Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
ARTEMIS: Neutralizing BGP Hijacking within a Minute
P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, and A. Dainotti, "ARTEMIS: Neutralizing BGP Hijacking within a Minute", Tech. rep., Center for Applied Internet Data Analysis (CAIDA), Jan 2018.
|   View full paper:    PDF    Related Presentation    |  Citation:    BibTeX   |

ARTEMIS: Neutralizing BGP Hijacking within a Minute

Pavlos Sermpezis2
Vasileios Kotronis2
Petros Gigis2
Xenofontas Dimitropoulos2, 4
Danilo Cicalese1, 3
Alistair King1
Alberto Dainotti1
1

CAIDA, San Diego Supercomputer Center, University of California San Diego

2

Foundation for Research and Technology - Hellas, Institute of Computer Science (FORTH-ICS)

3

Telecom ParisTech

4

University of Crete

BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. They suffer from: (i) lack of detection comprehensiveness, allowing sophisticated attackers to evade detection, (ii) limited accuracy, especially in the case of third-party detection, (iii) delayed verification and mitigation of incidents, reaching up to days, and (iv) lack of privacy and of flexibility in post-hijack counteractions, from the side of network operators. In this work, we propose ARTEMIS, a defense approach (a) based on accurate and fast detection operated by the AS itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards real-time streaming, thus (b) enabling flexible and fast mitigation of hijacking events. Compared to previous work, our approach combines characteristics desirable to network operators such as comprehensiveness, accuracy, speed, privacy, and flexibility. Finally, we show through real-world experiments that, with the ARTEMIS approach, prefix hijacking can be neutralized within a minute.

Keywords: passive data analysis, routing, security, software/tools, topology
  Last Modified: Thu Oct-11-2018 14:51:09 PDT
  Page URL: http://www.caida.org/publications/papers/2018/artemis_tr/index.xml