Figure B2.
Diagram showing a region of connected ISPs (marked using the letter M, with directly connected customers marked using the letters A through L). Customer J sending traffic to customer B. It shows how traffic from L to J might be hijacked by X, which is a customer of K, which in turn is a provider to K.

An illustration of how protection depends on how customers connect to the Routing Trust Zone. Customer L receives two routes for J’s prefix, a VERIFIED route via M|$_{6}$| and an (unverified) hijacked route from X via K. If L does not prefer the VERIFIED route via M|$_{6}$| (L M|$_{6}$| M|$_{5}$| J), L may select the hijacked route (L K X J) because it has the same AS path length.

Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close