LogicMonitor + Catchpoint: Enter the New Era of Autonomous IT

Learn more

Detect BGP anomalies before attackers exploit them.

LogicMonitor’s network monitoring capabilities provide real-time visibility into routing changes and anomalies, helping your team detect unauthorized prefix announcements and act before traffic is redirecte

What is BGP hijacking?

 BGP hijacking (also called prefix hijacking or route hijacking) occurs when an autonomous system (AS) illegitimately announces IP prefixes that belong to another organization. Because BGP routers accept route announcements from peers without verifying ownership, other ASes propagate the fraudulent route globally. This can redirect internet traffic away from legitimate destinations, enabling eavesdropping, traffic interception, or service disruption.

What is the difference between BGP hijacking and a route leak?

Both involve incorrect route propagation, but for different reasons. A route leak is typically accidental, an AS propagates routes it received from one peer to another peer without intending to, violating routing policy. A BGP hijack is deliberate, with an AS fraudulently claiming to be the origin of prefixes it doesn’t own. Route leaks can also be exploited maliciously, but the distinction lies in intent and mechanism.

How does RPKI prevent BGP hijacking?

RPKI (Resource Public Key Infrastructure) allows IP address holders to cryptographically sign Route Origin Authorizations (ROAs) that specify which AS is authorized to announce a given prefix. BGP routers with RPKI validation enabled can check incoming route announcements against the ROA database and reject routes that fail validation (invalid origin AS or prefix length). RPKI doesn’t eliminate all hijacking scenarios but significantly raises the bar for fraudulent announcements.

How can I monitor for BGP hijacking of my own prefixes?

The most effective approach is to monitor your own prefixes from multiple external BGP vantage points, not just your own routers. Public data sources like RIPE NCC’s Routing Information Service (RIS) and RouteViews provide BGP data from hundreds of global peers. You should alert on any unexpected origin AS announcing your prefixes, unexpected AS_PATH changes, or more-specific (sub-prefix) announcements of your address space from ASes you don’t control.