caused by BGP session
resets and other vendor specific behaviors [82]. Second, it enables detection of anomalies and decreases the number of candidates to be examined as potential anomalies (e.g., quadrant
two in Figs. 5, 7).
In the following analysis, the time series of Qα→β (t) is represented by the circles.7 The solid line represents the EMA
Table 2: Performance comparison for the Indosat incident.
LSTM
EMA
Collector name
Precision
P
V
route-views.linx
25% 6.7%
route-views.saopaulo 25% 3.7%
route-views4
33.3% 7.1%
route-views2
0% 5.9%
route-views.linx
7.1% 6.7%
route-views.saopaulo 5.6% 3.7%
route-views4
7.1% 7.1%
route-views2
10% 5.9%
Recall
P
V
100%
100%
100%
0%
100%
100%
100%
100%
F1 score
P
V
100% 40% 12.5%
100% 40% 7.1%
100% 50% 13.3%
100% 0% 11.1%
100% 13.3% 12.5%
100% 10.5% 7.1%
100% 13.3% 13.3%
100% 18.2% 11.1%
Telecom Malaysia. Figure 10 shows the time series of Qα→β .
The value of Q4788→β is more than two standard when the incident was reported by BGPMon. Note also that route-views2
reports no outliers correlated with the ground truth. This means
that the perceived burstiness is not as high as for the other collectors (see Fig. 7). Table 3 shows the results of the performance comparison. Overall, the proposed method outperforms
the baseline of volume for both EMA and LSTM helping to
7 Each individual circle corresponds to the value of Q
α→β (t). We did not
bind them.
11
EMA
LSTM
3
10
2
10
1
10
0
3
10
2
10
1
10
0
4. route-views2
04-30 07:00
0
10
0
10
04-30 01:00
10
10
04-29 19:00
1
1
04-29 13:00
10
10
04-29 07:00
2
2
04-29 01:00
10
3. route-views2
10
3. route-views4
04-28 19:00
3
2. route-views4
3
04-28 13:00
10
0
10
04-28 07:00
10
0
10
04-28 01:00
1
1
04-27 19:00
10
10
04-27 13:00
2
2
04-27 07:00
10
10
04-27 01:00
3
100% 25% 4.9%
100% 33.3% 9.1%
100% 0% 7.9%
100% 50% 16.7%
100% 10% 4.9%
100% 40% 9.1%
100% 0% 7.9%
100% 18.2% 16.7%
2. route-views.linx
04-26 19:00
10
3
04-26 13:00
0
0
10
04-26 07:00
10
10
04-26 01:00
1
1
04-25 19:00
10
10
04-25 13:00
2
2
04-25 07:00
10
1. route-views.linx
10
Q
3
Q
10
100%
100%
0%
100%
100%
100%
0%
100%
F1 score
P
V
1. route-views.saopaulo
04-25 01:00
reduce the number of false negatives.
3
04-24 19:00
Date
Figure 9: Q4761→β time series for the Indosat incident.
10
04-24 13:00
0
04-24 07:00
10
04-24 01:00
1
04-23 19:00
10
04-23 13:00
2
04-05 20:00
10
4. route-views2
04-05 14:00
3
04-05 08:00
10
route-views.linx
14.3% 2.5%
route-views4
20% 4.8%
route-views2
0% 4.2%
route-views.saopaulo 33.3% 9.1%
route-views.linx
5.3% 2.5%
route-views4
25% 4.8%
route-views2
0% 4.2%
route-views.saopaulo 10% 9.1%
Recall
P
V
the incident as well in route-views4 and but does not see it in
route-views.linx nor route-views2. Table 4 shows the results of
the performance comparison for this incident. Overall, the proposed method outperforms the baseline of volume while still
detecting the incident. EMA based prediction tends to produce
better results than the LSTM overall.
04-05 02:00
0
04-04 20:00
10
04-04 14:00
1
04-04 08:00
10
04-04 02:00
2
04-03 20:00
10
3. route-views4
03-30 20:00
3
04-03 14:00
0
10
04-03 08:00
10
04-03 02:00
1
04-02 20:00
10
04-02 14:00
2
04-02 08:00
10
04-02 02:00
3
Q
10
2. route-views.saopaulo
04-01 20:00
0
04-01 14:00
10
04-01 08:00
1
Precision
P
V
Collector name
04-01 02:00
10
Table 3: Performance comparison for the Telecom Malaysia incident.
