This is a continuation of Internet Address Hijacking, Spoofing, and Squatting Attacks.
In the following sections we classify attacks that exploit IP Prefixes for malicious activities as hijacking, spoofing, or squatting attacks, again with the purposes of calling attention to the distinguishing characteristics of each kind of attack and identify measures to possibly mitigate them. The attacks – squatting, hijacking, and spoofing – are very similar to attacks that exploit ASNs, so some of the discussion will feel repetitive. Readers who feel they have a sufficient understanding of the distinguishing characteristics of these attacks may skip to the section Addressing Attack Mitigation. Others may wish to read these sections to understand how the attacks differ when IP Prefixes are the exploited resource.
1 | 2 | 3 | 4 | 5 | 6 |
7 | 8 | 9 | 10 | 11 |
Comments
You can follow this conversation by subscribing to the comment feed for this post.