Fandom

The IT Law Wiki

Border Gateway Protocol attack

32,191pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definition Edit

A Border Gateway Protocol attack involves an attacker corrupting the BGP tables containing information on how packets should be routed between any given network and other networks. These corrupted tables can misdirect traffic away from its rightful destination and toward a network controlled by the attacker.

Overview Edit

Once the attacker has captured traffic intended for a given destination, the captured traffic can be discarded (thus isolating the destination network) or copied for later examination and then forwarded to the correct destination (to reduce the likelihood of the attack becoming known). If the captured traffic contains information such as passwords, the attacker may be able to impersonate the sender at a later date.

Also on Fandom

Random Wiki