2011 19th IEEE International Conference on Network Protocols 2011
DOI: 10.1109/icnp.2011.6089080
|View full text |Cite
|
Sign up to set email alerts
|

Argus: An accurate and agile system to detecting IP prefix hijacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…This part of work is inspired by other previous researches [24,25]. Finally, the routing anomaly monitoring module in our scheme builds on a lot of control-plane based hijacking detection proposals [16,32,33].…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…This part of work is inspired by other previous researches [24,25]. Finally, the routing anomaly monitoring module in our scheme builds on a lot of control-plane based hijacking detection proposals [16,32,33].…”
Section: Related Workmentioning
confidence: 96%
“…Moreover, recent studies [11,12] indicated that even in the case of full deployment, there are some forms of prefix interception attacks that the cryptographic schemes cannot prevent. (2) For the detection proposals [13][14][15][16], they often identify prefix hijacking by discovering anomalous BGP routes (control plane) and black holes (data plane). However, prefix interception cannot also be detected by those methods.…”
Section: Introductionmentioning
confidence: 99%
“…Argus [36] is an agile system to detect prefix hijacking and other anomalies caused by misconfigurations or malicious attacks; this system has been collecting data since June 1, 2011. After cross checking the RouteViews data described in Section 3 and the data collected from Argus, we found that in IPv4, at least 170 036 out of 5 973 568 (2.85%) BAPLs were associated with prefix hijacking or other routing anomalies from June 1, 2011 to December 31, 2013.…”
Section: Faulty Configurations or Malicious Attacksmentioning
confidence: 99%
“…Contrary to control-plane methods, dataplane approaches are able to detect any path changes in the traffic resulting in higher accuracy. However, traffic monitoring changes are mostly deployed at the AS neighborhood level and have not been proven at large-scale, i.e., they suffer from poor scalability (Xiang et al, 2011).…”
Section: Routing Securitymentioning
confidence: 99%
“…We depended upon the Argus data set for the identification of anomalies. For the purpose of collecting routing anomalous events, we compiled data over the 43 months from June 2011 to December 2014 from the Argus 4 API, as of December 20, 2015 (Xiang et al, 2011;Shi et al, 2012).…”
Section: Dependent Variablementioning
confidence: 99%