2013
DOI: 10.1145/2479957.2479959
|View full text |Cite
|
Sign up to set email alerts
|

A forensic case study on as hijacking

Abstract: The Border Gateway Protocol (BGP) was designed without security in mind. Until today, this fact makes the Internet vulnerable to hijacking attacks that intercept or blackhole Internet traffic. So far, significant effort has been put into the detection of IP prefix hijacking, while AS hijacking has received little attention. AS hijacking is more sophisticated than IP prefix hijacking, and is aimed at a long-term benefit such as over a duration of months. In this paper, we study a malicious case of AS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…In either case, the result of a prefix hijack is having rogue entries in the routing tables which may in turn cause disruptions or denial of service. Furthermore, the attacker (if any) could exploit the redirected traffic to carry out other attacks such as spamming [27], phishing [28], or Man In The Middle (MITM) operations [25], [26], [36]. In many cases, the recipient of the misdirected traffic collapses under the unexpected load.…”
Section: Bgp Hijacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In either case, the result of a prefix hijack is having rogue entries in the routing tables which may in turn cause disruptions or denial of service. Furthermore, the attacker (if any) could exploit the redirected traffic to carry out other attacks such as spamming [27], phishing [28], or Man In The Middle (MITM) operations [25], [26], [36]. In many cases, the recipient of the misdirected traffic collapses under the unexpected load.…”
Section: Bgp Hijacksmentioning
confidence: 99%
“…However simple at such a small scale, the model becomes relevant when applied to the thousands of routes handled by core transit providers. Model discussion: Counting the number of affected ASs and paths is the usual model for BGP disruptions in the literature [7], [8], [25], [27], [29], [30], [32]. This method is sometimes refined by counting affected prefixes [27], [29], [30] which allows to measure their length [30] or count affected IPs [29].…”
Section: Local Disruptionsmentioning
confidence: 99%
“…Unfortunately, miscreants are becoming increasingly sophisticated and security attacks are no longer isolated events. Instead, attacks often cover multiple domains and behaviors [13,16,17]. For example, Ramchandran et al [13] found that routing anomalies and botnets are exploited by spammers to avoid detection while sending spam, making it difficult for a single network acting on its own to detect the attack.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In theory, spammers using this technique are able to circumvent backtracking and traditional IP-based blacklisting due to the short-lived nature of the attack. More recently, a validated case of a BGP hijack specifically carried out to send spam from the stolen prefixes was reported in [12], [13]. Unlike the first observations of fly-by spammers, this incident involved a long-term hijack attack of several months and was confirmed by the owner of the victim network.…”
Section: Introductionmentioning
confidence: 95%
“…Some works [13], [16], [17] have carried out forensic analyses of well known hijacks. Others have attempted to validate observed suspicious routing events [2], [11], [18] usually in the context of the evaluation of a hijack detection technique.…”
Section: Introductionmentioning
confidence: 99%