Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route collection systems, called route collectors, give us hope that future monitor systems can quickly detect and ultimately mitigate hijacks. In this paper, we investigate the effectiveness of public route collectors with respect to future attackers deliberately engineering longer hijacks to avoid being recorded by route collectors. Our extensive simulations (and attacks we device) show that monitor-based systems may be unable to observe many carefully crafted hijacks diverting traffic from thousands of ASes. Hijackers could predict whether their attacks would propa...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
© ACM 2018 . This is the author's version of the work. It is posted here for your personal use. Not ...
Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entri...
Routing hijack attacks have plagued the Internet for decades.Internet-wide BGP monitoring infrastruc...
Routing hijack attacks have plagued the Internet for decades.Internet-wide BGP monitoring infrastruc...
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP pr...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile the Border Gateway Protocol (BGP) i...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
© ACM 2018 . This is the author's version of the work. It is posted here for your personal use. Not ...
Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entri...
Routing hijack attacks have plagued the Internet for decades.Internet-wide BGP monitoring infrastruc...
Routing hijack attacks have plagued the Internet for decades.Internet-wide BGP monitoring infrastruc...
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP pr...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile interdomain routing is. In particul...
Harmful Internet hijacking incidents put in evidence how fragile the Border Gateway Protocol (BGP) i...
Abstract — In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are ow...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
Possibility of dynamic routes change between nodes which are not physically connected is a key featu...
© ACM 2018 . This is the author's version of the work. It is posted here for your personal use. Not ...
Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entri...