Information gain-based topology attribution of diversity of BGP prefix hijacking impact

In order to study the relationship between the diversity of BGP prefix hijacking impact and the topology of participants, we apply a data mining method. We get instances from numerous prefix hijacking simulations on the authentic Internet topology, and evaluate the importance of topology attributes using information gain-based attribute selection. Then we estimate the precision of classification by running decision tree algorithm with different topology attributes to determine which ones should be taken into consideration in efficient impact evaluation of prefix hijacking.

[1]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[2]  Daniel Massey,et al.  An analysis of BGP multiple origin AS (MOAS) conflicts , 2001, IMW '01.

[3]  Jennifer Rexford,et al.  A Survey of BGP Security , 2005 .

[4]  Jennifer Rexford,et al.  MIRO: multi-path interdomain routing , 2006, SIGCOMM.

[5]  Paul Francis,et al.  A study of prefix hijacking and interception in the internet , 2007, SIGCOMM '07.

[6]  Randy Bush,et al.  iSPY: Detecting IP Prefix Hijacking on My Own , 2008, IEEE/ACM Transactions on Networking.

[7]  Lixia Zhang,et al.  Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[8]  Joseph Kee-yin Ng,et al.  Extensions to BGP to Support Secure Origin BGP , 2004 .

[9]  Lixin Gao,et al.  On inferring and characterizing Internet routing policies , 2003, Journal of Communications and Networks.