BGP Hijacking

This is a class of attacks that use the BGP protocol as its method of attack. This falls into 3 categories:

  1. Classification by Affected Prefix: In this class of hijacking attacks, we are primarily concerned with the IP prefixes that are advertised by BGP.
  2. Exact prefix hijacking
  3. Sub-prefix hijacking
  4. BGP squatting
  5. Classification by AS-Path announcement: In this class of attacks, an illegitimate AS announces the AS-path for a prefix for which it doesn’t have ownership rights.
  6. Type-0 hijacking
  7. Type-N hijacking
  8. Type-U hijacking
  9.  Classification by Data-Plane traffic manipulation: In this class of attacks, the attacker intercepts traffic between two users and manipulates it.
  10. Blackholing attack
  11. Man-in-the-middle attack (MM)
  12. Imposture attack (IM)