Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack
Yujing Liu, Zhilin Wang, Nan Li
Available Online February 2018.
- https://doi.org/10.2991/csece-18.2018.17How to use a DOI?
- Internet; inter-domain routing system; DDoS; BGP
- The inter-domain routing protocol BGP is sensitive to severe network congestion. In order to study the reliability of BGP under stress, we take the Dyn cyberattack on October 21st, 2016 as a study case to characterize the impact of DDoS attack on inter-domain routing system. We propose several metrics including number of BGP updates, reachability, and variance of AS link betweenness centrality to measure the reachability and stability of the Internet. After performing a thorough analysis based on publicly available BGP data, we obtain key insights about the event. Firstly, the attack affects the reachability from the inter-domain routing perspective, but the effect is very small. Secondly, during the attack, the Internet experiences an unstable routing state in terms of a surge of BGP updates and changes of AS links' betweenness centrality. Finally, route flapping doesn't happen, probably because of anycast routing technique employed by Dyn, balancing high volume of traffic among multiple data centers instead of converging in one single link.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Yujing Liu AU - Zhilin Wang AU - Nan Li PY - 2018/02 DA - 2018/02 TI - Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack BT - Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018) PB - Atlantis Press SP - 79 EP - 82 SN - 2352-538X UR - https://doi.org/10.2991/csece-18.2018.17 DO - https://doi.org/10.2991/csece-18.2018.17 ID - Liu2018/02 ER -