Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Dangers on the internet
Internet privacy threats
Dangers on the internet
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Dangers on the internet
1. THE NEED OF DEFENSES AGAINST BGP HIJACKING
There are various routing risks to anyone who connects to the Internet today: downtime, hijacking and now even wholesale traffic interception [1]. Not many people are aware of these risks, because of which they are not being managed or measured appropriately. One of the most common forms of threat to the world of Internet today is BGP hijacking. BGP Route Hijacking occurs when a rogue BGP peer maliciously announces a victim's prefixes in an effort to reroute some or all traffic to itself for untoward purposes (for example, to view contents of traffic that otherwise may be denied to the router). In BGP hijacking, once located, an attacker is able to potentially advertise any prefix they want, causing some or all traffic to be diverted from the original real source towards the attacker [2]. This is done either to overload the ISP the attacker has infiltrated, or to perform a DoS or impersonation attack on the entity whose prefix is being advertised [2]. With this, an attacker can cause serious outages including a complete loss of connectivity. There have been many cases in the past where BGP hijacking has been done. For instance, in early 2008, at least eight US Universities had their traffic diverted to Indonesia for about 90 minutes one morning in an attack kept mostly quiet by those involved [3]. Additionally, in
February 2008, a large portion of YouTube's address space was redirected to Pakistan when the
PTA decided to block access to the site from inside the country, but accidentally blackholed the route in the global BGP table [3].
Figure 1: The famous BGP hijacking case of 2008: YouTube announced only the /22; Pakistan Telecom announces the /24.In BGP, most specific route to an IP...
... middle of paper ...
...ke: Where exactly has hijacking been done, is it a prefix hijacking or sub-prefix hijacking, which AS route has been maligned, etc. Thus, in order to understand the technique of detection, it is important to understand the difference between the two types of BGP hijacking: Prefix hijacking and Sub-prefix hijacking [4]:
i. Prefix Hijacking: This occurs when the attack router creates a route to an existing IP prefix of the victim network. This results in the Internet being partially polluted, depending on how preferable the fake route is compared to the real route from the view point of various networks. ii. Sub-prefix Hijacking: This occurs when the attacker steals a subnet of an existing prefix in the routing tables by announcing a route for the subnet originating from the attacker network. Because of the principle of longest-prefix matching based forwarding, most of
Program on Telecommunications and Cybersecurity Policy. (n.d.). The Global Information Society Project Program for Telecommunications Policy. Retrieved November 11, 2013, from http://www.telecom-program.org/
Imperva. (2012). Hacker Intelligence Initiative, Monthly Trend Report #12. Retrieved December 28, 2012 from https://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
packets to a host for some malicious purpose. In the case of the ATM and
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Indirect ads. When someone puts a link to another servers ip/info of another server in chat or a youtube vid on another server.
TOR (Roger Dingledine) is a circuit based low-latency anonymous communication service. TOR is now in its second generation and was developed from the Onion routing program. The routing system can run on several operating systems and protect the anonymity of the user. The latest TOR version supports perfect forward secrecy, congestion control, directory servers, integrity checking and configurable exit policies. Tor is essentially a distributed overlay network which works on the application layer of the TCP protocol. It essentially anonymizes all TCP-based applications like web-browsing, SSH, instant messaging. Using TOR can protect against common form of Internet surveillance known as “traffic analysis” (Electronic Frontier Foundation). Knowing the source and destination of your internet traffic allows others to track your behavior and interests. An IP packet has a header and a dat...
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
The Denial of Service attack (DoS), in this attack, the attacker does not actually access the system, but rather simply blocks access from legitimate users. In the words of the CERT (Computer Emergency Response Team) Coordination Center (the first computer security incident response team), “A ‘Denial-of-Service’ attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service” (CERT, 2003). One often-used blocking method is flooding the targeted system with so many false connection requests that it cannot respond to legitimate requests. DoS is an extremely common attack method, second only to malware. (Easttom, 2014)
Step 1: Upon detecting a prefix hijack, the detection system notifies the mitigation system about the hijack with three pieces of information:
In using NAT, hosts on the Internet appear to be communicating directly with the NAT device rather than with the actual host inside the private network. Inbound packets are sent to the NAT device's IP address and the device changes the destination packet header from its own Internet address to the private network address of the true destination host. The result is that, in theory, a single globally unique IP address is used for hundreds, thousands, or even millions of privately addressed hosts. In practice, however, there are drawbacks. For one thing, many Internet protocols and applications depend on the network being truly end-to-end, with packets forwarded entirely unmodified from the source to the destination.
Terrorism is a growing threat in modern times. Ultimately all activities need co-ordination and such co-ordination is facilitated by communication. Terrorist activities need communication as well as any other activity. In order to avoid getting traced, such communication can be done over secure lines on open public networks or hacked private networks.
Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.
Crowther, G. Alexander, and Shaheen Ghori. "Detangling the web: a screenshot of U.S. government cyber activity." Joint Force Quarterly July 2015: 75+. War and Terrorism Collection. Web. 28 Oct. 2015.
The internet offers high speed connectivity between countries, which allows criminals to commit cybercrimes from anywhere in the world. Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). This lack of security enables hacker...