Using ML to Block BGP Hijacking

Loading...
Thumbnail Image

Other Version

External File or Record

Can’t use the file because of accessibility barriers? Contact us

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Border Gateway Protocol (BGP) has proven to be resilient in the face of failures, attacks, and general maliciousness and incompetence. While there are no deployed mechanisms for automatically remediating BGP announcements that may be malicious, there have been many attempts at fixing this sorry state of affairs. In this article, I will describe some troublesome BGP events and how our tool, Bongo, uses machine learning (ML) and Layer 8 in the IP stack to detect malicious announcements and block traffic that would be diverted.

Series and Number:

EducationalLevel:

Is Based On:

Target Name:

Teaches:

Table of Contents

Description

This record is for a(n) offprint of an article published in ;login: the USENIX magazine in 2019.

Keywords

Citation

Camp, L Jean. "Using ML to Block BGP Hijacking." ;login: the USENIX magazine, vol. 44, no. 4, pp. 6-10, 2019.

Journal

;login: the USENIX magazine

DOI

Rights

This work may be protected by copyright unless otherwise stated.

Type