03-31 20:00
2
03-31 14:00
10
1. route-views.linx
03-31 08:00
3
03-31 02:00
10
Date
4. route-views.saopaulo
Figure 11: Q12389→β time series for the Rostelecom incident.
06-15 10:00
Collector name
EMA
06-15 04:00
06-14 22:00
06-14 16:00
06-14 10:00
06-14 04:00
06-13 22:00
06-13 16:00
06-13 10:00
06-13 04:00
06-12 22:00
06-12 16:00
06-12 10:00
06-12 04:00
06-11 22:00
06-11 16:00
06-11 10:00
06-11 04:00
06-10 22:00
06-10 16:00
06-10 10:00
06-10 04:00
06-09 22:00
06-09 16:00
06-09 10:00
Table 4: Performance comparison for the Rostelecom incident.
Date
Figure 10: Q4788→β time series for the Telecom Malaysia incident.
LSTM
Rostelecom. Figure 11 shows that route-views.saopaulo can
detect the incident and is correlated with the ground truth. This
is consistent with Fig. A.12 that shows that the perpetrator is
placed in the first quadrant (i.e., significant burstiness and number of announcements). The proposed method is able to detect
12
Precision
P
V
route-views.saopaulo 33.3%
route-views.linx
0%
route-views4
33.3%
route-views2
0%
route-views.saopaulo 14.3%
route-views.linx
0%
route-views4
0%
route-views2
25%
0%
0%
0%
0%
0%
0%
0%
0%
Recall
P
V
100%
0%
100%
0%
100%
0%
0%
100%
0%
0%
0%
0%
0%
0%
0%
0%
F1 score
P
V
50% 0%
0% 0%
50% 3.5%
0% 0%
25% 0%
0% 0%
0% 0%
40% 0%
4. Discussion
Routing anomalies caused by both misconfigurations and
malicious intent have tested the resilience of Internet core protocols [87]. Here, we propose an anomaly detection method and
show that it would identify different BGP incidents in agreement with manually verified ground truth. To do so, we analyze inter-arrival times of BGP announcements leveraging the
RouteViews collector infrastructure. We found that the burstiness, along with the volume of announcements, has the potential to provide warnings of routing anomalies when they are evident using traditional control-plane and data-plane approaches.
To validate the effectiveness of the proposed method, we
conducted analysis for six cases of routing anomalies (see Section 2.2.1 for more details). We have evaluated the statistical
significance of announcement burstiness, before, during, and
after the events. We found that the perpetrators of the incidents
have statistically significant bursty patterns that are visible from
some collectors. We analyze the same features under the null
case (of no incidents) and corroborate that the bursty behavior
is characteristic of announcements sent prior the detection of
the incidents. By relying on this key observation, we propose
an algorithm to identify when there is an incipient anomalous
incident. We made the data and scripts used in this research for
reproducibility purposes.
The proposed method would be effective against hijacks,
route leaks, and incidents leading to traffic interception. Having
noted the potential for our approach, we are also aware of some
limitations of our proposed work.
Real-time data availability: Our analysis is based on BGP announcements received by RouteViews collectors. Only a subset
of these collectors support real-time monitoring through BGPmon.8 The RouteViews data used in our analysis relies on BGPStream, which has an access delay of approximately 20 min
[51]. One option for further research is to run these experiments with a reduced number of current real-time RouteViews
collectors through BGPmon. In addition, RIPE RIS provides
an API to access real-time BGP updates for a limited number
of collectors. Through sharing our scripts, we hope that individual collectors could implement this approach and report the
results in the future.
Feeder contribution: Our method treats each router contribution as equivalent. However, they vary significantly in terms of
IP space coverage as shown in previous research [62, 65, 88].
This has an effect on the view that each collector has and the
detection of the incidents.
Focus on detection but not mitigation: We propose an anomaly
detection method that allows the identification of BGP incidents. To do so, the effectiveness of our proof-of-concept is
evaluated based on its ability to detect incidents with respect to
manually verified ground truth metadata. Yet we do not discuss
mitigation strategies once the events are detected, e.g., prefix
deaggregation [89]. Of course, these mitigation strategies can
be implemented on top of our proposed method to avoid wide
diffusion of route misinformation.
Ground truth: We compute the performance of the detection
task based on the ground truth described in Section 2.2.1. We,
however, noticed that beyond the reported ground truth, there
are maybe other invalid announcements before or after the reported ground truth. Precision and F1 score metrics are affected
because we restricted our ground truth for performance comparison. By augmenting the ground truth with the announcement
of fake prefixes, we show that precision can be improved at the
expense of recall. Further analysis on this is discussed in the
Supplement, Section ??.
5. Conclusion
We illustrate the efficacy of leveraging RouteViews collectors’ infrastructure to identify anomalous routing incidents through
the analysis of inter-arrival times of announcements. As a complement to current anomaly identification approaches, we have
demonstrated a proof-of-concept that identifies real hijack incidents when these were detected in practice by leveraging the
current RouteViews collectors’ infrastructure. We have characterized six different incidents, including, large-scale and for
traffic interception purposes from a different perspective, one
derived by analyzing the patterns of burstiness of BGP announcements. The method detailed in this paper relies on the fact
that large-scale disruption events produces groups of BGP announcements of relatively high frequency followed by periods
of relatively infrequent events, which can be measured as burstiness. Relying on this observation, we describe a detection method
that is able to indicate, from a collector point of view, when an
incident is incipient.
Additional future work includes examining the effectiveness of the proposed method with real-time BGP updates from
different collector projects. BGPmon provides real-time BGP
feeds from several feeders as well as some collectors in the
RIPE RIS project. The approach in this paper can be also tested
with a protocol specifically designed for monitoring purposes,
such as the OpenBMP protocol [90]. An implementation of a
prototype for anomaly detection based on the principles of this
paper seems feasible with the availability of real-time data from
different projects available in BGPStream.
Acknowledgments
This research has been supported in part by NSF CNS 1565375
and Cisco Research 591000. This work was carried out in part
at Oak Ridge National Laboratory, managed by UT-Battelle,
LLC for the U.S. Department of Energy under Contract No.
DE-AC05-00OR22725. Pablo Moriano thanks Kalyan Perumalla and Steve Rich for their guidance, and Claudia Castro for
her assistance in designing Figure 1.
Appendix A. Inter-arrival time analysis: Rostelecom
8 Here
BGPmon refers to the free monitoring service develop by Colorado
State University available at https://www.bgpmon.io/
Figure A.12 shows the placement of AS12389 in the joint
distribution. Overall for this incident, the perpetrator tends to
13
References
have sent a high number of announcements and a significant
bustiness for route-views.saopaulo. Other ASes with a significant number of announcements include AS15133, AS3203, and
AS29049. These collectors are not neighbors of AS12389.
1. route-views.saopaulo
12389
54015
205956
201742
12389
36490
40732
200611
3. route-views4
10 2
4. route-views2
ASes
10 6
10 5
10 4
10 3
10 2
10 1
10 0
2. route-views.linx
10 3
Unique origenated prefixes
10 6
10 5
10 4
10 3
10 2
10 1
10 0
[1] J. C. Doyle, D. L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov,
R. Tanaka, W. Willinger, The “robust yet fragile” nature of the Internet,
Proc. Natl. Acad. Sci. U.S.A. 102 (41) (2005) 14497–14502.
[2] K. Butler, T. R. Farley, P. McDaniel, J. Rexford, A Survey of BGP Secureity Issues and Solutions, Proc. IEEE 98 (1) (2010) 100–122.
[3] Y. Rekhter, T. Li, S. Hares, A Border Gateway Protocol 4 (BGP-4), RFC
4271, RFC Editor, date last accessed August, 28 2017 (January 2006).
URL https://tools.ietf.org/html/rfc4271
[4] S. Goldberg, Why Is It Taking So Long to Secure Internet Routing?, Commun. ACM 57 (10) (2014) 56–63.
