kth.sePublications
Change search
Link to record
Permanent link

Direct link
Milolidakis, Alexandros
Publications (3 of 3) Show all publications
Milolidakis, A., Buhler, T., Wang, K., Chiesa, M., Vanbever, L. & Vissicchio, S. (2023). On the Effectiveness of BGP Hijackers That Evade Public Route Collectors. IEEE Access, 11, 31092-31124
Open this publication in new window or tab >>On the Effectiveness of BGP Hijackers That Evade Public Route Collectors
Show others...
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 31092-31124Article in journal (Refereed) Published
Abstract [en]

Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route collection systems, called route collectors, give us hope that future monitor systems can quickly detect and ultimately mitigate hijacks. In this paper, we investigate the effectiveness of public route collectors with respect to future attackers deliberately engineering longer hijacks to avoid being recorded by route collectors. Our extensive simulations (and attacks we device) show that monitor-based systems may be unable to observe many carefully crafted hijacks diverting traffic from thousands of ASes. Hijackers could predict whether their attacks would propagate to some BGP feeders (i.e., monitors) of public route collectors. Then, manipulate BGP route propagation so that the attack never reaches those monitors. This observation remains true when considering plausible future Internet topologies, with more IXP links and up to 4 times more monitors peering with route collectors. We then evaluate the feasibility of performing hijacks not observed by route collectors in the real-world. We experiment with two classifiers to predict the monitors that are dangerous to report the attack to route collectors, one based on monitor proximities (i.e., shortest path lengths) and another based on Gao-Rexford routing policies. We show that a proximity-based classifier could be sufficient for the hijacker to identify all dangerous monitors for hijacks announced to peer-to-peer neighbors. For hijacks announced to transit networks, a Gao-Rexford classifier reduces wrong inferences by $\ge 91\%$ without introducing new misclassifications for existing dangerous monitors.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
Monitoring, Topology, Peer-to-peer computing, Internet topology, Ethics, Routing protocols, BGP, BGP hijacking, stealthy IP prefix hijacking, inter-domain routing, routing policies, route collectors, forged AS path, BGP monitoring, BGPStream
National Category
Communication Systems Reliability and Maintenance
Identifiers
urn:nbn:se:kth:diva-326395 (URN)10.1109/ACCESS.2023.3261128 (DOI)000967071400001 ()2-s2.0-85151554945 (Scopus ID)
Note

QC 20230503

Available from: 2023-05-03 Created: 2023-05-03 Last updated: 2023-05-03Bibliographically approved
Milolidakis, A., Bühler, T., Chiesa, M., Vanbever, L. & Vissicchio, S. (2021). Poster: Smart BGP Hijacks that Evade Public Route Collectors. ACM internet measurement conference (IMC)
Open this publication in new window or tab >>Poster: Smart BGP Hijacks that Evade Public Route Collectors
Show others...
2021 (English)Other, Exhibition catalogue (Refereed) [Artistic work]
Abstract [en]

Routing hijack attacks have plagued the Internet for decades.Internet-wide BGP monitoring infrastructures have recently received great attention as they promise to quickly detect hijack attacks and, ultimately, mitigate them.

In this poster, we investigate the robustness of monitor based detection systems with respect to so-called “smart”attackers who engineer their hijacks to evade detection. Our preliminary simulations show that monitor-based systemsmay be unable to detect many carefully crafted hijacks diverting traffic from thousands of ASes. 

Place, publisher, year, pages
ACM internet measurement conference (IMC): , 2021. p. 2
Keywords
Border gateway protocol, Stealthy hijacking, BGP hijacking, Route collector
National Category
Computer Sciences Communication Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-312744 (URN)
Note

QC 20220815

Available from: 2022-05-22 Created: 2022-05-22 Last updated: 2022-08-17Bibliographically approved
Reda, W., Bogdanov, K., Milolidakis, A., Ghasemirahni, H., Chiesa, M., Maguire Jr., G. Q. & Kostic, D. (2020). Path Persistence in the Cloud: A Study of the Effects of Inter-Region Traffic Engineering in a Large Cloud Provider's Network. Computer communication review, 50(2), 11-23
Open this publication in new window or tab >>Path Persistence in the Cloud: A Study of the Effects of Inter-Region Traffic Engineering in a Large Cloud Provider's Network
Show others...
2020 (English)In: Computer communication review, ISSN 0146-4833, E-ISSN 1943-5819, Vol. 50, no 2, p. 11-23Article in journal, Editorial material (Refereed) Published
Abstract [en]

A commonly held belief is that traffic engineering and routing changes are infrequent. However, based on our measurements over a number of years of traffic between data centers in one of the largest cloud provider's networks, we found that it is common for flows to change paths at ten-second intervals or even faster. These frequent path and, consequently, latency variations can negatively impact the performance of cloud applications, specifically, latency-sensitive and geo-distributed applications.

Our recent measurements and analysis focused on observing path changes and latency variations between different Amazon aws regions. To this end, we devised a path change detector that we validated using both ad hoc experiments and feedback from cloud networking experts. The results provide three main insights: (1) Traffic Engineering (TE) frequently moves (TCP and UDP) flows among network paths of different latency, (2) Flows experience unfair performance, where a subset of flows between two machines can suffer large latency penalties (up to 32% at the 95th percentile) or excessive number of latency changes, and (3) Tenants may have incentives to selfishly move traffic to low latency classes (to boost the performance of their applications). We showcase this third insight with an example using rsync synchronization.

To the best of our knowledge, this is the first paper to reveal the high frequency of TE activity within a large cloud provider's network. Based on these observations, we expect our paper to spur discussions and future research on how cloud providers and their tenants can ultimately reconcile their independent and possibly conflicting objectives. Our data is publicly available for reproducibility and further analysis at http://goo.gl/25BKte.

Place, publisher, year, edition, pages
New York, NY, United States: Association for Computing Machinery (ACM), 2020
Keywords
Traffic engineering, Cloud provider networks, Inter-datacenter traffic, Latency
National Category
Communication Systems Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-273758 (URN)10.1145/3402413.3402416 (DOI)000582604500005 ()2-s2.0-85086379414 (Scopus ID)
Funder
Swedish Foundation for Strategic Research , TCCEU, European Research Council, 770889
Note

QC 20200602

Available from: 2020-05-28 Created: 2020-05-28 Last updated: 2024-03-18Bibliographically approved
Organisations

Search in DiVA

Show all publications