Understanding resiliency of internet topology against prefix hijack attacks

Mohit Lad, Ricardo Oliveira, Beichuan Zhang, Lixia Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations

Abstract

A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet can be diverted to attacker networks. Prefix hijack attacks are a serious security threat in the Internet and it is important to understand the factors that affect the resiliency of victim networks against these attacks. In this paper, we conducted a systematic study to gauge the effectiveness of prefix hijacks launched at different locations in the Internet topology. Our study shows that direct customers of multiple tier1 networks are the most resilient, even more than the tier-1 networks themselves. Conversely, if these customer networks are used to launch prefix hijacks, they would also be the most effective launching pads for attacks. We verified our results through case studies using real prefix hijack incidents that had occurred in the Internet.

Original languageEnglish (US)
Title of host publicationProceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
Pages368-377
Number of pages10
DOIs
StatePublished - 2007
Event37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007 - Edinburgh, United Kingdom
Duration: Jun 25 2007Jun 28 2007

Publication series

NameProceedings of the International Conference on Dependable Systems and Networks

Other

Other37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
CountryUnited Kingdom
CityEdinburgh
Period6/25/076/28/07

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Understanding resiliency of internet topology against prefix hijack attacks'. Together they form a unique fingerprint.

Cite this