2023
DOI: 10.1109/access.2023.3261128
|View full text |Cite
|
Sign up to set email alerts
|

On the Effectiveness of BGP Hijackers That Evade Public Route Collectors

Abstract: Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route collection systems, called route collectors, give us hope that future monitor systems can quickly detect and ultimately mitigate hijacks. In this paper, we investigate the effectiveness of public route collectors with respect to future attackers deliberately engineering longer hijacks to avoid being recorded by route collectors. Ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…These hidden AS links not only introduce incompleteness to the Internet's AS-level topology but also pose significant risks to routing security. Milolidakis [8] discovered through research that attackers can exploit these hidden links by intricately designing route announcements to evade the observation of route collectors, thereby executing attacks such as path spoofing [9] and prefix hijacking [10]. Additionally, the business relationship between the two ends of these hidden links remains unclear since the links cannot be observed in BGP routing data.…”
Section: Introductionmentioning
confidence: 99%
“…These hidden AS links not only introduce incompleteness to the Internet's AS-level topology but also pose significant risks to routing security. Milolidakis [8] discovered through research that attackers can exploit these hidden links by intricately designing route announcements to evade the observation of route collectors, thereby executing attacks such as path spoofing [9] and prefix hijacking [10]. Additionally, the business relationship between the two ends of these hidden links remains unclear since the links cannot be observed in BGP routing data.…”
Section: Introductionmentioning
confidence: 99%
“…However, given the information-hiding character of BGP, the current collection strategies do not provide comprehensive visibility of the global routing system. Researchers have recently demonstrated how strategically-scoped attacks can evade visibility of current collection systems [12].…”
Section: Introductionmentioning
confidence: 99%