BGP: Prefix Hijacking Simulation and Analysis




Abstract:
As one of the most important Internet protocols, BGP - Border Gateway Protocol - should be among the most secure and reliable. Unfortunately, it is not. The basic, most used version of the protocol is not resistant to the “prefix hijacking” attack, and yet even though some solutions exist, they are not as widespread as it is necessary for them to work. In this paper, we examine several basic protection methods and analyse their effectiveness by simulating hijacking of a prefix in a small backbone network. Several scenarios are demonstrated: first we attack an unprotected network, then repeat the attack after applying a filter, and after manipulating several BGP attributes the attack is repeated.

CITATION:

IEEE format

D. Majstorović, “BGP: Prefix Hijacking Simulation and Analysis,” in Sinteza 2017 - International Scientific Conference on Information Technology and Data Related Research, Belgrade, Singidunum University, Serbia, 2017, pp. -.

APA format

Majstorović, D. (2017). BGP: Prefix Hijacking Simulation and Analysis. Paper presented at Sinteza 2017 - International Scientific Conference on Information Technology and Data Related Research.

BibTeX format
Download

RefWorks Tagged format
Download