Sunday, 22 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > BGP: What is border gateway protocol, and how does it work?
Global Market

BGP: What is border gateway protocol, and how does it work?

Last updated: May 17, 2024 11:26 pm
Published May 17, 2024
Share
Japan Osaka highway intersection street aerial interchange
SHARE

As of at the moment, Could 1, 2024, web routing safety handed an essential milestone. For the primary time within the historical past of RPKI (Useful resource Public Key Infrastructure), the vast majority of IPv4 routes within the world routing desk are lined by Route Origin Authorizations (ROAs), in line with the NIST RPKI Monitor. IPv6 crossed this milestone late final yr.

Blog post by BGP consultants Doug Madory of Kentik and Job Snijders of Fastly

What’s BGP hijacking?

In a BGP hijacking assault, adversaries manipulate BGP routing tables to have a compromised router promote prefixes that haven’t been assigned to it. If these false ads point out that a greater path is accessible than the reputable path, visitors could also be directed that manner—solely the trail results in malicious servers that would steal credentials, obtain malware, and execute different damaging actions. And all of the whereas finish customers suppose they’re visiting reputable websites.

A high-profile case of BGP hijacking occurred in 2018 when a Russian ISP falsely introduced a lot of IP prefixes that really belonged to a bunch of Amazon DNS servers. Customers trying to login to a cryptocurrency website have been redirected to a counterfeit website the place hackers have been in a position to steal about $152,000 in cryptocurrency.

In one other well-documented incident, Pakistan Telecom, in its position as an ISP, tried in 2008 to censor YouTube by promoting its personal BGP routes to the location so customers trying to succeed in it could be blocked. Nevertheless, the brand new routes have been additionally introduced to the ISP’s upstream suppliers, which then acquired broadcast to the remainder of the Web. Consequently, Net requests for YouTube have been directed to Pakistan Telecom, which not solely resulted in a large outage for the location and but additionally overwhelmed the ISP.

See also  Cisco in 2025: Lots of hard work ahead

Source link

TAGGED: BGP, border, gateway, protocol, Work
Share This Article
Twitter Email Copy Link Print
Previous Article OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands
Next Article Passive two-phase liquid cooling in a data center Unlocking the Potential of Passive Two-Phase Liquid Cooling | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Fluent Labs Raises $8M in Funding

Fluent Labs, a Dover, DE-based blended execution community, raised $8M in funding. The spherical was…

February 20, 2025

BrainChip, Frontgrade Gaisler forge alliance on space-grade AI-enabled microprocessors

BrainChip Holdings, a neuromorphic computing machine supplier, and Frontgrade Gaisler, a system-on-chip options supplier, have…

May 10, 2024

Oracle has a better generative AI strategy, analysts say

Oracle’s recent updates to its OCI Generative AI Service, which competes with similar services from…

January 30, 2024

Chinese cyberspies target VMware vSphere for long-term persistence

Designed to work in virtualized environments The CISA, NSA, and Canadian Cyber Middle analysts be…

December 6, 2025

Industry leaders back open-source AI definition

The Open Source Initiative (OSI) has unveiled a definition framework to guage whether or not…

October 29, 2024

You Might Also Like

Cloud Security Concept: Businessman uses tablet on Secure Global Networking, Data Encryption, Firewall Protection, Continuous Monitoring, to Develop Smart Solutions from Digital Technology.
Global Market

Versa extends SASE platform with Inbound SSE and Secure Enterprise Browser

By saad
Nvidia space data center
Global Market

Nvidia joins push for data centers in space

By saad
The European Commission headquarters in Brussels (8)
Global Market

Beware hyperscalers’ ‘sovereignty washing,’ Euro cloud operators tell EU

By saad
Schneider Electric, NVIDIA and AVEVA unveil AI data centre design tools
Global Market

Schneider Electric, NVIDIA and AVEVA unveil AI data centre design tools

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.