Proceedings of the 2012 Internet Measurement Conference 2012
DOI: 10.1145/2398776.2398779
|View full text |Cite
|
Sign up to set email alerts
|

Detecting prefix hijackings in the internet with argus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(87 citation statements)
references
References 19 publications
0
86
0
1
Order By: Relevance
“…Taking this sort of attack into account is challenging as it requires realtime access to interdomain routing data and intelligent analysis to identify incidents that may impact the safety of the client's path. In the future, we plan to integrate subscriptions to BGP hijack data sources (e.g., Argus [36], or ongoing efforts at building a real-time interception detector [12]) into Astoria to allow it to operate on dynamic BGP paths.…”
Section: Security Against Network-level Attackersmentioning
confidence: 99%
“…Taking this sort of attack into account is challenging as it requires realtime access to interdomain routing data and intelligent analysis to identify incidents that may impact the safety of the client's path. In the future, we plan to integrate subscriptions to BGP hijack data sources (e.g., Argus [36], or ongoing efforts at building a real-time interception detector [12]) into Astoria to allow it to operate on dynamic BGP paths.…”
Section: Security Against Network-level Attackersmentioning
confidence: 99%
“…Using multiple sources gives also the possibility to benefit from the large number of vantage points they have around the globe. This is important, because a hijacking might affect only a part of the Internet, due to BGP policies and shortest-path routing [12,24].…”
Section: Prefix Hijacking Detection With Artemismentioning
confidence: 99%
“…Since shortest route paths are typically preferred, only a part of the Internet that is closer to the hijacker (in number of AS-hops) switches to route paths towards the hijacker. Exact prefix hijacks typically infect a few tens or hundreds of ASes [12], from small stub networks to large tier-1 ISPs [24]. In our experiments, the legitimate AS announces the prefix 184.…”
Section: Types Of Prefix Hijacking Attackmentioning
confidence: 99%
See 2 more Smart Citations