Abstract

We focus on the activities of the adversary group targeting Autonomous Systems (AS). Many cases of large-scale disruptions and eavesdropping have been caused by Border Gateway Protocol (BGP) hijack, we evaluate the possibility of attack tactics and propose an attack strategy against AS connections using BGP hijack. Our computer simulations derive a local topology map of AS based on public log data. Using such a topology map, we evaluate the impact of the adversary group’s activity. From the results of computer simulations, we suggest two policies that allow adversary groups to execute attacks more efficiently; how to select the target area from the viewpoint of the attack Scenario and how to select the best attack Scenario from the given target area. Additionally, we analyze trends in the location of the ASes to be attacked. This allows AS managers to estimate the effective protection for more reliable operations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call