Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [1] A study of prefix hijacking and interception in the Internet
    Ballani, Hitesh
    Francis, Paul
    Zhang, Xinyang
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 265 - 276
  • [2] Probabilistic IP prefix authentication (PIPA) for prefix hijacking
    Seoul National University, Korea, Republic of
    Proc. Int. Conf. Future Internet Technol., CFI, 1600, (52-55):
  • [3] iSPY: Detecting IP prefix hijacking on my own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) : 327 - 338
  • [4] iSPY: Detecting IP Prefix Hijacking on My Own
    Zhang, Zheng
    Zhang, Ying
    Hu, Y. Charlie
    Mao, Z. Morley
    Bush, Randy
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1815 - 1828
  • [5] Improved Calculation of AS Resilience Against IP Prefix Hijacking
    Wuebbeling, Matthias
    Meier, Michael
    PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 121 - 128
  • [6] IP Prefix Hijacking Detection Using Idle Scan
    Hong, Seong-Cheol
    Ju, Hong-Taek
    Hong, James W.
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 395 - 404
  • [7] A study of IP prefix hijacking in cloud computing networks
    Liu, Yujing
    Peng, Wei
    Su, Jinshu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2201 - 2210
  • [8] Accurate real-time identification of IP prefix hijacking
    Hu, Xin
    Mao, Z. Morley
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 3 - +
  • [9] Network reachability-based IP prefix hijacking detection
    Hong, Seong-Cheol
    Ju, Hongtaek
    Hong, James Won-Ki
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2013, 23 (01) : 1 - 15
  • [10] TowerDefense: Deployment strategies for battling against IP prefix hijacking
    College of Computing, Georgia Institute of Technology, Atlanta, GA, United States
    不详
    Proc. Int. Conf. Netw. Protoc. ICNP, (134-143):