• DocumentCode
    665646
  • Title

    Characterizing vulnerability to IP hijack attempts

  • Author

    Gersch, Joseph ; Massey, Dan

  • Author_Institution
    Secure64 Software Corp., Fort Collins, CO, USA
  • fYear
    2013
  • fDate
    12-14 Nov. 2013
  • Firstpage
    328
  • Lastpage
    333
  • Abstract
    The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 15 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in 2012, and an event that partially crippled Google in November 2012. The extent of an IP Hijack can be localized to a small region or can propagate to become a world-wide event. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. The paper addresses the question of why some autonomous systems are more prone to attack than others. We present a series of findings related to the manner in which IP hijacks propagate through the global routing infrastructure. We examine why some attacks extend widely while others remain isolated and explore topological patterns that enhance or inhibit attacks.
  • Keywords
    Internet; routing protocols; security of data; social networking (online); Australia; BGP routing; Google; IP hijack attempts; IP route hijacking; Internet; YouTube; border gateway protocol; global routing infrastructure; Correlation; IP networks; Internet; Object oriented modeling; Pollution measurement;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Technologies for Homeland Security (HST), 2013 IEEE International Conference on
  • Conference_Location
    Waltham, MA
  • Print_ISBN
    978-1-4799-3963-3
  • Type

    conf

  • DOI
    10.1109/THS.2013.6699023
  • Filename
    6699023