Yujing Liu, Wei Peng and Jinshu Su A study of IP prefix hijacking in cloud computing networks Security and Communication Networks 7
We model the IP prefix hijacking as an attack planning task and solve it by a genetic algorithm. We find that victim plays a more important role than attacker great impact can be gained even when a small number of victims are hijacked and the degree of an autonomous system is a major criterion to be considered for attack planning. These findings are useful for securing cloud computing networks by preventing and eliminating this type of attack.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf