Ares: Comprehensive Path Hijacking Detection via Routing Tree
Yinxiang Tao
34th USENIX Security Symposium (USENIX Security '25) · Day 1 · Network Security 1: Censorship, Evasion, and Trustworthy Infrastructure
In an era where the internet underpins global communication and commerce, the integrity of its foundational routing protocols is paramount. Border Gateway Protocol (BGP) hijacking represents a critical and persistent threat, capable of rerouting internet traffic maliciously, leading to significant economic and security repercussions such as traffic interception or denial-of-service attacks. While **origin hijacking**, where an attacker falsely claims ownership of an IP prefix, has seen improvements in detection and mitigation through methods like **ROV (Route Origin Validation)**, a more insidious form known as **path hijacking** continues to pose a significant challenge.
AI review
Legitimate academic systems research on a real and underserved problem — BGP path hijacking, specifically the Defcon/Type U variant that ROV doesn't touch. The WED design and clustering strategy are technically coherent contributions, and the evaluation numbers are credible enough to take seriously. Nothing here redefines the field, but it's honest, focused work that advances a specific gap.