Ecole d'ingénieur et centre de recherche en Sciences du numérique

Malicious BGP hijacks: appearances can be deceiving

Vervier, Pierre-Antoine; Jacquemart, Quentin; Schlamp, Johann; Thonnard, Olivier; Carle, Georg; Urvoy-Keller, Guillaume; Biersack, Ernst; Dacier, Marc

ICC CISS 2014, IEEE International Conference on Communications, 10-14 June 2014, Sydney, Australia

BGP hijacking is a well known threat to the Internet routing infrastructure. There has been considerable interest in developing tools that detect prefix hijacking but such systems usually identify a large number of events, many of them being due to some benign BGP engineering practice or misconfiguration. Ramachandran et al. [1] and later Hu et al. [2] also correlated suspicious routing events with spam and claimed to have found evidence of spammer temporarily stealing prefixes to send spam. In an effort to study at large scale the existence and the prevalence of malicious BGP hijacks in the Internet we developed a system which (i) identifies hijacks using BGP, traceroute and IRR data and (ii) investigates traffic originating from the reported networks with spam and netflow data. In this paper we present a real case where suspicious BGP announcements coincided with spam and web scam traffic from corresponding networks. Through this case study we show that a correlation of suspicious routing events with malicious activities is insufficient to evidence harmful BGP hijacks. We thus question previously reported cases and conclude that identifying malicious BGP hijacks requires additional data sources as well as feedback from network owners in order to reach decisive conclusions.

Document Doi Hal Bibtex

Titre:Malicious BGP hijacks: appearances can be deceiving
Département:Sécurité numérique
Eurecom ref:4217
Copyright: © 2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Bibtex: @inproceedings{EURECOM+4217, doi = {}, year = {2014}, title = {{M}alicious {BGP} hijacks: appearances can be deceiving}, author = {{V}ervier, {P}ierre-{A}ntoine and {J}acquemart, {Q}uentin and {S}chlamp, {J}ohann and {T}honnard, {O}livier and {C}arle, {G}eorg and {U}rvoy-{K}eller, {G}uillaume and {B}iersack, {E}rnst and {D}acier, {M}arc}, booktitle = {{ICC} {CISS} 2014, {IEEE} {I}nternational {C}onference on {C}ommunications, 10-14 {J}une 2014, {S}ydney, {A}ustralia}, address = {{S}ydney, {AUSTRALIE}}, month = {01}, url = {} }
Voir aussi: