Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp019w0326144
Title: | Detecting BGP Interception Attacks using RTT Measurements |
Authors: | Jubas, Daniel |
Advisors: | Rexford, Jennifer |
Department: | Computer Science |
Class Year: | 2021 |
Abstract: | Internet users run the risk of having their internet traffic surveilled potentially leading to leaked sensitive information or the loss of anonymity. Adversaries can manipulate the trust of the Border Gateway Protocol–the protocol which controls the routing decisions of the internet–to enable such surveillance by diverting victim traffic to their own servers. Existing methods of detecting such attacks are inefficient, too slow, or susceptible to being tricked by a clever adversary. We present here a novel method of detection based on the changes in latency of internet traffic. Efficient and fast methods for round trip time calculation in the data plane exist and because latency is bounded by topological distance it is difficult to spoof. We consider three latency-based detection algorithms for efficient online monitoring of traffic which can help real-time mitigation of ongoing attacks. We evaluate the algorithms’ performance in detecting real (ethically executed) interception attacks and also assess its performance in avoiding false positives in real anonymized Princeton University internet traffic. |
URI: | http://arks.princeton.edu/ark:/88435/dsp019w0326144 |
Type of Material: | Princeton University Senior Theses |
Language: | en |
Appears in Collections: | Computer Science, 1987-2024 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
JUBAS-DANIEL-THESIS.pdf | 2.95 MB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.