Abstract—Whereas prefix hijacking is usually examined from security perspectives, this paper looks at it from a novel economic angle. Our study stems from an observation that a transit AS (Autonomous System) has a financial interest in attracting extra traffic to the links with its customers. Based on real data about the actual hijacking incident in the Internet, we conduct simulations in the real AS-level Internet topology with synthetic demands for the hijacked traffic. Then, we measure traffic on all inter-AS links and compute the payments of all providers. The analysis of our results from technical, business, and legal viewpoints suggests that hijacking-based traffic attraction is a viable strategy that can create a fertile ground for t...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
This paper proposes a novel approach that draws upon the existing architecture and contractual rela-...
Abstract—Regulating the ISPs to adopt more security measures to protect their subnet has been propos...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
BGP prefix hijacking is a potentially serious security threat to the Internet routing system, yet th...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recen...
The Border Gateway Protocol (BGP) was designed with-out security aspects in mind. This fact makes th...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceT...
Abstract—Internet transit is an economy where providers sell traffic-delivery services. Traffic attr...
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing inform...
The work of Marcelo Bagnulo has been partially supported by project MASSES (TEC2012-35443) funded by...
The depletion of the unallocated address space in combination with the slow pace of IPv6 deployment ...
Abstract—Prefix deaggregation is recognized as a steady long-lived phenomenon at the interdomain lev...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
The Internet has become an indispensable resource for today's society. It is at the center of the to...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
This paper proposes a novel approach that draws upon the existing architecture and contractual rela-...
Abstract—Regulating the ISPs to adopt more security measures to protect their subnet has been propos...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
BGP prefix hijacking is a potentially serious security threat to the Internet routing system, yet th...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recen...
The Border Gateway Protocol (BGP) was designed with-out security aspects in mind. This fact makes th...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceT...
Abstract—Internet transit is an economy where providers sell traffic-delivery services. Traffic attr...
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing inform...
The work of Marcelo Bagnulo has been partially supported by project MASSES (TEC2012-35443) funded by...
The depletion of the unallocated address space in combination with the slow pace of IPv6 deployment ...
Abstract—Prefix deaggregation is recognized as a steady long-lived phenomenon at the interdomain lev...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
The Internet has become an indispensable resource for today's society. It is at the center of the to...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
This paper proposes a novel approach that draws upon the existing architecture and contractual rela-...
Abstract—Regulating the ISPs to adopt more security measures to protect their subnet has been propos...