What is BGP anycast? Can it be used like BGP hijacking for malicious purposes, such as distributed denial-of-service...
Anycast addressing uses a one-to-nearest association. Packets are routed from a single sender to the nearest node in a group of receiving nodes. To implement this addressing method, you need Border Gateway Protocol (BGP).
BGP anycast announces the destination IP address range for receiving nodes. All receiving nodes have the same destination address, and packets are sent to the nearest member.
It's common for large organizations to connect to two or more internet service providers (ISPs). The ISPs, in turn, connect to other network providers. In both instances, the network administrators need to ensure the BGP anycast has been configured properly. Proper BGP anycast configuration enables an operator, such as a certified network administrator, to use an intermediate router to hijack any packets to the nearest nodes. The main purpose of this legitimate hijacking is to improve traffic flows.
Improper configuration opens the network to hackers who can exploit BGP hijacks for malicious purposes, like distributed denial-of-service (DDoS) attacks. For example, a hacker can set up a rogue network host to advertise itself as an anycast server for a virtual network to block service. Blocking service is achieved by launching DDoS attacks to the nearest nodes. This could be done by redirecting a large amount of malicious traffic to the destination IP addresses. The hacker then has no control over which node is the nearest node.
To gain some control over the nodes in the receiving group, the hacker could choose to ping an anycast address to get the unicast address of the closest node, at least on IPv6. The hacker can then attack individual nodes, bypassing BGP anycast addressing methods.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Find out how to ensure your IP routing is secure despite holes in BGP security
Check out this introduction to BGP
Learn more about BGP's rise to prominence in software-defined networks
Related Q&A from Judith Myerson
Air-gapped computers subject to PowerHammer attack: Proof-of-concept attack enables data exfiltration through control of current flow over power ... Continue Reading
Bastille researchers created the SirenJack proof of concept to show how a vulnerability could put San Francisco's emergency warning system at risk. ... Continue Reading
A QR code vulnerability was recently discovered in the Apple iOS 11 camera app. Learn how an attacker could exploit it and how to avoid the issue ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.