CFP last date
20 May 2024
Reseach Article

IP Prefix Hijacking and Available Solutions

Published on February 2013 by Prashant D. Londhe, Sanil C. Savale, Ketan G. Jogalekar
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 4
February 2013
Authors: Prashant D. Londhe, Sanil C. Savale, Ketan G. Jogalekar
c5fc298b-aeef-4ffc-af4b-ab429cc54924

Prashant D. Londhe, Sanil C. Savale, Ketan G. Jogalekar . IP Prefix Hijacking and Available Solutions. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 4 (February 2013), 6-9.

@article{
author = { Prashant D. Londhe, Sanil C. Savale, Ketan G. Jogalekar },
title = { IP Prefix Hijacking and Available Solutions },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 4 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 6-9 },
numpages = 4,
url = { /proceedings/icrtitcs2012/number4/10268-1362/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Prashant D. Londhe
%A Sanil C. Savale
%A Ketan G. Jogalekar
%T IP Prefix Hijacking and Available Solutions
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 4
%P 6-9
%D 2013
%I International Journal of Computer Applications
Abstract

IP prefix Hijacking is an issue regarding to Computer Network. IP Prefix Hijacking can be defines as illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. Prefix hijacking is a type of network attack that can give malicious parties access to untraceable IP addresses. The IP Prefix identifies the number of significant bits used to identify a network. IP Prefix defines how many bits are reserved to represent network and how many bits are reserved to represent host. IP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. It is also known as BGP hijacking, Prefix hijacking or route hijacking. This paper gives demonstration of IP Prefix Hijacking and Discusses on Solutions available. This paper discusses on Types of IP prefix Hijacking.

References
  1. DOD,Standard Internet Protocol (1980) – Internet Documentary.
  2. How prevalent is prefix hijacking on the internet?- Internet Documentary by Peter Boothe, James Hiebert.
  3. Probabilistic IP Prefix Authentication (PIPA) for Prefix Hijacking, By Akmal Khan, Ted "Taekyoung" Kwon, Hyunchul Kim, Seoul National University, Korea.
  4. JPractical Defenses Against BGP Prefix Hijacking – by ZhengZhang,Ying Zhang, Y. Charlie Hu, Z. Morley Mao
  5. Accurate Real-time Identification of IP Hijacking – by Xin Hu Z. Morley Mao, University of Michigan.
  6. R. L Grossman, "The Case for Cloud Computing," IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
  7. Swamp Computing" a. k. a. Cloud Computing". Web Security Journal. 2009-12-28[http://security. sys-con. com/node/1231725].
  8. Understanding IP Pre?x Hijacking and its Detection by Christian Horn n june 2009
  9. Analysis of IP Prefix Hijacking and Traffic Interception by Khin Thida Latt, Yasuhiro Ohara, Satoshi Uda and Yoichi Shinoda Japan Advanced Insitute of Science and Technology, Ishikawa, 923-1292 Japan-IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 7, July 2010
Index Terms

Computer Science
Information Sciences

Keywords

Ip Prefix As Bgp