BGP hijacking is the takeover of groups of IP addresses of Autonomous Systems (AS) by corrupting Internet routing tables using the Border Gateway Protocol (BGP)
Border Gateway protocol has weaknesses that can be exploited by malicious actors. Several incidents have happened during the recent years.
The task is to analyze and modell bgp hijacking including detailed evaluation of the weaknesses and the exploitation possibilities and also to discuss the possible mitigations and protections.