BGP Hijacking
This is a class of attacks that use the BGP protocol as its method of attack. This falls into 3 categories:
- Classification by Affected Prefix: In this class of hijacking attacks, we are primarily concerned with the IP prefixes that are advertised by BGP.
- Exact prefix hijacking
- Sub-prefix hijacking
- BGP squatting
- Classification by AS-Path announcement: In this class of attacks, an illegitimate AS announces the AS-path for a prefix for which it doesn’t have ownership rights.
- Type-0 hijacking
- Type-N hijacking
- Type-U hijacking
- Classification by Data-Plane traffic manipulation: In this class of attacks, the attacker intercepts traffic between two users and manipulates it.
- Blackholing attack
- Man-in-the-middle attack (MM)
- Imposture attack (IM)