Analysis of IP Prefix Hijacking and Traffic Interception

被引:0
|
作者
Latt, Khin Thida [1 ]
Ohara, Yasuhiro [1 ]
Uda, Satoshi [1 ]
Shinoda, Yoichi [1 ]
机构
[1] Japan Adv Insitute Sci & Technol, Nomi, Ishikawa 9231292, Japan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2010年 / 10卷 / 07期
关键词
Hijacking; Interception; BGP; Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet, BGP is de facto inter-domain routing protocol. And it is vulnerable to a number of damaging attacks. Among these attacks, IP prefix hijacking and traffic interception are regarded as the serious threats in the Internet. There have been many incidents of IP prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic by introducing network unreachability problem. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. Although there is no reported incident about traffic interception yet, it cannot be said that there was no such attack in the Internet. Because traffic interception does not introduce any network unreachability problem and it is transparent to the victim. Many ideas have been presented to try to detect or prevent prefix hijacking. However, there is no enough analysis towards both areas. This paper makes analysis of IP prefix hijacking and traffic interception for a stepping-stone towards solving these two threats. In this paper, we survey IP prefix hijacking incidents and we present the analysis of IP prefix hijacking and traffic interception. Key words: Hijacking,
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [31] Internet QoS routing with IP telephony and TCP traffic
    Dubrovsky, A
    Gerla, M
    Lee, SS
    Cavendish, D
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 1348 - 1352
  • [32] Traffic engineering for proactive failure recovery of IP networks
    Zhang M.
    Liu B.
    Tsinghua Science and Technology, 2011, 16 (01) : 55 - 61
  • [33] Traffic Engineering for Proactive Failure Recovery of IP Networks
    张民贵
    刘斌
    TsinghuaScienceandTechnology, 2011, 16 (01) : 55 - 61
  • [34] Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis
    Lai, Zetong
    Yan, Zhiwei
    Geng, Guanggang
    Nakazato, Hidenori
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 1168 - 1176
  • [35] Deriving traffic demands for operational IP networks: Methodology and experience
    Feldmann, A
    Greenberg, A
    Lund, C
    Reingold, N
    Rexford, J
    True, F
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2001, 9 (03) : 265 - 279
  • [36] Traffic Protection Method in IP Radio Networks above 70 GHz
    Peric, Dragana B.
    Peric, Miroslav V.
    Todorovic, Branislav M.
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (10) : 981 - 983
  • [37] Green traffic grooming in IP-over-WDM satellite optical networks
    Liu, Yu
    Li, Xin
    Zheng, Zhennan
    Li, Daixuan
    Liu, Tianhao
    Ruan, Feiyang
    Zhao, Chenyu
    Huang, Shanguo
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (12) : 1275 - 1287
  • [38] Traffic Classification in IP Networks Through Machine Learning Techniques in Final Systems
    Gomez, Jorge
    Riano, Velssy Hernandez
    Ramirez-Gonzalez, Gustavo
    IEEE ACCESS, 2023, 11 : 44932 - 44940
  • [39] Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
    Lian, Jie
    Wang, Xu
    Noshad, Mohammad
    Brandt-Pearce, Maite
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [40] On static reachability analysis of IP networks
    Xie, GG
    Zhan, JB
    Maltz, DA
    Zhang, H
    Greenberg, A
    Hjalmtysson, G
    Rexford, J
    IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 2170 - 2183