ARTEMIS



ARTEMIS (Automatic and Real-Time dEtection and MItigation System), is a research effort between the INSPIRE group, FORTH, Greece (www.inspire.edu.gr) and the Center for Applied Internet Data Analysis (CAIDA), University of California San Diego, USA (www.caida.org).


ARTEMIS is a defense approach versus BGP prefix hijacking attacks (a) based on accurate and fast detection operated by the AS itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards real-time streaming, thus (b) enabling flexible and fast mitigation of hijacking events. Compared to existing approaches/tools, ARTEMIS combines characteristics desirable to network operators such as comprehensiveness, accuracy, speed, privacy, and flexibility. With the ARTEMIS approach, prefix hijacking can be neutralized within a minute!




News

Publications

  • "ARTEMIS: Neutralizing BGP Hijacking within a Minute"

    Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, and Alberto Dainotti, "ARTEMIS: Neutralizing BGP Hijacking within a Minute", under submission, arXiv:1801.01085, January 2018. (https://arxiv.org/abs/1801.01085 )

  • "A survey among Network Operators on BGP Prefix Hijacking"

    Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, and Xenofontas Dimitropoulos, "A survey among Network Operators on BGP Prefix Hijacking", in ACM SIGCOMM Computer Communications Review (CCR), vol. 48, no. 1, January 2018. (https://arxiv.org/abs/1801.02918 )

  • "ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking (demo)"

    Gavriil Chaviaras, Petros Gigis Pavlos Sermpezis, Xenofontas Dimitropoulos, “ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking (demo),” Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, 625-626. (demo/poster) Florianopolis, Brazil, 2016.

Presentations / Videos

ARTEMIS over ONOS

ARTEMIS over ONOS is an implementation of ARTEMIS for SDN-controlled networks, as a multi-module application running on top of the Open Network Operating System (ONOS)

Contact Us

{vkotronis, sermpezis, fontas} (at) ics_dot_forth_dot_gr
{alberto, alistair} (at) caida_dot_org

Acknowledgements

This work was supported by the European Research Council grant agreement no. 338402 (NetVolution Project), the National Science Foundation grant CNS-1423659, and the Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHS S&T/CSD) via contract number HHSP233201600012C.