Border Gateway Protocol (BGP): 179

Security Weaknesses

  • BGP hijacking or route leaks.

  • Man-in-the-middle attacks through route manipulation.

  • Lack of built-in encryption or authentication.

Security Defense and Mitigation Measures

  • Implement RPKI (Resource Public Key Infrastructure).

  • Use BGP session authentication (e.g., MD5).

  • Monitor BGP route changes and anomalies.

Indicators of Compromise or Attack

  • Unexpected route changes or advertisements.

  • Abnormal routing table growth.

  • Increased latency or connectivity issues.

Last updated