Abstract
There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim’s address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between network topology and prefix hijacking influence is presented for all sorts of hijacking events in different Internet layers. The impaction parameter is analyzed for typical prefix hijacking events in different layers. A large Internet emulation environment is constructed and the attack impaction of IP prefix hijacking events are evaluated. The results assert that the hierarchical nature of network influences the prefix hijacking greatly.
Chapter PDF
Similar content being viewed by others
References
Lad, M., Oliveira, R., Zhang, B., Zhang, L.: Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks. In: 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 368–377 (2007)
Nordstrom, O., Dovrolis, C.: Beware of BGP attacks. SIGCOMM Comput. Commun. Rev. 34(2) (2004)
Butler, K., McDaniel, P., Rexford, J.: A Survey of BGP Security Issues and Solutions. Proceedings of the IEEEÂ 98(1) (January 2010)
Subramanian, L., Roth, V., Stoica, I., Shenker, S., Katz, R.H.: Listen and whisper: Security mechanisms for BGP. In: Proceedings of ACM NDSI 2004 (March 2004)
Ng, J.: Extensions to BGP to Support Secure Origin BGP (April 2004), ftp://ftp-eng.cisco.com/sobgp/drafts/draft-ng-sobgpbgp-extensions-02.txt
Kent, S., Lynn, C., Seo, K.: Secure border gateway protocol (S-BGP). IEEE JSAC Special Issue on Network Security (2000)
Zhao, S.S.M., Nicol, D.: Aggregated path authentication for efficient bgp security. In: 12th ACM Conference on Computer and Communications Security (CCS) (November 2005)
Smith, B.R., Murphy, S., Garcia-Luna-Aceves, J.J.: Securing the border gateway routing protocol. In: Global Internet 1996 (November 1996)
RIPE. Routing information service: myASn System, http://www.ris.ripe.net/myasn.html
Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: A prefix hijack alert system. In: 15th USENIX Security Symposium (2006)
Qiu, S., Monrose, F., Terzis, A., McDaniel, P.: Efficient techniques for detecting false origin advertisements in interdomain routing. In: Second workshop on Secure Network Protocols (NPSec) (2006)
Karlin, J., Forrest, S., Rexford, J.: Pretty good bgp: Protecting bgp by cautiously selecting routes. Technical Report TR-CS-2005-37, University of New Mexico (October 2005)
Xu, W., Rexford, J.: MIRO: multi-path interdomain routing. In: SIGCOMM 2006, pp. 171–182 (2006)
Hu, X., Mao, Z.M.: Accurate Real-time Identification of IP Prefix Hijacking. In: Proc. of IEEE Security and Privacy, Oakland (2007)
Zheng, C., Ji, L., Pei, D., Wang, J., Francis, P.: A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Realtime. In: Proc. of ACM SIGCOMM (August 2007)
Govindan, R., Reddy, A.: An Analysis of Internet Inter-Domain Topology and Route Stability. In: Proc. IEEE INFOCOM 1997 (March 1997)
Ge, Z., Figueiredo, D., Jaiwal, S., et al.: On the hierarchical structure of the logical Internet graph. In: Proceedings of SPIE ITCOM, USA (August 2001)
Zhu, P., Liu, X.: An efficient Algorithm on Internet Hierarchy Induction. High Technology Communication 14, 358–361 (2004)
The NANOG Mailing List, http://www.merit.edu/mail.archives/nanog/
Christian, B., Tauber, T.: BGP Security Requirements. IETF Draft: draft-ietf-rpsec-bgpsecrec-04 (March 2006)
Goldberg, S., Schapira, M., Hummon, P., Rexford, J.: How Secure are Secure Interdomain Routing Protocols? In: Proc. of ACM SIGCOMM, New Delhi, India, August 30–September 3 (2010)
Zhao, J.J., Yan, W., Xiang, L., et al.: The Relation on Prefix Hijacking and the Internet Hierarchy. In: The 6th International Conference on Innovative Mobile and Internet Services (IMIS 2012), Italy (July 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, J., Wen, Y. (2013). Emulation on the Internet Prefix Hijacking Attack Impaction. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)