Next Article in Journal
WiFi-Based Human Identification with Machine Learning: A Comprehensive Survey
Previous Article in Journal
Cyber–Physical Perception Interface for Co-Simulation Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

by
Ben A. Scott
1,2,*,
Michael N. Johnstone
1 and
Patryk Szewczyk
1
1
School of Science, Edith Cowan University, Perth, WA 6027, Australia
2
School of Science, Engineering & Technology, RMIT University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(19), 6414; https://doi.org/10.3390/s24196414
Submission received: 5 July 2024 / Revised: 14 September 2024 / Accepted: 27 September 2024 / Published: 3 October 2024
(This article belongs to the Section Sensor Networks)

Abstract

The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs). BGP attacks can exploit and evade these limitations. In this paper, we review and evaluate categories of BGP attacks based on their complexity. Previously identified next-generation BGP detection techniques remain incapable of detecting advanced attacks that exploit single observable detection approaches and those designed to evade public routing monitor infrastructures. Advanced BGP attack detection requires lightweight, rapid capabilities with the capacity to quantify group-level multi-viewpoint interactions, dynamics, and information. We term this approach advanced BGP anomaly detection. This survey evaluates 178 anomaly detection techniques and identifies which are candidates for advanced attack anomaly detection. Preliminary findings from an exploratory investigation of advanced BGP attack candidates are also reported.
Keywords: anomaly detection; BGP; cyber security; Internet security; routing security anomaly detection; BGP; cyber security; Internet security; routing security

Share and Cite

MDPI and ACS Style

Scott, B.A.; Johnstone, M.N.; Szewczyk, P. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques. Sensors 2024, 24, 6414. https://doi.org/10.3390/s24196414

AMA Style

Scott BA, Johnstone MN, Szewczyk P. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques. Sensors. 2024; 24(19):6414. https://doi.org/10.3390/s24196414

Chicago/Turabian Style

Scott, Ben A., Michael N. Johnstone, and Patryk Szewczyk. 2024. "A Survey of Advanced Border Gateway Protocol Attack Detection Techniques" Sensors 24, no. 19: 6414. https://doi.org/10.3390/s24196414

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop