2007
DOI: 10.1145/1282427.1282411
|View full text |Cite
|
Sign up to set email alerts
|

A study of prefix hijacking and interception in the internet

Abstract: There have been many incidents of prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic by forwarding it onto the owner. This paper presents a study of such prefix hijacking and interception with the following contributions: (1). We present a methodology for prefix interception, (2). We estimate the fraction of traffic to any prefix that can be hijacked and intercepted in the Internet today, (3). The interceptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
142
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(142 citation statements)
references
References 23 publications
0
142
0
Order By: Relevance
“…Prefix interception generally refers to the Internet traffic interception based on prefix hijacking [17]. However, some other features in BGP protocol, such as valley-free rule [18,19] and AS-Path prepending, can also be exploited to launch a prefix interception attack [11,20].…”
Section: Attack Model Of Prefix Interceptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Prefix interception generally refers to the Internet traffic interception based on prefix hijacking [17]. However, some other features in BGP protocol, such as valley-free rule [18,19] and AS-Path prepending, can also be exploited to launch a prefix interception attack [11,20].…”
Section: Attack Model Of Prefix Interceptionmentioning
confidence: 99%
“…Thus, prefix interception does not result in black holes. Second, prefix interception is often based on prefix hijacking [17], and hence they share the same anomaly in control plane. As a result, monitoring anomalous BGP routes is not enough to identify a prefix interception, as the actual forwarding path is needed to distinguish prefix interception from prefix hijacking.…”
Section: Introductionmentioning
confidence: 99%
“…( , has a long history of route hijacking attacks [14], but it still does not employ cryptographic defences to guarantee routing correctness. Trivially, redirecting traffic via a different route or network can provide the attacker with MitM capabilities.…”
Section: Mitm Is Commonmentioning
confidence: 99%
“…Since BGP does not employ authentication mechanisms, originators of BGP routing announcements may claim prefixes belonging to other networks or may change routing path (by adding or removing links), e.g., due to benign failures or malicious attacks. Attackers can hijack prefixes by advertising invalid origin or invalid next hop [14]. There is a large body of research studying attacks on BGP routing, e.g., route hijacking and route injection that damage network operation or connectivity.…”
Section: Mitm Via Route Poisoningmentioning
confidence: 99%
“…Such a situation has motivated us greatly to develop a framework [9] for academic-related web services. While providing several benefits, web services technology has been facing serious threats like prefix hijacking and interception [10] in the Internet due to a man-in-the-middle attack [11]. Therefore, security has become the key issue in the field of web services technology.…”
Section: Introductionmentioning
confidence: 99%