Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [31] Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases
    Alshamrani, Hussain
    Ghita, Bogdan
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 57 - 63
  • [32] On the design and performance of prefix-preserving IP traffic trace anonymization
    Xu, J
    Fan, JL
    Ammar, M
    Moon, SB
    IMW 2001: PROCEEDINGS OF THE FIRST ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP, 2001, : 263 - 266
  • [33] A Heuristic Method of Finding Heavy Hitter Prefix Pairs in IP Traffic
    Truong, Patrick
    Guillemin, Fabrice
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (10) : 803 - 805
  • [34] Evaluation on the Influence of Internet Prefix Hijacking Events
    Zhao, Jinjing
    Wen, Yan
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 611 - 631
  • [35] BlockJack: Towards improved prevention of ip prefix hijacking attacks in inter-domain routing via blockchain
    Budi Sentana, I. Wayan
    Ikram, Muhammad
    Ali Kaafar, Mohamed
    Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, 2021, : 674 - 679
  • [36] BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain
    Sentana, I. Wayan Budi
    Ikram, Muhammad
    Kaafar, Mohamed Ali
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 674 - 679
  • [37] A Survey among Network Operators on BGP Prefix Hijacking
    Sermpezis, Pavlos
    Kotronis, Vasileios
    Dainotti, Alberto
    Dimitropoulos, Xenofontas
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2018, 48 (01) : 64 - 69
  • [38] A Method to Detect Prefix Hijacking by Using Ping Tests
    Tahara, Mitsuho
    Tateishi, Naoki
    Oimatsu, Toshio
    Majima, Souhei
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 390 - 398
  • [39] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification
    Biersack, Ernst
    Jacquemart, Quentin
    Fischer, Fabian
    Fuchs, Johannes
    Thonnard, Olivier
    Theodoridis, Georgios
    Tzovaras, Dimitrios
    Vervier, Pierre-Antoine
    IEEE NETWORK, 2012, 26 (06): : 33 - 39
  • [40] The research and realization of IP hijacking
    Zhang, Xin
    Sha, Xueling
    Liu, Haiyan
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 136 - 139