Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [41] An accurate distributed scheme for detection of prefix interception
    Li, Song
    Duan, Haixin
    Wang, Zhiliang
    Liang, Jinjin
    Li, Xing
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
  • [42] An accurate distributed scheme for detection of prefix interception
    Song LI
    Haixin DUAN
    Zhiliang WANG
    Jinjin LIANG
    Xing LI
    Science China(Information Sciences), 2016, 59 (05) : 79 - 95
  • [43] Traffic analysis for IP telephony
    Toral-Cruz, H
    Torres-Román, D
    2005 2nd International Conference on Electrical & Electronics Engineering (ICEEE), 2005, : 136 - 139
  • [44] A Prefix Hijacking Detection Model Based on the Immune Network Theory
    Zhang, Jian
    Li, Daofeng
    Zhao, Bowen
    IEEE ACCESS, 2019, 7 : 132384 - 132394
  • [45] Origin authentication scheme against BGP address prefix hijacking
    Liu, Z.-H. (kevin2296@gmail.com), 1908, Chinese Academy of Sciences (23):
  • [46] Understanding the impact of outsourcing mitigation against BGP prefix hijacking
    Zeng, Man
    Huang, Xiaohong
    Zhang, Pei
    Li, Dandan
    COMPUTER NETWORKS, 2022, 202
  • [47] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change
    Liu, Yujing
    Su, Jinshu
    Chang, Rocky K. C.
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203
  • [48] How Can Multipath Dissemination Help to Detect Prefix Hijacking?
    Wang, Feng
    Dai, Bin
    Su, Jinshu
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [49] Home is Where the Hijacking is: Understanding DNS Interception by Residential Routers
    Randall, Audrey
    Liu, Enze
    Padmanabhan, Ramakrishna
    Akiwate, Gautam
    Voelker, Geoffrey M.
    Savage, Stefan
    Schulman, Aaron
    PROCEEDINGS OF THE 2021 ACM INTERNET MEASUREMENT CONFERENCE, IMC 2021, 2021, : 390 - 397
  • [50] IP-Based Design and Analysis of Parallel Prefix Adder for FPGAs
    Gupta, Tukur
    Verma, Gaurav
    Akhter, Shamim
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2024,