An In Depth Discussion of BGP Hijacking Attacks and How Systems Detect and Mitigate Such Attacks
DOI:
https://doi.org/10.47611/jsrhs.v13i4.7778Keywords:
Computer Science, Computer Networking, BGP Protocole, Cybersecurity, BGP DetectionAbstract
While internet architecture and software have made drastic developments since the birth of the internet, the internet is still an unsecure place where attacks are common. Despite the security of the internet, hundreds of BGP hijacking attacks occur each year. In 2021 alone, there were 775 possible instances of BGP hijacking attacks. These attacks redirect information to an alternative network where it could be compromised to misused, but they are also a major inconvenience for the user as connection to a particular website could be completely dropped (known as blackholing). The purpose of this review is to synthesize and link two discrete topics, being cybersecurity and network architecture, and how those topics work together. To find evidence for this review, databases such as Google Scholar and IEEE Xplore were queried. Additional information on how evidence was gathered, how quality of information was ensured, and strategies used to synthesize information is discussed in the Methods section. This review provides an in-depth discussion on BGP hijacking attacks, the different types of BGP hijacking attacks, how the BGP protocol (and other routing protocols ) function, the structure of a BGP message, how systems detect and mitigate BGP hijacking attacks, and a summary of internet architecture and how devices on the internet communicate.
Downloads
References or Bibliography
Al-Musawi, B., Branch, P., & Armitage, G. (2017). BGP Anomaly Detection Techniques: A Survey. IEEE Communications Surveys & Tutorials, 19(1), 377–396. https://doi.org/10.1109/comst.2016.2622240
BGP Hijacking: Understanding Threats to Internet Routing. (2023, July 19). Kentipedia. https://www.kentik.com/kentipedia/bgp-hijacking/
Bush, R., & Austein, R. (2013, January 1). The Resource Public Key Infrastructure (RPKI) to Router Protocol. IETF. https://datatracker.ietf.org/doc/html/rfc6810
Butler, K., Farley, T. R., McDaniel, P., & Rexford, J. (2010). A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE, 98(1), 100–122. https://doi.org/10.1109/jproc.2009.2034031
IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3S - Configuring Multiprotocol BGP (MP-BGP) Support for CLNS [Cisco IOS XE 3S]. (n.d.). Cisco. Retrieved November, 2023, from https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/configuring_multiprotocol_bgp__mp-bgp__support_for_clns.html
Kent, S., Lynn, C., & Seo, K. (2000). Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4), 582–592. https://doi.org/10.1109/49.839934
Kurose, J. F., & Ross, K. W. (2021). Computer networking: a top-down approach (8th ed.). Pearson.
Siddiqui, A. (2021, February 5). BGP, RPKI, and MANRS: 2020 in review. MANRS. https://manrs.org/2021/02/bgp-rpki-and-manrs-2020-in-review/
Siddiqui, A. (2022, February 21). BGP Security in 2021. MANRS. https://manrs.org/2022/02/bgp-security-in-2021/
Shapira, T., & Shavitt, Y. (2022, April 11). AP2Vec: An Unsupervised Approach for BGP Hijacking Detection [Review of AP2Vec: An Unsupervised Approach for BGP Hijacking Detection]. IEEE Xplore; IEEE. https://ieeexplore.ieee.org/abstract/document/9754706. DOI: 10.1109/TNSM.2022.3166450
What Is a Network Node? - IT Glossary | SolarWinds. (n.d.). Www.solarwinds.com. https://www.solarwinds.com/resources/it-glossary/network-node
Published
How to Cite
Issue
Section
Copyright (c) 2024 Parth Diwane; Rucha Vaidya

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.


