Oppgaven er ikke lenger tilgjengelig


BGP hijacking is the takeover of groups of IP addresses of Autonomous Systems (AS) by corrupting Internet routing tables using the Border Gateway Protocol (BGP)

Border Gateway protocol has weaknesses that can be exploited by malicious actors. Several incidents have happened during the recent years.

The task is to analyze and modell bgp hijacking including detailed evaluation of the weaknesses and the exploitation possibilities and also to discuss the possible mitigations and protections.

Publisert 23. jan. 2019 11:58 - Sist endret 3. okt. 2019 13:54


  • Punitha Monisha Sankara Pandian

Omfang (studiepoeng)