The Goal is not to mitigate or take action against the malicious activity.
Goal is to detect the hijacking event by trying to reduce false posivites
as much as possible.
I know false positives is one of the key factor to consider.
I am just trying to distinguish between a legitimate advertisement against
hijack event.

Regards,
Nagarjun

On Tue, Feb 28, 2017 at 11:31 AM Hank Nussbacher <h...@efes.iucc.ac.il>
wrote:

> On 28/02/2017 07:15, Nagarjun Govindraj via NANOG wrote:
>
> So what if you detect in 1.4 minutes of 3.1 minutes?  Or even 8
> minutes?  What then?
> You certainly couldn't do anything to prevent it after 3.1 minutes.
> First you need to analyze whether the BGP hijack is a false positive or
> not.
> Could be the customer you are watching is testing out some cloud based
> anti-DDOS mitigation and is allowing some other ASN to announce their
> /24 (intentional).
> Could be the ASN on the other side of the world has implemented some BGP
> optimization box which announces prefixes internally  to do TE but they
> also happen to be sending BGP updates to Dyn/BGPMON/Team Cymru/whoever.
> Could be the customer you are monitoring has decided to blackhole some
> malicious IP and has started to announce a /32 internally and they too
> feed BGP announcements to Dyn/BGPMON/Team Cymru/whoever.
> I have many other examples.
> After you get an announcement of a BGP hijack, you start investigating.
> You determine the extent of the hijack - is it localized to one
> geographic area or is it worldwide.  Is it just you or are there
> thousands of other prefixes affected.  After 15 minutes you sit down and
> write an email to the ASN doing the announcement.  For that you hope
> whois is up to date which 60% of the time it is not.  So you start
> scraping Google for possible email addresses to contact.
> After not getting a response for 24 hours you send an email to their
> upstream ASN (also contingent on finding proper email addresses that
> will respond).
> After waiting another day you send an email to the upstream of the
> upstream and you keep repeating the process until you find someone
> responsive.
> Stopping a BGP hijack does not take 1.4 minutes or 3.1 minutes.  It is
> usually hours and sometimes days until the hijack is stopped.
>
> -Hank
>
>
> > Well, the idea behind the mail was to know if anyone in the community are
> > doing real time BGP IP prefix hijacking.
> > Like Artemis detection tool claims to be detecting in 1.4 ~ 3.1 minutes.
> So
> > I wanted to know if anyone in the community are using such tools for
> > detecting hijacks, if yes how much time does the system take to detect.
> >
> >
> > Regards,
> > Nagarjun
> >
> > On Mon, Feb 27, 2017 at 10:59 PM Nick Hilliard <n...@foobar.org> wrote:
> >
> >> Christopher Morrow wrote:
> >>> Also: "How reliable are the alerts being sent?"
> >> also: do the smtp servers which handle mail for the domain of the
> >> alerting email address use the IP address space as they're notifying
> about?
> >>
> >> Nick
> >>
> >>
>
>
>

Reply via email to