Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System

نویسندگان

  • Yujing Liu
  • Bofeng Zhang
  • Fei Wang
  • Jinshu Su
چکیده

BGP prefix hijacking is a sort of serious security threat of the Internet. In a hijacking attack, the attacker try to convince ASes to become infectors for redirecting data traffic to him in stead of the victim. The more infectors there are, the larger impact an attack has. It is important to understand the root of the matter why the impact of prefix hijacking differs a lot in different attacks. In this paper, by analyzing the BGP routing process under the control of routing polices and evaluating a series of Transmit factors, we realize that BGP routing system has a Hinge-Transmit property. It indicates that Tier-1 AS set is the hinge of the Internet, transmitting a large fraction of data traffic to the whole network; a subset of Tier-1 AS set with a special topological location (core AS set) is the hinge of data delivery paths to a specified destination, transmitting a large fraction of data traffic from any source to the destination. These hinge ASes are critical in transmitting large amount of data traffic in the Internet, and also critical in enlarging the impact of a prefix hijacking attack. From the aspect of Internet security, they should be protected from being infected carefully. Finally, we verify our findings by evaluating impacts of real hijacking incidents occurred in the Internet recorded by Route Views routing tables.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation on the influence of internet prefix hijacking events

The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and ...

متن کامل

Route Reliability Ranking Algorithm for Prefix Hijacking Attacks in Border Gateway Protocol

Prefix-hijacking attack offers malicious parties to gain access to untraceable IP addresses in Intenet. Border gateway protocol (BGP) is the dominant inter domain routing protocol used in Internet. In this paper, to defend against Prefix Hijacking Attack on border gateway protocol (BGP), we propose to design a route reliability ranking (RRR) algorithm. The algorithm is used to authenticate the ...

متن کامل

Hi-BGP: A Lightweight Hijack-proof Inter-domain Routing Protocol

BGP is the cornerstone of the Internet. However, the implicit trust assumption in BGP’s design destines its inherited vulnerability. Prefix hijacking is one of the large-scale BGPspecific routing anomalies that are able to paralyze the Internet. This calls for a hijack-proof security solution. By putting the protection against prefix hijacking the top priority, we design a lightweight hijack-pr...

متن کامل

IP Prefix Hijacking Detection Using Idle Scan

The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacking can occurs, which is caused by wrong routing information. This results in a serious security threat in the Internet routing system. In this paper, we present an effective and practical approach for detecting IP pre...

متن کامل

Measuring and Analyzing on Effection of BGP Session Hijack Attack

Because there is no authentication mechanism used in BGP, a mis-behaving router can announce routes to any destination prefix on the Internet and even manipulate route attributes in the routing updates it sends to neighboring routers. Taking advantage of this weakness has become the fundamental mechanism for constructing prefix hijack attacks. The relation of network topology and prefix hijacki...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNIT

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2010