Saturday, 11 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > BGP: What is border gateway protocol, and how does it work?
Global Market

BGP: What is border gateway protocol, and how does it work?

Last updated: May 17, 2024 11:26 pm
Published May 17, 2024
Share
Japan Osaka highway intersection street aerial interchange
SHARE

As of at the moment, Could 1, 2024, web routing safety handed an essential milestone. For the primary time within the historical past of RPKI (Useful resource Public Key Infrastructure), the vast majority of IPv4 routes within the world routing desk are lined by Route Origin Authorizations (ROAs), in line with the NIST RPKI Monitor. IPv6 crossed this milestone late final yr.

Blog post by BGP consultants Doug Madory of Kentik and Job Snijders of Fastly

What’s BGP hijacking?

In a BGP hijacking assault, adversaries manipulate BGP routing tables to have a compromised router promote prefixes that haven’t been assigned to it. If these false ads point out that a greater path is accessible than the reputable path, visitors could also be directed that manner—solely the trail results in malicious servers that would steal credentials, obtain malware, and execute different damaging actions. And all of the whereas finish customers suppose they’re visiting reputable websites.

A high-profile case of BGP hijacking occurred in 2018 when a Russian ISP falsely introduced a lot of IP prefixes that really belonged to a bunch of Amazon DNS servers. Customers trying to login to a cryptocurrency website have been redirected to a counterfeit website the place hackers have been in a position to steal about $152,000 in cryptocurrency.

In one other well-documented incident, Pakistan Telecom, in its position as an ISP, tried in 2008 to censor YouTube by promoting its personal BGP routes to the location so customers trying to succeed in it could be blocked. Nevertheless, the brand new routes have been additionally introduced to the ISP’s upstream suppliers, which then acquired broadcast to the remainder of the Web. Consequently, Net requests for YouTube have been directed to Pakistan Telecom, which not solely resulted in a large outage for the location and but additionally overwhelmed the ISP.

See also  Fix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its own, researchers find

Source link

TAGGED: BGP, border, gateway, protocol, Work
Share This Article
Twitter Email Copy Link Print
Previous Article OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands
Next Article Passive two-phase liquid cooling in a data center Unlocking the Potential of Passive Two-Phase Liquid Cooling | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Why people are the key to successful cloud migration

As European corporations wrestle to grasp the complete worth of their cloud investments, we as…

March 24, 2025

From deepfakes to digital candidates: AI’s political play

AI is more and more getting used to symbolize, or misrepresent, the opinions of historic…

February 25, 2024

Mozart AI Raises £530K in Pre-Seed Funding

Mozart AI Cofounders Mozart AI, a London, UK-based music AI startup, raised £530K in Pre-Seed…

July 1, 2025

The UK data centre power debate has a queue problem

There are quite a lot of issues that the information centre business within the UK…

April 1, 2026

51 seconds to breach: Killing cyberattacks before they spread

Be part of our day by day and weekly newsletters for the newest updates and…

March 16, 2025

You Might Also Like

Large AWS sign. Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms - Las Vegas, Nevada, USA - December 3, 2019
Global Market

AI demand is so high, AWS customers are trying to buy out its entire capacity

By saad
Why sovereignty now shapes data centre planning in Europe
Global Market

Why sovereignty now shapes data centre planning in Europe

By saad
Heat emission from the chimneys of a large data and server complex.
Global Market

OpenAI puts part of Stargate project on hold over runaway power costs

By saad
EMEA data centre vacancy hits record low as AI demand outpaces supply
Global Market

EMEA data centre vacancy hits record low as AI demand outpaces supply

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.