[PDF][PDF] Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.

PA Vervier, O Thonnard, M Dacier - NDSS, 2015 - eurecom.fr
Some recent research presented evidence of blocks of IP addresses being stolen by BGP
hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in …

A taxonomy of attacks using bgp blackholing

L Miller, C Pelsser - Computer Security–ESORICS 2019: 24th European …, 2019 - Springer
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the
victim sends in a request for traffic to the attacked IP (s) to be dropped. Unfortunately, remote …

The abandoned side of the Internet: Hijacking Internet resources when domain names expire

J Schlamp, J Gustafsson, M Wählisch… - Traffic Monitoring and …, 2015 - Springer
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking
events. Major outages such as the China Telecom incident in 2010 stimulate speculations …

IP prefix hijack detection using BGP connectivity monitoring

H Alshamrani, B Ghita - 2016 IEEE 17th International …, 2016 - ieeexplore.ieee.org
In spite of significant on-going research, the Border gateway protocol (BGP) still
encompasses conceptual vulnerability issues regarding impersonating the ownership of IP …

BGP Anomaly Detection by the mean of Updates Projection and Spatio-temporal Auto-encoding

D Fejza, A Lambert - 2022 12th International Workshop on …, 2022 - ieeexplore.ieee.org
Detecting BGP anomalies is crucial to improve the security and robustness of the Internet's
inter-domain routing system. As part of this work, we propose an innovative way for detecting …

Uncovering threats in digital systems: a deep dive into BGP, the blockchain, and Telegram

F Sassi - 2024 - iris.uniroma1.it
Digital systems have become integral to daily life, driven by the widespread adoption of the
Internet, social networks, and blockchain technology. While these advancements enhance …

Ip prefix hijack detection using bgp attack signatures and connectivity tracking

H Alshamrani, B Ghita - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In spite of significant on-going research, the Border Gateway Protocol (BGP) still suffers
vulnerability issues specially regarding impersonating the ownership of IP prefixes of ASes …

Behind IP prefix overlaps in the BGP routing table

Q Jacquemart, G Urvoy-Keller, E Biersack - … Greece, March 31-April 1, 2016 …, 2016 - Springer
The IP space has been divided and assigned as a set of IP prefixes. Due to the longest
prefix match forwarding rule, a single assigned IP prefix can be further divided into multiple …

Detecting IP prefix hijack events using BGP activity and AS connectivity analysis

HH Alshamrani - 2017 - plymouth.researchcommons.org
Abstract The Border Gateway Protocol (BGP), the main component of core Internet
connectivity, suffers vulnerability issues related to the impersonation of the ownership of IP …

[PDF][PDF] ROUTE HIJACKING AND BGP SECURITY

GY Wu, A Anbalagan - aravindbgpproject.s3.amazonaws …
Border Gateway Protocol (BGP) routes are vulnerable to hijack when one attacker falsely
modifies the route and advertises it to the source. The attacker modifies the route so that they …