Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2010年 / 10卷 / 07期
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [21] An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup
    Kim, Junghwan
    Park, Minkyu
    Han, Sangchul
    Kim, Jinsoo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (10) : 3298 - 3301
  • [22] Cuckoo Prefix: A Hash Set for Compressed IP Blocklists
    Allen, Donovan
    Shaghaghi, Navid
    2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 127 - 134
  • [23] Impact of Prefix-Match Changes on IP Reachability
    Zhu, Yaping
    Rexford, Jennifer
    Sen, Subhabrata
    Shaikh, Aman
    IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2009, : 235 - 241
  • [24] Buddyguard: A Buddy System for Fast and Reliable Detection of IP Prefix Anomalies
    Li, Jun
    Ehrenkranz, Toby
    Elliott, Paul
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [25] Care-of-prefix routing for moving networks in mobile IP network
    Suzuki, Toshihiro
    Igarashi, Ken
    Kawakami, Hiroshi
    Miura, Akira
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 185 - +
  • [26] Computational complexity of traffic hijacking under BGP and S-BGP
    Chiesa, Marco
    Di Battista, Giuseppe
    Erlebach, Thomas
    Patrignani, Maurizio
    THEORETICAL COMPUTER SCIENCE, 2015, 600 : 143 - 154
  • [27] Building Nemo, a system to monitor IP routing and traffic paths in real time
    Raspall, Frederic
    COMPUTER NETWORKS, 2016, 97 : 1 - 30
  • [28] Traffic engineering in IP over WDM networks
    Fan, Z
    OPTICOMM 2002: OPTICAL NETWORKING AND COMMUNICATIONS, 2002, 4874 : 78 - 88
  • [29] Traffic engineering and routing in IP networks with centralized control
    Fu, Jing
    Sjodin, Peter
    Karlsson, Gunnar
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 633 - +
  • [30] IP/ATM QoS solutions ifor VoIP traffic
    Liu, Ren Ping
    Rogers, Glynn
    Argyros, Jim
    2006 Asia-Pacific Conference on Communication, Vols 1 and 2, 2006, : 322 - 325