SlideShare a Scribd company logo
1 of 16
Border Gateway Protocol Hijacking Nick Beattie Networking & Security April 11th, 2011
What is theBorder Gateway Protocol? And, how can it be hijacked?
h@ck3r Defense Advanced Research Project Agency – Program Manager "I went around screaming my head about this about ten or twelve years ago…. We described this to intelligence agencies and to the National Security Council, in detail.” -Peiter “Mudge” Zatko , 1998 Congress
“There’s no vulnerabilities, no protocol errors, there are no software problems. The problem arises (from) the level of interconnectivity that’s needed to maintain this mess, to keep it all working."
Why? It’s necessary.
Traffic routed towards DefCon – Las Vegas Theory Traffic routed through servers in New York City Practice Traffic rerouted back to DefCon – Las Vegas
YouTube Pakistan’s Black Hole
China Telecom’s 18 minutes of fame
50,000 IP Blocks 170 Countries 50,000 IP Blocks 15% of the Internet .com, .net, .org, .gov, .mil Email Instant messaging  Web requests China Telecom Intended Destination
Worth Noting ,[object Object]
Why didn’t China Telecom buckle under the increased Internet traffic?
What does mean is possible?
Corporate Espionage

More Related Content

Viewers also liked

Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
BGP Peering Strategy and Data
BGP Peering Strategy and DataBGP Peering Strategy and Data
BGP Peering Strategy and DataAPNIC
 
10 Revealing Statistics About Compensation & Benefits You should Know
10 Revealing Statistics About Compensation & Benefits You should Know10 Revealing Statistics About Compensation & Benefits You should Know
10 Revealing Statistics About Compensation & Benefits You should KnowElodie A.
 

Viewers also liked (10)

BGP Next-hop-self
BGP Next-hop-selfBGP Next-hop-self
BGP Next-hop-self
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
BGP
BGPBGP
BGP
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
BGP Peering Strategy and Data
BGP Peering Strategy and DataBGP Peering Strategy and Data
BGP Peering Strategy and Data
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
10 Revealing Statistics About Compensation & Benefits You should Know
10 Revealing Statistics About Compensation & Benefits You should Know10 Revealing Statistics About Compensation & Benefits You should Know
10 Revealing Statistics About Compensation & Benefits You should Know
 

Similar to BGP slides

Bgpslides 110411080056-phpapp02
Bgpslides 110411080056-phpapp02Bgpslides 110411080056-phpapp02
Bgpslides 110411080056-phpapp02Vishal_91221
 
Fantom ecosystem analysis
Fantom ecosystem analysisFantom ecosystem analysis
Fantom ecosystem analysisTrade Coin Asia
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsKenny Huang Ph.D.
 
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and CryptocurrenciesImplementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and CryptocurrenciesPayson Johnston
 
Mac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityMac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityRob Jewitt
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011Prof. (Dr.) Tabrez Ahmad
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
Blockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityBlockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityVladimir Seleznev
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presentedHeung-No Lee
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노ethconkr
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnetsAcad
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Ziyad Abualrob
 
Ovum blockchain for beginners
Ovum blockchain for beginnersOvum blockchain for beginners
Ovum blockchain for beginnersHelen Child
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in ActionSatnam Singh
 

Similar to BGP slides (20)

Bgpslides 110411080056-phpapp02
Bgpslides 110411080056-phpapp02Bgpslides 110411080056-phpapp02
Bgpslides 110411080056-phpapp02
 
Fantom ecosystem analysis
Fantom ecosystem analysisFantom ecosystem analysis
Fantom ecosystem analysis
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Taiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber NormsTaiwan Internet Intermediaries and Cyber Norms
Taiwan Internet Intermediaries and Cyber Norms
 
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and CryptocurrenciesImplementing Commerce in the 21st century with Blockchain and Cryptocurrencies
Implementing Commerce in the 21st century with Blockchain and Cryptocurrencies
 
Mac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityMac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net Neutrality
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Blockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against realityBlockchain and the digital future. Promises of new technology against reality
Blockchain and the digital future. Promises of new technology against reality
 
The blockchain
The blockchainThe blockchain
The blockchain
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
 
Blockchain disruptive technology 2018
Blockchain disruptive technology 2018Blockchain disruptive technology 2018
Blockchain disruptive technology 2018
 
Ovum blockchain for beginners
Ovum blockchain for beginnersOvum blockchain for beginners
Ovum blockchain for beginners
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 

BGP slides