Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp019w0326144
Title: Detecting BGP Interception Attacks using RTT Measurements
Authors: Jubas, Daniel
Advisors: Rexford, Jennifer
Department: Computer Science
Class Year: 2021
Abstract: Internet users run the risk of having their internet traffic surveilled potentially leading to leaked sensitive information or the loss of anonymity. Adversaries can manipulate the trust of the Border Gateway Protocol–the protocol which controls the routing decisions of the internet–to enable such surveillance by diverting victim traffic to their own servers. Existing methods of detecting such attacks are inefficient, too slow, or susceptible to being tricked by a clever adversary. We present here a novel method of detection based on the changes in latency of internet traffic. Efficient and fast methods for round trip time calculation in the data plane exist and because latency is bounded by topological distance it is difficult to spoof. We consider three latency-based detection algorithms for efficient online monitoring of traffic which can help real-time mitigation of ongoing attacks. We evaluate the algorithms’ performance in detecting real (ethically executed) interception attacks and also assess its performance in avoiding false positives in real anonymized Princeton University internet traffic.
URI: http://arks.princeton.edu/ark:/88435/dsp019w0326144
Type of Material: Princeton University Senior Theses
Language: en
Appears in Collections:Computer Science, 1987-2024

Files in This Item:
File SizeFormat 
JUBAS-DANIEL-THESIS.pdf2.95 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.