Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > publications : papers : 2019 : profiling_bgp_serial_hijackers
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table
C. Testart, P. Richter, A. King, A. Dainotti, and D. Clark, "Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table", in ACM Internet Measurement Conference (IMC), Oct 2019.
|   View full paper:    PDF    DOI    Related Presentation    |  Citation:    BibTeX    Resource Catalog   |

Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table

Cecilia Testart2
Philipp Richter2
Alistair King1
Alberto Dainotti1
David Clark2
1

CAIDA, San Diego Supercomputer Center, University of California San Diego

2

Massachusetts Institute of Technology's Computer Science & Artificial Intelligence Laboratory (MIT/CSAIL)

BGP hijacks remain an acute problem in today’s Internet, with widespread consequences. While hijack detection systems are readily available, they typically rely on a priori prefix-ownership information and are reactive in nature. In this work, we take on a new perspective on BGP hijacking activity: we introduce and track the long-term routing behavior of serial hijackers, networks that repeatedly hijack address blocks for malicious purposes, often over the course of many months or even years. Based on a ground truth dataset that we construct by extracting information from network operator mailing lists, we illuminate the dominant routing characteristics of serial hijackers, and how they differ from legitimate networks.We then distill features that can capture these behavioral differences and train a machine learning model to automatically identify Autonomous Systems (ASes) that exhibit characteristics similar to serial hijackers. Our classifier identifies ≈ 900 ASes with similar behavior in the global IPv4 routing table. We analyze and categorize these networks, finding a wide range of indicators of malicious activity, misconfiguration, as well as benign hijacking activity. Our work presents a solid first step towards identifying and understanding this important category of networks, which can aid network operators in taking proactive measures to defend themselves against prefix hijacking and serve as input for current and future detection systems.

Keywords: hijack, routing, security, topology
  Last Modified: Wed Dec-15-2021 16:33:58 UTC
  Page URL: https://www.caida.org/publications/papers/2019/profiling_bgp_serial_hijackers/index.xml