37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) 2007
DOI: 10.1109/dsn.2007.95
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Resiliency of Internet Topology against Prefix Hijack Attacks

Abstract: A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet can be diverted to attacker networks. Prefix hijack attacks are a serious security threat in the Internet and it is important to understand the factors that affect the resiliency of victim networks against these attacks. In this paper, we conducted a systematic study to gauge the effectiveness of prefix hijacks launched at different location… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
61
1
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 67 publications
(66 citation statements)
references
References 13 publications
3
61
1
1
Order By: Relevance
“…Recent work on this topic [25], [45], [15], [42] evaluates the proposed solutions by using the inferred AS topologies from the public view. Depending on the exact hijack scenario, an incomplete topology can lead to either an underestimate or overestimate of the hijack impact.…”
Section: Discussionmentioning
confidence: 99%
“…Recent work on this topic [25], [45], [15], [42] evaluates the proposed solutions by using the inferred AS topologies from the public view. Depending on the exact hijack scenario, an incomplete topology can lead to either an underestimate or overestimate of the hijack impact.…”
Section: Discussionmentioning
confidence: 99%
“…Using multiple sources gives also the possibility to benefit from the large number of vantage points they have around the globe. This is important, because a hijacking might affect only a part of the Internet, due to BGP policies and shortest-path routing [12,24].…”
Section: Prefix Hijacking Detection With Artemismentioning
confidence: 99%
“…The Internet was optimized for robustness to physical failures of individual components, and it has proven quite successful in that regard. However, it is fragile to even small soft failures, such as an error in the design of a protocol (as occurred in the early days of the ARPAnet [25]) or a single component that breaks the rules (as with prefix hijacking [26]). …”
Section: Complexity and Robustnessmentioning
confidence: 99%