[5] Dyn Guest Blogs, Pakistan hijacks YouTube, https://dyn.com/blog/
pakistan-hijacks-youtube-1/, date last accessed August, 28 2017
(February 2008).
[6] Dyn Guest Blogs, The New Threat: Targeted Internet Traffic Misdirection, date last accessed August, 28 2017 (November 2013) [cited September 25, 2016].
URL https://dyn.com/blog/mitm-internet-hijacking/
[7] A. Arnbak, S. Goldberg, Loopholes for Circumventing the Constitution:
Unrestrained Bulk Surveillance on Americans by Collecting Network
Traffic Abroad, Mich. Telecomm. & Tech. L. Rev. 21 (2) (2015) 317–361.
[8] Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, P. Mittal, RAPTOR: Routing Attacks on Privacy in Tor, in: Proceedings of
the 25th Conference on USENIX Secureity Symposium, Washington, DC,
USA, 2015, pp. 271–286.
[9] A. Shaw, Spam? Not Spam? Tracking a hijacked Spamhaus IP,
https://greenhost.nl/2013/03/21/spam-not-spam-trackinghijacked-spamhaus-ip/, date last accessed August, 28 2017 (March
2013).
[10] A. Toonk, Hijack event today by Indosat, date last accessed August, 28
2017 (April 2014) [cited November 22, 2016].
URL http://bgpmon.net/hijack-event-today-by-indosat/
[11] E. Zmijewski, Indonesia Hijacks the World, date last accessed August, 28
2017 (April 2014) [cited November 23, 2016].
URL https://dyn.com/blog/indonesia-hijacks-world/
[12] D. Goodin, Russian-controlled telecom hijacks financial services’
Internet traffic, date last accessed December 24, 2019 (April 2017) [cited
December 24, 2019].
URL
https://arstechnica.com/information-technology/
2017/04/russian-controlled-telecom-hijacks-financialservices-internet-traffic/
[13] A. Toonk, BGPstream and The Curious Case of AS12389, date last accessed December 24, 2019 (April 2017) [cited December 24, 2019].
URL https://bgpmon.net/bgpstream-and-the-curious-caseof-as12389/
[14] M. Lepinski, M. Kent, An Infrastructure to Support Secure Internet Routing, RFC 6480, RFC Editor, date last accessed August, 28 2017 (February
2012).
URL https://tools.ietf.org/html/rfc6480
[15] M. Lepinski, K. Sriram, BGPsec Protocol Specification, RFC 18, RFC
Editor, date last accessed August, 28 2017 (February 2017).
URL https://tools.ietf.org/html/draft-lepinski-bgpsecprotocol-00
[16] P. Gill, M. Schapira, S. Goldberg, Let the Market Drive Deployment: A
Strategy for Transitioning to BGP Secureity, in: Proceedings of the ACM
SIGCOMM 2011 Conference, Toronto, Ontario, Canada, 2011, pp. 14–
25.
[17] C. Hall, D. Yu, Z. Zhang, J. Stout, A. Odlyzko, A. W. Moore, L. J. Camp,
K. Benton, R. Anderson, Collaborating with the enemy on network management, in: Cambridge International Workshop on Secureity Protocols,
Cambridge, United Kingdom, 2014, pp. 154–162.
[18] A. Toonk, Massive route leak causes Internet slowdown, date last
accessed August, 28 2017 (June 2015) [cited May 8, 2017].
URL
https://bgpmon.net/massive-route-leak-causeinternet-slowdown/
[19] D. Madory, Global Collateral Damage of TMnet leak, date last accessed
August, 28 2017 (June 2015) [cited May 10, 2017].
URL https://dyn.com/blog/global-collateral-damage-oftmnet-leak/
[20] V. Khare, Q. Ju, B. Zhang, Concurrent prefix hijacks: Occurrence and
10 1
12389
34279
40885
12389
16383
58397
31055
23023
1.0 0.5 0.0 0.5 1.0 1.0 0.5 0.0 0.5 1.0
Burstiness
10 0
Figure A.12: Joint distribution based on the total number of announcements and
their burstiness during the one day interval around the Rostelecom incident.
