Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies

نویسندگان

  • Pablo Moriano
  • Soumya Achar
  • L. Jean Camp
چکیده

Route anomalies, beyond simple leaks, are occurring on the order of tens of thousands a year. These may be accidents. There is anecdotal evidence that indicate many of these are in fact crimes. There are case studies that illustrate the use of these for national intelligence. Any given anomaly could be an accident, a crime, or an attack. To understand the nature of routing anomalies we offer an empirical investigation using multiple regression and unsupervised learning to analyze anomalies over a four-year period. If BGP anomalies are a result of limited technical competence, then countries with low levels of education, few technology exports, and less expertise should be over-represented. If BGP anomalies are crime, leveraged by criminals for profit, then economic theories and analytical approaches from criminology should show statistical significance. Or, if BGP anomalies are primarily used by national intelligence agencies to attack either internal dissidents or other countries, then the presence of conflict and measures of quality of governance are possible indicators. We examine anomalies as likely incompetence, potentially ecrime, or intelligence operations using macroeconomics and leveraging three theories from criminology, as well as global measures of technology adoption. We found that exports of technology were not statistically significant, undermining the argument for incompetence. We found support for the possibility that anomalies are driven by crime, specifically for the guardianship and relative deprivation theories of crime. In addition to these findings from regression analysis, clustering indicates that civil conflict and surveillance are associated with the disproportionate origination of routing anomalies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies

With the proliferation of wireless devices, mobile ad-hoc networking (MANET) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of intrusion detection in MANET. The focus of our research is on tec...

متن کامل

The elusive Effect of Routing Dynamics on Traffic Anomalies

Network operators need to know the root cause of traffic anomalies to determine the appropriate action to mitigate their effect. This paper studies the one type of anomaly for which we can know the root cause: routing-induced anomalies. A major challenge in quantifying the effect of routing events on traffic is that the flows affected by routing are not easily distinguishable from the rest of t...

متن کامل

Mining Anomaly using Association Rule

9 ABSTRACT In a world where critical equipments are connected to internet, hence protection against professional cyber criminals is important. Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 70  شماره 

صفحات  -

تاریخ انتشار 2017