Computer Engineering & Science ›› 2020, Vol. 42 ›› Issue (07): 1184-1190.doi: 10.3969/j.issn.1007-130X.2020.07.006
Previous Articles Next Articles
SUI Dong-fang, TANG Yong, LIU Yu-jing, WANG En-ze
Received:
Revised:
Accepted:
Online:
Published:
Abstract: Due to the vulnerability of BGP protocol, BGP prefix hijacking has long been a serious security threat to the Internet. Detection and analysis of large-scale prefix hijacking incidents is a very ne- cessary but challenging task. This paper takes the large-scale European route leakage incident leading to route hijacking in 2019 as a case, and develops an effective detection and analysis method based on public BGP data. The analysis results include the following: firstly, the "attacker" of this hijacking is AS21217, and AS4134 is the key point in the process of hijacking route transmission; secondly, the hijacking caused serious multi-source AS conflict and as-path PATH expansion; thirdly, the hijacking types of this event include hijacking prefix and tampering with AS path and hijacking subprefix and tampering with AS path; fourthly, 311 AS were detected to be infected, with the largest number of infected chains of length 4, and 28 118 prefix IP segments belonging to 3 895 AS became victims. At the same time, a visual system is implemented to show the global network situation when the hijacking occurred. On the one hand, these results are consistent with the results published by Oracle and other companies; on the other hand, more detailed experiments and supplements have been carried out in multiple directions.
Key words: BGP prefix hijacking, Internet, detecting, Multiple Origin AS
SUI Dong-fang, TANG Yong, LIU Yu-jing, WANG En-ze. A case study on detection and analysis of large-scale prefix hijacking incidents on the Internet[J]. Computer Engineering & Science, 2020, 42(07): 1184-1190.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/10.3969/j.issn.1007-130X.2020.07.006
http://joces.nudt.edu.cn/EN/Y2020/V42/I07/1184