
ARTEMIS: Targets BGP Hijacks
Image Credit: BGP Stream. Image is the graphical representation of the in-process BGP redirection attack emanating and under the control of the People’s Republic of China on 2018/12/28.
via Jeff Stone writing at Cyberscoop, comes this fascinating reportage, detailing an open-source based effort targeting BGP hijack exploits monikered ARTEMIS (Automatic and Real-Time Detection and Mitigation System, ARTEMIS – a research effort of the INSPIRE group, FORTH Greece (www.inspire.edu.gr) and the Center for Applied Internet Data Analysis (CAIDA), University of California San Diego, USA). Examine, if you will – the ARTEMIS ReadMe on the ARTEMIS group’s GitHub site.
And, while your at it, read the projects’ paper authored by Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, and Alberto Dainotti. Entitled “ARTEMIS: Neutralizing BGP Hijacking within a Minute“, it will astound you with the technical chops this team possesses.
H/T
- USENIX Security ’22 – Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster – ‘How and Why People Use Virtual Private Networks’
- Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’
- USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’
*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2019/1/2/open-source-software-targets-bgp-hijack-exploits