An In Depth Discussion of BGP Hijacking Attacks and How Systems Detect and Mitigate Such Attacks

Authors

  • Parth Diwane Researcher High School
  • Rucha Vaidya University of Southern California

DOI:

https://doi.org/10.47611/jsrhs.v13i4.7778

Keywords:

Computer Science, Computer Networking, BGP Protocole, Cybersecurity, BGP Detection

Abstract

While internet architecture and software have made drastic developments since the birth of the internet, the internet is still an unsecure place where attacks are common. Despite the security of the internet, hundreds of BGP hijacking attacks occur each year. In 2021 alone, there were 775 possible instances of BGP hijacking attacks. These attacks redirect information to an alternative network where it could be compromised to misused, but they are also a major inconvenience for the user as connection to a particular website could be completely dropped (known as blackholing). The purpose of this review is to synthesize and link two discrete topics, being cybersecurity and network architecture, and how those topics work together. To find evidence for this review, databases such as Google Scholar and IEEE Xplore were queried. Additional information on how evidence was gathered, how quality of information was ensured, and strategies used to synthesize information is discussed in the Methods section. This review provides an in-depth discussion on BGP hijacking attacks, the different types of BGP hijacking attacks, how the BGP protocol (and other routing protocols ) function, the structure of a BGP message, how systems detect and mitigate BGP hijacking attacks, and a summary of internet architecture and how devices on the internet communicate.   

 

Downloads

Download data is not yet available.

References or Bibliography

Al-Musawi, B., Branch, P., & Armitage, G. (2017). BGP Anomaly Detection Techniques: A Survey. IEEE Communications Surveys & Tutorials, 19(1), 377–396. https://doi.org/10.1109/comst.2016.2622240

BGP Hijacking: Understanding Threats to Internet Routing. (2023, July 19). Kentipedia. https://www.kentik.com/kentipedia/bgp-hijacking/

Bush, R., & Austein, R. (2013, January 1). The Resource Public Key Infrastructure (RPKI) to Router Protocol. IETF. https://datatracker.ietf.org/doc/html/rfc6810

Butler, K., Farley, T. R., McDaniel, P., & Rexford, J. (2010). A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE, 98(1), 100–122. https://doi.org/10.1109/jproc.2009.2034031

IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3S - Configuring Multiprotocol BGP (MP-BGP) Support for CLNS [Cisco IOS XE 3S]. (n.d.). Cisco. Retrieved November, 2023, from https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/configuring_multiprotocol_bgp__mp-bgp__support_for_clns.html

Kent, S., Lynn, C., & Seo, K. (2000). Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4), 582–592. https://doi.org/10.1109/49.839934

Kurose, J. F., & Ross, K. W. (2021). Computer networking: a top-down approach (8th ed.). Pearson.

Siddiqui, A. (2021, February 5). BGP, RPKI, and MANRS: 2020 in review. MANRS. https://manrs.org/2021/02/bgp-rpki-and-manrs-2020-in-review/

Siddiqui, A. (2022, February 21). BGP Security in 2021. MANRS. https://manrs.org/2022/02/bgp-security-in-2021/

Shapira, T., & Shavitt, Y. (2022, April 11). AP2Vec: An Unsupervised Approach for BGP Hijacking Detection [Review of AP2Vec: An Unsupervised Approach for BGP Hijacking Detection]. IEEE Xplore; IEEE. https://ieeexplore.ieee.org/abstract/document/9754706. DOI: 10.1109/TNSM.2022.3166450

What Is a Network Node? - IT Glossary | SolarWinds. (n.d.). Www.solarwinds.com. https://www.solarwinds.com/resources/it-glossary/network-node

Published

11-30-2024

How to Cite

Diwane, P., & Vaidya, R. (2024). An In Depth Discussion of BGP Hijacking Attacks and How Systems Detect and Mitigate Such Attacks . Journal of Student Research, 13(4). https://doi.org/10.47611/jsrhs.v13i4.7778

Issue

Section

HS Review Articles