Skip to content

Exploring the vulnerability of autonomous systems and the Border Gateway Protocol.

Notifications You must be signed in to change notification settings

whataboutamir/bgphijacking

Repository files navigation

BGP Vulnerabilities and Hijacking Attacks

This repo explores the vulnerabilities of Border Gateway Protocol (BGP) and focuses on a specific type of attack known as BGP hijacking attacks. BGP, a fundamental protocol for routing internet traffic between Autonomous Systems (ASes), is susceptible to abuse and manipulation.

What are BGP Hijacking Attacks?

BGP hijacking attacks involve maliciously manipulating BGP through false announcements by rogue ASes. By falsely advertising a shorter path to a specific prefix, the attacker tricks victim ASes into redirecting their traffic through the malicious AS. This deception exploits BGP routing behaviour, enticing victim ASes to choose the newly advertised route, which appears more advantageous.

Usage

TODO

About

Exploring the vulnerability of autonomous systems and the Border Gateway Protocol.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published