Data-Plane Telemetry to Mitigate Long-Distance BGP Hijacks

📅 2025-07-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Weak Internet routing security enables BGP hijacking, particularly cross-border rerouting, posing severe risks including privacy breaches, regulatory evasion, and national security threats. Existing detection methods focus predominantly on the control plane, overlooking latency anomalies in the data plane. This paper introduces HiDe, the first system to systematically assess and leverage abrupt propagation delay increases across global networks for detecting long-distance BGP hijacks—requiring no protocol modifications and supporting line-rate processing. HiDe establishes a continuous latency monitoring framework grounded in real-world RTT measurements and geography-aware modeling. Evaluation shows that HiDe detects ≥25% latency surges in 86% of victim–attacker country pairs, achieving low false-positive rates and high accuracy—validated via ethically compliant hijack experiments. Its core innovation lies in pioneering the use of data-plane delay variations as a highly robust, deployment-friendly hijack detection signal.

Technology Category

Application Category

📝 Abstract
Poor security of Internet routing enables adversaries to divert user data through unintended infrastructures (hijack). Of particular concern -- and the focus of this paper -- are cases where attackers reroute domestic traffic through foreign countries, exposing it to surveillance, bypassing legal privacy protections, and posing national security threats. Efforts to detect and mitigate such attacks have focused primarily on the control plane while data-plane signals remain largely overlooked. In particular, change in propagation delay caused by rerouting offers a promising signal: the change is unavoidable and the increased propagation delay is directly observable from the affected networks. In this paper, we explore the practicality of using delay variations for hijack detection, addressing two key questions: (1) What coverage can this provide, given its heavy dependence on the geolocations of the sender, receiver, and adversary? and (2) Can an always-on latency-based detection system be deployed without disrupting normal network operations? We observe that for 86% of victim-attacker country pairs in the world, mid-attack delays exceed pre-attack delays by at least 25% in real deployments, making delay-based hijack detection promising. To demonstrate practicality, we design HiDe, which reliably detects delay surges from long-distance hijacks at line rate. We measure HiDe's accuracy and false-positive rate on real-world data and validate it with ethically conducted hijacks.
Problem

Research questions and friction points this paper is trying to address.

Detect long-distance BGP hijacks using data-plane delay variations
Assess coverage feasibility based on geolocation dependencies
Deploy latency-based detection without disrupting network operations
Innovation

Methods, ideas, or system contributions that make the work stand out.

Uses data-plane telemetry for BGP hijack detection
Detects delay variations from rerouted traffic
Deploys HiDe system for line-rate detection
🔎 Similar Papers
No similar papers found.