Sunday, 1 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > BGP: What is border gateway protocol, and how does it work?
Global Market

BGP: What is border gateway protocol, and how does it work?

Last updated: May 17, 2024 11:26 pm
Published May 17, 2024
Share
Japan Osaka highway intersection street aerial interchange
SHARE

As of at the moment, Could 1, 2024, web routing safety handed an essential milestone. For the primary time within the historical past of RPKI (Useful resource Public Key Infrastructure), the vast majority of IPv4 routes within the world routing desk are lined by Route Origin Authorizations (ROAs), in line with the NIST RPKI Monitor. IPv6 crossed this milestone late final yr.

Blog post by BGP consultants Doug Madory of Kentik and Job Snijders of Fastly

What’s BGP hijacking?

In a BGP hijacking assault, adversaries manipulate BGP routing tables to have a compromised router promote prefixes that haven’t been assigned to it. If these false ads point out that a greater path is accessible than the reputable path, visitors could also be directed that manner—solely the trail results in malicious servers that would steal credentials, obtain malware, and execute different damaging actions. And all of the whereas finish customers suppose they’re visiting reputable websites.

A high-profile case of BGP hijacking occurred in 2018 when a Russian ISP falsely introduced a lot of IP prefixes that really belonged to a bunch of Amazon DNS servers. Customers trying to login to a cryptocurrency website have been redirected to a counterfeit website the place hackers have been in a position to steal about $152,000 in cryptocurrency.

In one other well-documented incident, Pakistan Telecom, in its position as an ISP, tried in 2008 to censor YouTube by promoting its personal BGP routes to the location so customers trying to succeed in it could be blocked. Nevertheless, the brand new routes have been additionally introduced to the ISP’s upstream suppliers, which then acquired broadcast to the remainder of the Web. Consequently, Net requests for YouTube have been directed to Pakistan Telecom, which not solely resulted in a large outage for the location and but additionally overwhelmed the ISP.

See also  Enterprise-ready private 5G joins Wi-Fi in prime time

Source link

TAGGED: BGP, border, gateway, protocol, Work
Share This Article
Twitter Email Copy Link Print
Previous Article OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands OnLogic opens new global HQ in South Burlington, Vermont amid rising IoT edge demands
Next Article Passive two-phase liquid cooling in a data center Unlocking the Potential of Passive Two-Phase Liquid Cooling | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Shortlist announced for ER & DCR Excellence Awards 2024

The shortlist for the Electrical Evaluate & Knowledge Centre Evaluate Excellence Awards 2024 is now…

March 16, 2024

SAEKI Raises $6.7M in Funding

Saeki, a Zurich, Switzerland-based manufacturing automation firm, raised $6.7M in Funding. The spherical was led…

February 5, 2025

FCC post-mortem on AT&T outage uncovers similar QA issues to those that plagued CrowdStrike

Mitigation and suggestions In mild of the incident, AT&T has taken “quite a few steps”…

July 24, 2024

Gas furnaces to be phased out under new Maryland executive order

Gov. Wes Moore mentioned the motion is probably the most sweeping environmental government order in…

June 4, 2024

OpenAI argues against ChatGPT data deletion in Indian court

OpenAI has argued in an Indian court docket that eradicating the coaching knowledge behind ChatGPT…

January 23, 2025

You Might Also Like

shutterstock 440449237 gush of water from a fountain
Global Market

Raising the temp on liquid cooling

By saad
Close-up cropped view portrait of his he nice attractive skilled professional smart focused guy monitoring client
Global Market

New Relic connects observability platform to business outcomes

By saad
Data center / enterprise networking
Global Market

HPE’s latest Juniper routers target large‑scale AI fabrics

By saad
Panoramic high speed technology in big city concept, light abstract background.
Global Market

Netskope targets AI-driven network bottlenecks with AI Fast Path

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.