Skip to main content

Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models

  • Conference paper
  • First Online:
  • 438 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 942))

Abstract

Traffic redirection attacks based on BGP route hijacking has been an increasing concern in Internet security worldwide. This paper addresses the statistical detection of traffic redirection attacks based on the RTT data collected by a network of probes spread all around the world. Specifically, we use a Latent Class Model to combine the decisions of individual probes on whether an Internet site is being attacked, and use supervised learning methods to perform the probe decisions. We evaluate the methods in a large number of scenarios, and compare them with an empirically adjusted heuristic. Our method achieves very good performance, superior to the heuristic one. Moreover, we provide a comprehensive analysis of the merits of the Latent Class Model approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. ACM SIGCOMM CCR 37(4), 265–276 (2007). https://doi.org/10.1145/1282427.1282411

    Article  Google Scholar 

  2. Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100–122 (2010)

    Article  Google Scholar 

  3. Cimpanu, C.: DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident. Bleeping Computer News (2018). https://www.bleepingcomputer.com/news/security/dns-poisoning-or-bgp-hijacking-behind-trezor-wallet-phishing-incident/

  4. Cowie, J.: The New Threat: Targeted Internet Traffic Misdirection. Blog - Renesys- The Internet Intelligence Authority (2013). http://www.renesys.com/2013/11/mitm-internet-hijacking/

  5. Goodman, L.A.: Analyzing Qualitative/Categorical Data: Log-linear Models and Latent Structure Analysis. Abt Books, Cambridge (1978)

    MATH  Google Scholar 

  6. Huston, G., Rossi, M., Armitage, G.: Securing BGP - a literature survey. IEEE Commun. Surv. Tutor. 13(2), 199–222 (2011)

    Article  Google Scholar 

  7. Liu, Y., Luo, X., Chang, R., Su, J.: Characterizing inter-domain rerouting by betweenness centrality after disruptive events. IEEE J. Sel. Areas Commun. 31, 1147–1157 (2013)

    Article  Google Scholar 

  8. Madory, D.: BGP/DNS Hijacks Target Payment Systems. Oracle+Dyn Blog (2018). https://dyn.com/blog/bgp-dns-hijacks-target-payment-systems/

  9. Murphy, S.: BGP Security Vulnerabilities Analysis, RFC 4272 (Informational). Internet Engineering Task Force (2006)

    Google Scholar 

  10. Pilosov, A., Kapela, T.: Stealing the internet - an internet-scale man in the middle attack. In: DEFCON 16 (2008)

    Google Scholar 

  11. R Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2018). https://www.R-project.org/

  12. Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4), RFC 4271(Draft Standard). Internet Engineering Task Force (2006). http://www.ietf.org/rfc/rfc4271.txt

  13. Salvador, P., Nogueira, A.: Customer-side detection of internet-scale traffic redirection. In: 2014 16th International Telecommunications Network Strategy and Planning Symposium, pp. 1–5 (2014). https://doi.org/10.1109/NETWKS.2014.6958532

  14. Trevor, H., Robert, T., Friedman, J.H.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer, Heidelberg (2009)

    MATH  Google Scholar 

  15. Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: detecting IP prefix hijacking on my own. IEEE/ACM Trans. Netw. 18(6), 1815–1828 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Instituto de Telecomunicações, Centro de Matemática Computacional e Estocástica, and Fundação Nacional para a Ciência e Tecnologia, through projects PTDC/EEI-TEL/5708/2014, UID/EEA/50008/2013, and UID/Multi/04621/2013. A. Subtil was funded by the FCT grant SFRH/BD/69793/2010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ana Subtil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subtil, A., Oliveira, M.R., Valadas, R., Pacheco, A., Salvador, P. (2020). Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class Models. In: Madureira, A., Abraham, A., Gandhi, N., Silva, C., Antunes, M. (eds) Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018). SoCPaR 2018. Advances in Intelligent Systems and Computing, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-17065-3_37

Download citation

Publish with us

Policies and ethics