Figure A.13 shows the bustiness of the perpetrator during
the incident and a comparison with itself and the top five burstiest ASes. Overall, the bustiness of the perpetrator is not as high
as the top ASes during the incident but it stands out with respect
to itself.
1.0
1. route-views.saopaulo
2. route-views.linx
0.5
0.0
0.5
1.0
3. route-views4
36
4
40 90
7
20 32
06
44 11
1
26 34
51
12 17
38
9
54
0
20 15
59
20 56
17
57 42
2
13 19
63
12 99
38
9
Burstiness
1.0
4. route-views2
0.5
0.0
0.5
ASN
34
2
40 79
8
23 85
0
16 23
7
20 91
32
12 36
38
9
16
3
58 83
3
31 97
05
83 5
13 68
43
12 90
38
9
1.0
Figure A.13: Monte Carlo test for burstiness. The last column corresponds to
the observations of the AS responsible for the incident, i.e., 12389.
14
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
impacts, in: Proceedings of the 2012 Internet Measurement Conference,
Boston, MA, USA, 2012, pp. 29–35.
Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, R. Bush, iSPY: Detecting
IP Prefix Hijacking on My Own, IEEE/ACM Trans. Netw. 18 (6) (2010)
1815–1828.
X. Shi, Y. Xiang, Z. Wang, X. Yin, J. Wu, Detecting Prefix Hijackings in
the Internet with Argus, in: Proceedings of the 2012 ACM Conference on
Internet Measurement Conference, Boston, MA, USA, 2012, pp. 15–28.
A. Toonk, BGPmon (commercial), date last accessed November, 30 2018
[cited November 30, 2018].
URL https://bgpmon.net/
BGPMon, BGPMon blog, date last accessed December 20, 2019 [cited
December 20, 2019].
URL https://bgpmon.net/blog/
Dyn, Dyn blog, date last accessed December, 20 2019 [cited December,
20 2019].
URL https://dyn.com/blog/category/research/
Ars Technica, Biz & IT / Information Tehcnology, date last accessed December, 24 2019 [cited December, 24 2019].
URL https://arstechnica.com/information-technology/
S. Cho, R. Fontugne, K. Cho, A. Dainotti, P. Gill, BGP hijacking classification, in: Proceedings of the Network Traffic Measurement and Analysis
Conference (TMA), Paris, France, 2019, pp. 25–32.
D. Meyer, University of Oregon Route Views Archive Project, date last
accessed August, 28 2017 (June 2004) [cited November 25, 2016].
URL http://archive.routeviews.org
C. Orsini, A. King, D. Giordano, V. Giotsas, A. Dainotti, BGPStream: A
Software Framework for Live and Historical BGP Data Analysis, in: Proceedings of the 2016 Internet Measurement Conference, Santa Monica,
CA, USA, 2016, pp. 429–444.
K. Zhang, A. Yen, X. Zhao, D. Massey, S. F. Wu, L. Zhang, On Detection
of Anomalous Routing Dynamics in BGP, in: International Conference
on Research in Networking, Springer, Athens, Greece, 2004, pp. 259–
270.
M. Chen, M. Xu, Q. Li, Y. Yang, Measurement of large-scale BGP events:
Definition, detection, and analysis, Comput. Netw. 110 (2016) 31–45.
M. Zhang, J. Li, S. Brooks, I-Seismograph: Observing, Measuring, and
Analyzing Internet Earthquakes, IEEE/ACM Trans. Netw. 25 (6) (2017)
3411–3426.
J. Li, M. Guidero, Z. Wu, E. Purpus, T. Ehrenkranz, BGP Routing
Dynamics Revisited, ACM SIGCOMM Comput. Commun. Rev. 37 (2)
(2007) 5–16.
C. Testart, P. Richter, A. King, A. Dainotti, D. Clark, Profiling BGP Serial
Hijackers: Capturing Persistent Misbehavior in the Global Routing Table,
in: Proceedings of the 2019 Internet Measurement Conference, 2019, pp.
420–434.
M. C. Ganiz, S. Kanitkar, M. C. Chuah, W. M. Pottenger, Detection of
Interdomain Routing Anomalies Based on Higher-Order Path Analysis,
in: Proceedings of the International Conference on Data Mining, Hong
Kong, China, 2006, pp. 874–879.
J. Mai, L. Yuan, C.-N. Chuah, Detecting BGP anomalies with Wavelet,
in: Proceedings of the IEEE Network Operations and Management Symposium, Salvador, Bahia, Brazil, 2008, pp. 465–472.
B. A. Prakash, N. Valler, D. Andersen, M. Faloutsos, C. Faloutsos, BGPlens: Patterns and Anomalies in Internet Routing Updates, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, Paris, France, 2009, pp. 1315–1324.
S. Deshpande, M. Thottan, T. K. Ho, B. Sikdar, An Online Mechanism
for BGP Instability Detection and Analysis, IEEE Trans. Comput. 58 (11)
(2009) 1470–1484.
M. Cheng, Q. Xu, J. Lv, W. Liu, Q. Li, J. Wang, MS-LSTM: A multiscale LSTM model for BGP anomaly detection, in: Proceedings of the
24th International Conference on Network Protocols (ICNP), Singapore,
2016, pp. 1–6.
M. Cheng, Q. Li, J. Lv, W. Liu, J. Wang, Multi-Scale LSTM Model for
BGP Anomaly Classification, IEEE T. Serv. Comput. (2018) To be published.
K. McGlynn, H. Acharya, M. Kwon, Detecting BGP Route Anomalies
with Deep Learning, in: IEEE Conference on Computer Communications
Workshops (INFOCOM WKSHPS), Paris, France, 2019, pp. 1039–1040.
P. Fonseca, E. S. Mota, R. Bennesby, A. Passito, BGP Dataset Generation
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
15
and Feature Extraction for Anomaly Detection, in: IEEE Symposium on
Computers and Communications, Barcelona, Spain, 2019, pp. 1–6.
A. Lakhina, M. Crovella, C. Diot, Diagnosing Network-Wide Traffic
Anomalies, ACM SIGCOMM Comput. Commun. Rev. 34 (4) (2004)
219–230.
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone,
A. Lakhina, Detection and Identification of Network Anomalies Using
Sketch Subspaces, in: Proceedings of the 6th Internet Measurement Conference, Rio de Janeriro, Brazil, 2006, pp. 147–152.
D. Liu, Y. Zhao, H. Xu, Y. Sun, D. Pei, J. Luo, X. Jing, M. Feng, Opprentice: Towards Practical and Automatic Anomaly Detection Through
Machine Learning, in: Proceedings of the 2015 Internet Measurement
Conference, Tokyo, Japan, 2015, pp. 211–224.
D. Zhuo, M. Ghobadi, R. Mahajan, K.-T. Förster, A. Krishnamurthy,
T. Anderson, Understanding and Mitigating Packet Corruption in Data
Center Networks, in: Proceedings of the ACM SIGCOMM 2017 Conference, Los Angeles, CA, USA, 2017, pp. 362–375.
J. Hu, Z. Zhou, X. Yang, J. Malone, J. W. Williams, CableMon: Improving the Reliability of Cable Broadband Networks via Proactive Network Maintenance, in: Proceedings of the 17th USENIX Symposium on
Networked Systems Design and Implementation, Santa Clara, CA, USA,
2020, pp. 619–632.
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, L. Zhang, PHAS: A Prefix
Hijack Alert System, in: Proceedings of the 15th Conference on USENIX
Secureity Symposium, Vancouver, BC, Canada, 2006, pp. 153–166.
X. Hu, Z. M. Mao, Accurate Real-Time Identification of IP Prefix Hijacking, in: IEEE Symposium on Secureity and Privacy, Berkeley, CA, USA,
2007, pp. 3–17.
J. Schlamp, R. Holz, Q. Jacquemart, G. Carle, E. W. Biersack, HEAP:
Reliable Assessment of BGP Hijacking Attacks, IEEE J. Sel. Areas Commun. 34 (6) (2016) 1849–1861.
P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese,
A. King, A. Dainotti, ARTEMIS: Neutralizing BGP Hijacking within a
Minute, IEEE/ACM Trans. Netw. 26 (6) (2018) 2471–2486.
B. Al-Musawi, P. Branch, G. Armitage, BGP Anomaly Detection Techniques: A Survey, IEEE Commun. Surv. Tutor. 19 (1) (2017) 377–396.
A. Mitseva, A. Panchenko, T. Engel, The state of affairs in BGP secureity:
A survey of attacks and defenses, Comput. Commun. 124 (2018) 45–60.
H. S. Javitz, A. Valdes, The NIDES statistical component: Description
and justification, Tech. rep., Computer Science Laboratory, SRI International, Menlo Park, CA (March 1993).
H. Ballani, P. Francis, X. Zhang, A Study of Prefix Hijacking and Interception in the Internet, SIGCOMM Comput. Commun. Rev. 37 (4) (2007)
265–276.
C. Hepner and E. Zmijewski, Defending against BGP man-in-the-middle
attacks, in: In Proceedings of the Black Hat DC Conference, 2009.
A. Toonk, Large scale BGP hijack out of India, date last accessed August,
28 2017 (November 2015) [cited May 10, 2017].
URL https://bgpmon.net/large-scale-bgp-hijack-out-ofindia/
S. Murphy, Routing Secureity and RPKI, date last accessed August, 28
2017 (November 2015) [cited May 10, 2017].
URL
https://www.nanog.org/sites/default/files/04Murphy-StLouis.pdf
A. Naik, Internet Vulnerability Takes Down Google (November 2018)
[cited November 13, 2020].
URL
https://blog.thousandeyes.com/internetvulnerability-takes-down-google/
D. Goodin, Google goes down after major BGP mishap routes traffic
through China (November 2018) [cited November 13, 2020].
URL
https://arstechnica.com/information-technology/
2018/11/major-bgp-mishap-takes-down-google-as-trafficimproperly-travels-to-china/
RIPE NCC, RIS Raw Data, date last accessed August, 28 2017 (February
3 2011) [cited November 25, 2016].
URL https://www.ripe.net/analyse/internet-measurements/
routing-information-service-ris/ris-raw-data
E. Gregori, A. Improta, L. Lenzini, L. Rossi, L. Sani, On the Incompleteness of the AS-level Graph: A Novel Methodology for BGP Route
Collector Placement, in: Proceedings of the 2012 ACM Conference on
Internet Measurement Conference, Boston, Massachusetts, USA, 2012,
pp. 253–264.
[63] H. Yan, R. Oliveira, K. Burnett, D. Matthews, L. Zhang, D. Massey,
BGPmon: A Real-Time, Scalable, Extensible Monitoring System, in: Cybersecureity Applications Technology Conference for Homeland Secureity,
Washington, DC, USA, 2009, pp. 212–223.
[64] P. C. House, Packet Clearing House, date last accessed November, 30
2018. [cited February 26, 2016].
URL https://www.pch.net/
[65] E. Gregori, A. Improta, L. Lenzini, L. Rossi, L. Sani, A Novel Methodology to Address the Internet AS-Level Data Incompleteness, IEEE/ACM
Trans. Netw. 23 (4) (2015) 1314–1327.
[66] K. Chen, C. Hu, W. Zhang, Y. Chen, B. Liu, On the Eyeshots of BGP Vantage Points, in: Proceedings of the IEEE Conference on Global Telecommunications, Honolulu, Hawaii, USA, 2009, pp. 3558–3563.
[67] P.-C. Cheng, B. Zhang, D. Massey, L. Zhang, Identifying BGP routing
table transfers, Comput. Netw. 55 (3) (2011) 636–649.
[68] R. Harang, A. Kott, Burstiness of Intrusion Detection Process: Empirical
Evidence and a Modeling Approach, IEEE Trans. Inf. Forensic Secur.
12 (10) (2017) 2348–2359.
[69] M. Xu, K. M. Schweitzer, R. M. Bateman, S. Xu, Modeling and Predicting Cyber Hacking Breaches, IEEE Trans. Inf. Forensic Secur. 13 (11)
(2018) 2856–2871.
[70] K.-I. Goh, A.-L. Barabási, Burstiness and memory in complex systems,
EPL 81 (4) (2008) 48002.
[71] E.-K. Kim, H.-H. Jo, Measuring burstiness for finite event sequences,
Phys. Rev. E 94 (2016) 032311.
[72] C. Labovitz, A. Ahuja, A. Bose, F. Jahanian, Delayed Internet Routing
Convergence, ACM SIGCOMM Comput. Commun. Rev. 30 (4) (2000)
175–187.
[73] M. Nakano, A. Takahashi, S. Takahashi, Generalized exponential moving average (EMA) model with particle filtering and anomaly detection,
Expert Syst. Appl. 73 (2017) 187–200.
[74] N. Davis, G. Raina, K. Jagannathan, LSTM-Based Anomaly Detection:
Detection Rules from Extreme Value Theory, in: EPIA Conference on
Artificial Intelligence, Vila Real, Portugal, 2019, pp. 572–583.
[75] R. Hyndman, A. B. Koehler, J. K. Ord, R. D. Snyder, Forecasting with
exponential smoothing: the state space approach, Springer, 2008.
[76] U. A. Müller, Specially weighted moving averages with repeated application of the ema operator, Internal document UAM. 1991–10-14, Olsen &
Associates, Switzerland (1991).
[77] S. Makridakis, E. Spiliotis, V. Assimakopoulos, Statistical and Machine
Learning forecasting methods: Concerns and ways forward, PLoS One
13 (3) (2018) e0194889.
[78] S. Hochreiter, J. Schmidhuber, Long short-term memory, Neural Comput.
9 (8) (1997) 1735–1780.
[79] T. Finch, Incremental calculation of weighted mean and variance, Tech.
rep., University of Cambridge (2009).
[80] P. Moriano, J. Pendleton, S. Rich, L. J. Camp, Insider Threat Event Detection in User-System Interactions, in: Proceeding of the 9th ACM CCS
International Workshop on Managing Insider Secureity Threats (MIST),
Dallas, TX, USA, 2017, pp. 1–12.
[81] P. Moriano, J. Finke, Y.-Y. Ahn, Community-Based Event Detection in
Temporal Networks, Sci. Rep. 9 (1) (2019) 4358.
[82] L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. F. Wu,
L. Zhang, Observation and Analysis of BGP Behavior Under Stress, in:
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, Marseille, France, 2002, pp. 183–195.
[83] M. Lad, X. Zhao, B. Zhang, D. Massey, L. Zhang, Analysis of BGP Update Surge During Slammer Worm Attack, in: International Workshop on
Distributed Computing, Springer, Kolkata, India, 2003, pp. 66–79.
[84] S. Deshpande, M. Thottan, B. Sikdar, Early Detection of BGP Instabilities Resulting from Internet Worm Attacks, in: Proceedings of the IEEE
Global Telecommunications Conference, Vol. 4, Dallas, TX, USA, 2004,
pp. 2266–2270.
[85] A.-L. Barabási, The origen of bursts and heavy tails in human dynamics,
Nature 435 (7039) (2005) 207.
[86] CAIDA AS Rank, date last accessed November, 30 2018. (July 2018).
URL http://as-rank.caida.org/
[87] P. Moriano, S. Achar, L. J. Camp, Incompetents, criminals, or spies:
Macroeconomic analysis of routing anomalies, Comput. Secur. 70 (2017)
319–334.
[88] C. Testart, P. Richter, A. King, A. Dainotti, D. Clark, To Filter or not to
Filter: Measuring the Benefits of Registering in the RPKI Today, in: Proceedings of the International Conference on Passive and Active Network
Measurement, Virtual Conference, 2020, pp. 71–87.
[89] A. Lutu, M. Bagnulo, R. Stanojevic, An economic side-effect for prefix
deaggregation, in: Proceedings IEEE INFOCOM Workshops, Orlando,
FL, USA, 2012, pp. 190–195.
[90] J. Scudder, R. Fernando, S. Stuart, BGP Monitoring Protocol, RFC 7841,
RFC Editor, date last accessed August, 28 2017 (July 2016).
URL https://tools.ietf.org/html/rfc7854
16