Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself

December 16, 2024

Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself
Designed by Freepik

Internet exchange points (IXPs) play a key role in the interconnection of autonomous networks, allowing different Internet service providers (ISPs) to exchange traffic efficiently.

Like any critical infrastructure, ISPs are vulnerable to malicious attacks. One such threat is traffic abuse. During LACNIC 42 LACNOG 2024, Douglas Fischer gave a presentation on the strategies IXPs can adopt to protect themselves from abusive traffic.

Internet Exchange Points. IXPs are a physical infrastructure that connects multiple networks, allowing them to exchange traffic directly. This reduces dependence on transit providers, improving performance and reducing operating costs. Think of it as a major intersection where different highways converge to optimize the flow of vehicles or, in this case, data packets.

Additional reading:

How does the abuse occur? Traffic abuse occurs at an IXP when a network maliciously uses interconnection facilities to transfer traffic to third parties. This can overload the networks that are part of the IXP, generating additional costs and negative impacts on their operations.

(Free access, no subscription required)

Fischer presented some examples, calling one of them a “recipe for mischief”.The‘Sun of a Beach’ network advertises its routes through the servers of an IXP, to member networks such as ‘Juice Net’ and ‘Coffee Net’. These routes are accepted and installed in the member networks’ Forwarding Information Base (FIB).

A Sun of a Beach Net router located in Buenos Aires receives packets destined for Asunción and learns the corresponding routes using iBGP.

This router manipulates the routing policy and changes the packets’ next-hop, redirecting them to the LAN of the IXP belonging to Juice Net and Coffee Net. As a result, traffic is offloaded onto the member networks, thus overloading their resources.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments