A Survey among Network Operators on BGP Prefix Hijacking

01/09/2018
by   Pavlos Sermpezis, et al.
0

BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or modifications to BGP that protect the Internet against it have been proposed. However, the reality is that most operators have not deployed them and are reluctant to do so in the near future. Instead, they rely on basic - and often inefficient - proactive defenses to reduce the impact of hijacking events, or on detection based on third party services and reactive approaches that might take up to several hours. In this work, we present the results of a survey we conducted among 75 network operators to study: (a) the operators' awareness of BGP prefix hijacking attacks, (b) presently used defenses (if any) against BGP prefix hijacking, (c) the willingness to adopt new defense mechanisms, and (d) reasons that may hinder the deployment of BGP prefix hijacking defenses. We expect the findings of this survey to increase the understanding of existing BGP hijacking defenses and the needs of network operators, as well as contribute towards designing new defense mechanisms that satisfy the requirements of the operators.

READ FULL TEXT

page 5

page 6

research
02/27/2023

Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators

It is becoming increasingly imperative to design robust ML defenses. How...
research
05/28/2019

An Investigation of Data Poisoning Defenses for Online Learning

We consider data poisoning attacks, where an adversary can modify a smal...
research
01/03/2018

ARTEMIS: Neutralizing BGP Hijacking within a Minute

BGP prefix hijacking is a critical threat to Internet organizations and ...
research
05/02/2019

A Survey of Moving Target Defenses for Network Security

Network defense techniques based on traditional tools, techniques, and p...
research
07/21/2021

Challenges in cybersecurity: Lessons from biological defense systems

We explore the commonalities between methods for assuring the security o...
research
09/12/2019

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

Reactive defense mechanisms, such as intrusion detection systems, have m...
research
01/28/2022

A survey on flexible/restricted skyline and their applicability

Skyline and Top-k are two of the most important methods to extract infor...

Please sign up or login with your details

Forgot password? Click here to reset