DocumentCode
665646
Title
Characterizing vulnerability to IP hijack attempts
Author
Gersch, Joseph ; Massey, Dan
Author_Institution
Secure64 Software Corp., Fort Collins, CO, USA
fYear
2013
fDate
12-14 Nov. 2013
Firstpage
328
Lastpage
333
Abstract
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 15 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in 2012, and an event that partially crippled Google in November 2012. The extent of an IP Hijack can be localized to a small region or can propagate to become a world-wide event. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. The paper addresses the question of why some autonomous systems are more prone to attack than others. We present a series of findings related to the manner in which IP hijacks propagate through the global routing infrastructure. We examine why some attacks extend widely while others remain isolated and explore topological patterns that enhance or inhibit attacks.
Keywords
Internet; routing protocols; security of data; social networking (online); Australia; BGP routing; Google; IP hijack attempts; IP route hijacking; Internet; YouTube; border gateway protocol; global routing infrastructure; Correlation; IP networks; Internet; Object oriented modeling; Pollution measurement;
fLanguage
English
Publisher
ieee
Conference_Titel
Technologies for Homeland Security (HST), 2013 IEEE International Conference on
Conference_Location
Waltham, MA
Print_ISBN
978-1-4799-3963-3
Type
conf
DOI
10.1109/THS.2013.6699023
Filename
6699023
Link To Document