{"id":"https://openalex.org/W4387870207","doi":"https://doi.org/10.1109/icc45041.2023.10278923","title":"Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors","display_name":"Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387870207","doi":"https://doi.org/10.1109/icc45041.2023.10278923"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10278923","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icc45041.2023.10278923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100950994","display_name":"Jun He","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun He","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108049613","display_name":"Yahui Li","orcid":"https://orcid.org/0000-0002-2376-7533"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yahui Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100399382","display_name":"Han Zhang","orcid":"https://orcid.org/0000-0003-4429-9959"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Zhang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432545","display_name":"Ming Wang","orcid":"https://orcid.org/0000-0001-8406-5677"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102860856","display_name":"Changqing An","orcid":"https://orcid.org/0000-0002-2299-0135"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqing An","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100660344","display_name":"Jilong Wang","orcid":"https://orcid.org/0000-0002-4493-5145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilong Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","Zhongguancun Laboratory, Beijing, China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100950994"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.1716,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57628728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"9","issue":null,"first_page":"3774","last_page":"3780"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.9438579678535461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636368274688721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7190438508987427},{"id":"https://openalex.org/keywords/invisibility","display_name":"Invisibility","score":0.6071803569793701},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5716554522514343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46074047684669495},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1215730607509613}],"concepts":[{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.9438579678535461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636368274688721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7190438508987427},{"id":"https://openalex.org/C50962388","wikidata":"https://www.wikidata.org/wiki/Q762018","display_name":"Invisibility","level":2,"score":0.6071803569793701},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5716554522514343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46074047684669495},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1215730607509613},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45041.2023.10278923","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icc45041.2023.10278923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G6422216772","display_name":null,"funder_award_id":"62102020,62002009","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1811828243","https://openalex.org/W2058200382","https://openalex.org/W2069222612","https://openalex.org/W2100415265","https://openalex.org/W2103117727","https://openalex.org/W2163545003","https://openalex.org/W2287088142","https://openalex.org/W2304754665","https://openalex.org/W2344605718","https://openalex.org/W2479991052","https://openalex.org/W2525730961","https://openalex.org/W2613487677","https://openalex.org/W2770123644","https://openalex.org/W2895447227","https://openalex.org/W2951314400","https://openalex.org/W2983253154","https://openalex.org/W3094603159","https://openalex.org/W3122633980","https://openalex.org/W3137017580","https://openalex.org/W3137610952","https://openalex.org/W3162417966","https://openalex.org/W3163362950","https://openalex.org/W4210648628","https://openalex.org/W4225935529","https://openalex.org/W4255131925","https://openalex.org/W6638037704","https://openalex.org/W6781913825","https://openalex.org/W6810332018","https://openalex.org/W6997009155"],"related_works":["https://openalex.org/W2127066923","https://openalex.org/W429496918","https://openalex.org/W2947309736","https://openalex.org/W4221056335","https://openalex.org/W2151242554","https://openalex.org/W2736876455","https://openalex.org/W2384571902","https://openalex.org/W2147717192","https://openalex.org/W2990661636","https://openalex.org/W2795555331"],"abstract_inverted_index":{"Prefix":[0],"hijackings":[1,21],"have":[2,12],"always":[3],"been":[4],"a":[5,23],"significant":[6],"security":[7],"issue":[8],"in":[9,16],"BGP":[10,55],"and":[11,58,106,127],"continued":[13],"to":[14,62,80,123],"occur":[15],"recent":[17],"years.":[18],"Detecting":[19],"prefix":[20],"is":[22],"vital":[24],"part":[25],"of":[26,41,66],"defending":[27],"against":[28,133],"them.":[29],"Most":[30],"detection":[31],"approaches":[32],"mainly":[33],"rely":[34],"on":[35],"the":[36,39,54,64,78,83,91,108,112],"feed":[37],"from":[38],"monitors":[40],"public":[42],"route":[43],"collector":[44],"infrastructures.":[45],"We":[46],"propose":[47,107,129],"an":[48,103],"injected":[49],"sub-prefix":[50,68],"hijacking":[51],"that":[52,99,118],"utilizes":[53],"communities":[56],"attribute":[57],"AS":[59],"path":[60],"poisoning":[61],"control":[63],"propagation":[65],"invalid":[67],"routes.":[69],"This":[70],"attack":[71,101,126],"only":[72],"pollutes":[73],"neighboring":[74],"ASes,":[75],"thus":[76],"guaranteeing":[77],"invisibility":[79],"monitors.":[81],"Then":[82],"attacker":[84],"can":[85],"stealthily":[86],"hijack":[87],"traffic":[88],"passing":[89],"through":[90],"polluted":[92],"ASes.":[93],"Through":[94],"extensive":[95],"simulations,":[96],"we":[97,116],"show":[98],"this":[100,125],"has":[102],"enormous":[104],"impact":[105],"crucial":[109],"indicator":[110],"affecting":[111],"attacker's":[113],"capability.":[114],"Finally,":[115],"demonstrate":[117],"existing":[119],"defenses":[120],"are":[121],"difficult":[122],"handle":[124],"then":[128],"several":[130],"defense":[131],"strategies":[132],"it.":[134]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
