2019
DOI: 10.1007/978-3-030-29959-0_6
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Attacks Using BGP Blackholing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 38 publications
0
13
0
Order By: Relevance
“…We would like to investigate BGP blackholing activity on other BGP collectors, specifically at the looking glasses 56 . We would also like to investigate the misusage of BGP blackholing service 57 . Moreover, we are trying other machine learning algorithms and working on other classification features (such as prefix length and next‐hop attribute) to produce more improved classification models for BGP blackholing detection.…”
Section: Discussionmentioning
confidence: 99%
“…We would like to investigate BGP blackholing activity on other BGP collectors, specifically at the looking glasses 56 . We would also like to investigate the misusage of BGP blackholing service 57 . Moreover, we are trying other machine learning algorithms and working on other classification features (such as prefix length and next‐hop attribute) to produce more improved classification models for BGP blackholing detection.…”
Section: Discussionmentioning
confidence: 99%
“…Miller and Pelsser [36] try to classify the attack that happened in BGP by using the Nlacholing technique in the BGP to mitigate DDoS attacks. The autonomous system (AS) is the part in which the internet consists of single or multiple networks controlled by one entity.…”
Section: Drdos Attacks Based On Tcp Protocolmentioning
confidence: 99%
“…There are different ways to perform a hijack and their impact may vary. Below, we present a taxonomy of hijacks [9], [16] and discuss their impact characteristics. Origin-AS (Type-0) or Fake-path (Type-N, N ≥ 1) hijack.…”
Section: B Hijack Types and Impact Characteristicsmentioning
confidence: 99%