Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [21] Detecting IP prefix Hijacking Using Data Reduction-Based and Binary Search Algorithm
    Alshamrani, Hussain
    Ghita, Bogdan
    Lancaster, David
    2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 78 - 84
  • [22] Cooperative Detection of Internet Prefix Hijacking
    Zhu, Peidong
    Liu, Xin
    Deng, Wenping
    Cao, Huayang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (01): : 33 - 45
  • [23] Model construction on prefix hijacking attack
    Zhao, Jinjing
    Wen, Yan
    Wang, Yaping
    International Conference on Communication Technology Proceedings, ICCT, 2012, : 866 - 871
  • [24] Estimating the impact of BGP prefix hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    arXiv, 2021,
  • [25] Estimating the Impact of BGP Prefix Hijacking
    Aristotle University of Thessaloniki, Greece
    不详
    不详
    IFIP Netw. Conf., IFIP Netw., 2021,
  • [26] Estimating the Impact of BGP Prefix Hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Arakadakis, Konstantinos
    Vakali, Athena
    2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,
  • [27] Model Construction on Prefix Hijacking Attack
    Zhao, Jinjing
    Wen, Yan
    Wang, Yaping
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 866 - 871
  • [28] Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew
    McArthur, Christian
    Guirguis, Mina
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2480 - 2485
  • [29] Stealthy IP prefix hijacking: Don't bite off more than you can chew
    Department of Computer Science, Texas A and M University, United States
    不详
    GLOBECOM IEEE Global Telecommun. Conf.,
  • [30] Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels
    Wuebbeling, Matthias
    Meier, Michael
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 330 - 338