Home > Research > Publications & Outputs > Inferring BGP blackholing activity in the Internet

Electronic data

  • inferring-bgp-blackholing-activity-in-the-internet

    Rights statement: © Owner/Author, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in IMC '17 Proceedings of the 2017 Internet Measurement Conference http://dx.doi.org/10.1145/3131365.3131379

    Accepted author manuscript, 1.34 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Inferring BGP blackholing activity in the Internet

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Inferring BGP blackholing activity in the Internet. / Giotsas, Vasileios; Smaragdakis, Georgios; Dietzel, Christoph et al.
IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, 2017. p. 1-14.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Giotsas, V, Smaragdakis, G, Dietzel, C, Richter, P, Feldmann, A & Berger, A 2017, Inferring BGP blackholing activity in the Internet. in IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. Association for Computing Machinery, Inc, New York, pp. 1-14, 2017 ACM Internet Measurement Conference, IMC 2017, London, United Kingdom, 1/11/17. https://doi.org/10.1145/3131365.3131379

APA

Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A., & Berger, A. (2017). Inferring BGP blackholing activity in the Internet. In IMC 2017 - Proceedings of the 2017 Internet Measurement Conference (pp. 1-14). Association for Computing Machinery, Inc. https://doi.org/10.1145/3131365.3131379

Vancouver

Giotsas V, Smaragdakis G, Dietzel C, Richter P, Feldmann A, Berger A. Inferring BGP blackholing activity in the Internet. In IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc. 2017. p. 1-14 doi: 10.1145/3131365.3131379

Author

Giotsas, Vasileios ; Smaragdakis, Georgios ; Dietzel, Christoph et al. / Inferring BGP blackholing activity in the Internet. IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York : Association for Computing Machinery, Inc, 2017. pp. 1-14

Bibtex

@inproceedings{e0b52a1c1aba46ff8b1b372096c141cf,
title = "Inferring BGP blackholing activity in the Internet",
abstract = "The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reachability to selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, has been available for some time, we lack a systematic study of its Internet-wide adoption, practices, and network efficacy, as well as the profile of blackholed destinations. In this paper, we develop and evaluate a methodology to automatically detect BGP blackholing activity in the wild. We apply our method to both public and private BGP datasets. We find that hundreds of networks, including large transit providers, as well as about 50 Internet exchange points (IXPs) offer blackholing service to their customers, peers, and members. Between 2014-2017, the number of blackholed prefixes increased by a factor of 6, peaking at 5K concurrently blackholed prefixes by up to 400 Autonomous Systems. We assess the effect of blackholing on the data plane using both targeted active measurements as well as passive datasets, finding that blackholing is indeed highly effective in dropping traffic before it reaches its destination, though it also discards legitimate traffic. We augment our findings with an analysis of the target IP addresses of blackholing. Our tools and insights are relevant for operators considering offering or using BGP blackholing services as well as for researchers studying DDoS mitigation in the Internet.",
keywords = "BGP, Blackholing, DDoS mitigation",
author = "Vasileios Giotsas and Georgios Smaragdakis and Christoph Dietzel and Philipp Richter and Anja Feldmann and Arthur Berger",
note = "{\textcopyright} Owner/Author, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in IMC '17 Proceedings of the 2017 Internet Measurement Conference http://dx.doi.org/10.1145/3131365.3131379; 2017 ACM Internet Measurement Conference, IMC 2017 ; Conference date: 01-11-2017 Through 03-11-2017",
year = "2017",
month = nov,
day = "1",
doi = "10.1145/3131365.3131379",
language = "English",
pages = "1--14",
booktitle = "IMC 2017 - Proceedings of the 2017 Internet Measurement Conference",
publisher = "Association for Computing Machinery, Inc",

}

RIS

TY - GEN

T1 - Inferring BGP blackholing activity in the Internet

AU - Giotsas, Vasileios

AU - Smaragdakis, Georgios

AU - Dietzel, Christoph

AU - Richter, Philipp

AU - Feldmann, Anja

AU - Berger, Arthur

N1 - © Owner/Author, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in IMC '17 Proceedings of the 2017 Internet Measurement Conference http://dx.doi.org/10.1145/3131365.3131379

PY - 2017/11/1

Y1 - 2017/11/1

N2 - The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reachability to selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, has been available for some time, we lack a systematic study of its Internet-wide adoption, practices, and network efficacy, as well as the profile of blackholed destinations. In this paper, we develop and evaluate a methodology to automatically detect BGP blackholing activity in the wild. We apply our method to both public and private BGP datasets. We find that hundreds of networks, including large transit providers, as well as about 50 Internet exchange points (IXPs) offer blackholing service to their customers, peers, and members. Between 2014-2017, the number of blackholed prefixes increased by a factor of 6, peaking at 5K concurrently blackholed prefixes by up to 400 Autonomous Systems. We assess the effect of blackholing on the data plane using both targeted active measurements as well as passive datasets, finding that blackholing is indeed highly effective in dropping traffic before it reaches its destination, though it also discards legitimate traffic. We augment our findings with an analysis of the target IP addresses of blackholing. Our tools and insights are relevant for operators considering offering or using BGP blackholing services as well as for researchers studying DDoS mitigation in the Internet.

AB - The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reachability to selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, has been available for some time, we lack a systematic study of its Internet-wide adoption, practices, and network efficacy, as well as the profile of blackholed destinations. In this paper, we develop and evaluate a methodology to automatically detect BGP blackholing activity in the wild. We apply our method to both public and private BGP datasets. We find that hundreds of networks, including large transit providers, as well as about 50 Internet exchange points (IXPs) offer blackholing service to their customers, peers, and members. Between 2014-2017, the number of blackholed prefixes increased by a factor of 6, peaking at 5K concurrently blackholed prefixes by up to 400 Autonomous Systems. We assess the effect of blackholing on the data plane using both targeted active measurements as well as passive datasets, finding that blackholing is indeed highly effective in dropping traffic before it reaches its destination, though it also discards legitimate traffic. We augment our findings with an analysis of the target IP addresses of blackholing. Our tools and insights are relevant for operators considering offering or using BGP blackholing services as well as for researchers studying DDoS mitigation in the Internet.

KW - BGP

KW - Blackholing

KW - DDoS mitigation

U2 - 10.1145/3131365.3131379

DO - 10.1145/3131365.3131379

M3 - Conference contribution/Paper

AN - SCOPUS:85038615722

SP - 1

EP - 14

BT - IMC 2017 - Proceedings of the 2017 Internet Measurement Conference

PB - Association for Computing Machinery, Inc

CY - New York

T2 - 2017 ACM Internet Measurement Conference, IMC 2017

Y2 - 1 November 2017 through 3 November 2017

ER -