multiple/different ASes; to alleviate the effect of the
hijack, the algorithm has to work collaboratively to
prevent the propagation of invalid routes. The
detection algorithm operates independently from
BGP and categorises network events, but may
benefit from sharing and receiving data from other
neighbouring routers in order to detect the effect of
the attack rapidly. The BGP updates may be
collected and aggregated by a router over a specific
operational timeslot, while bearing in mind that
anomaly detection becomes stale with higher
aggregation slots. In case of detecting a suspicious
route, an alarm of the invalid route would be sent to
all neighbours.
The algorithm should run in each router, based
on the different information received. In addition to
the use BSA (of Binary search algorithm), making
the routers work collaboratively and independently
would increase the detection speed and would not
require any modifications of the infrastructure of the
BGP routers. Figure 4 shows the general structure of
the improved detection method when linked to the
BGP routers.
Figure 4: Architectural method of linking BGP to the
detection method.
Moreover, if some routers do not actively run the
detection system, the other routers may identify and
publicise the anomaly. By doing so, each BGP
router will have a chance to suppress any suspicious
routes to prevent itself from further propagating the
hijacked routes.
6.2 The Effectiveness of the
Architecture over the Algorithm
The advantage of a collaborative architecture in the
BGP context is that each router can only check its
own received update packets so there is no load to
the algorithm to find out the hijack. Another
advantage of this collaboration is that the check will
be periodic, with timeslot starting times distributed
over time. For example, if Router A cannot detect
the hijack at 1:15 AM because it is not the time slot
to do the check, there may be another copy of the
algorithm in the neighbouring routers doing the
check and detecting the hijack faster.
7 CONCLUSION AND FUTURE
WORK
A new framework was proposed to enhance the
accuracy of a previously proposed method for IP
prefix hijack detection. The framework extracts the
unique code and associated ASNs of organisations
from different RIRs; the algorithm then excludes
previously detected IP prefix hijacks that are likely
to be false positives. After proposing the framework,
its efficiency is validated on the Pakistan IP
hijacking event from 24
th
Feb 2008 and the Con-
Edison hijack (22
nd
Jan 2006). The analysis used the
RIPE dump database from the two respective dates
as a case study to evaluate the proposed framework.
In the evaluation, the algorithm was able to improve
the accuracy of the IP prefix hijacks, reducing the
false positives by 0.61% (18 suspicious hijack) for
the two events.
From the results, it is clear that the algorithm can
work accurately but also could omit some events;
more specifically, several incidents from 22
nd
Jan
2006 were still false positives, since the analysis was
based only on the RIPE database. Additionally, if an
AS announces an IP prefix in the absence of the real
origin AS, the algorithm will not be able to detect
the impersonation when it works independently
(non-collaboratively).
In terms of router interconnectivity, some routers
do not have a direct connection to the hijacker. In
other words, the detection method ought to be
decentralised in order to collect direct information
regarding the hijacker and detect the hijack faster.
Another advantage of the decentralisation is that
detection of anomalies can be done for various,
partially overlapping timeslots. Another challenge of
the algorithm is that the hijacker could impersonate
one of the net-range IP prefixes (sub-prefixes), event
that may be transparent for the algorithm. Last, the
period gap (synchronisation) between fetching BGP
updates and the current status of the ASN of an
organisation, together with the IP prefixes changes,
could have a negative impact on the accuracy of the
algorithm.