Abstract

From time to time, global routing is affected by local misconfigurations of global impact. Incorrect routing information leaks into the global routing — IP address space becomes hijacked. As such incidents are highly problematic and may even serve as blueprints for purposeful attacks, concepts to prevent or at least automatically detect such incidents are desirable. As planned architectures to prevent prefix hijacking incidents will need some time to become globally deployed and may be ineffective if manipulations are obfuscated, automatic detection seems to be an crucial facet. In this paper, we study a misconfiguration event that could serve as blueprint for attacks. With this analysis, we try to provide starting points for the development of indicators to detect routing manipulations and classify them automatically.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.