The Rise of BGP Hijacking and Why You Need a Response Plan Immediately

The Rise of BGP Hijacking and Why You Need a Response Plan Immediately
An engineering student takes part in a hacking challenge near Paris on March 16, 2013. Thomas Samson/AFP via Getty Images
Entrepreneur
Updated:
By Deepak Gupta
Border Gateway Protocol (BGP) Hijacking is one of the many famous attacks hackers deploy to interfere with content delivery networks (CDNs). Hackers may also be capable of interfering with cloud hosting providers. Recently, almost all major cloud service providers like Google, Amazon, and GoDaddy have become victims of BGP Hijacking.

How Does a BGP Function?

Before getting into the depth of how BGP hijacking occurs, it is important to delve into BGP. BGP is essentially a routing protocol that can connect several networks. This congregation of networks is known as an Autonomous System (AS). A routing protocol is used to transfer information or data packets across several networks.

Typically, an AS consists of ISP providers, large tech enterprises, or in some cases, networks that belong to governments. Every AS receives a unique number responsible for controlling a specific set of IP ranges or spaces known as prefixes. Every AS displays the list of IP addresses they control and possible pathways to neighboring routers or Peers during data packet routing.

Entrepreneur
Entrepreneur
Author
Empowering People in the Business of Changing the World | Entrepreneur® is dedicated to fueling the world’s visionary leaders compelled to make a difference through their innovative ideas, businesses, and points of view.
Related Topics