Title :
Characterizing vulnerability to IP hijack attempts
Author :
Gersch, Joseph ; Massey, Dan
Author_Institution :
Secure64 Software Corp., Fort Collins, CO, USA
Abstract :
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 15 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in 2012, and an event that partially crippled Google in November 2012. The extent of an IP Hijack can be localized to a small region or can propagate to become a world-wide event. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. The paper addresses the question of why some autonomous systems are more prone to attack than others. We present a series of findings related to the manner in which IP hijacks propagate through the global routing infrastructure. We examine why some attacks extend widely while others remain isolated and explore topological patterns that enhance or inhibit attacks.
Keywords :
Internet; routing protocols; security of data; social networking (online); Australia; BGP routing; Google; IP hijack attempts; IP route hijacking; Internet; YouTube; border gateway protocol; global routing infrastructure; Correlation; IP networks; Internet; Object oriented modeling; Pollution measurement;
Conference_Titel :
Technologies for Homeland Security (HST), 2013 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-3963-3
DOI :
10.1109/THS.2013.6699023