Output details
11 - Computer Science and Informatics
University of Leicester
Computational complexity of traffic hijacking under BGP and S-BGP
<12>The paper analyses, for different variants of BGP, the complexity of determining whether a traffic attraction attack is possible for a single malicious node. The analysis is quite involved in this setting due to the dynamic effects of the routing protocol. The paper also resolves a question raised by Goldberg, Schapira, Hummon and Rexford (SIGCOMM 2010) regarding when a traffic attraction attack is also an interception attack. The results of the paper demonstrate that more secure variants of BGP not only limit the options available to an attacker, but also increase the computational complexity of identifying an attack strategy.