Border Gateway Protocol (BGP): 179
Security Weaknesses
BGP hijacking or route leaks.
Man-in-the-middle attacks through route manipulation.
Lack of built-in encryption or authentication.
Security Defense and Mitigation Measures
Implement RPKI (Resource Public Key Infrastructure).
Use BGP session authentication (e.g., MD5).
Monitor BGP route changes and anomalies.
Indicators of Compromise or Attack
Unexpected route changes or advertisements.
Abnormal routing table growth.
Increased latency or connectivity issues.
PreviousRemote Desktop Protocol (RDP): 3389NextRemote Authentication Dial-In User Service (RADIUS): 1812, 1813
Last updated