{"id":24783,"date":"2024-03-04T12:54:57","date_gmt":"2024-03-04T12:54:57","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=24783"},"modified":"2024-03-04T13:09:37","modified_gmt":"2024-03-04T13:09:37","slug":"bgp-stream-an-analysis-of-one-year-of-bgp-incidents","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/","title":{"rendered":"BGP Stream: An Analysis of One Year of BGP Incidents"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/alejandro-acosta\">Alejandro Acosta<\/a>, R&amp;D Coordinator at LACNIC<\/p>\n\n\n\n<p>LACNIC presents <a href=\"https:\/\/stats.labs.lacnic.net\/BGP\/bgpstream-lac-region.html\" target=\"_blank\" rel=\"noreferrer noopener\">the first webpage<\/a> designed to show incidents and an analysis of Border Gateway Protocol (BGP) measurement data in Latin America and the Caribbean.<\/p>\n\n\n\n<p><strong>MAIN INCIDENTS. <\/strong>In addition to a summary of the information, the page shows three main types of events: possible network hijacks, BGP outages, and route leaks.<\/p>\n\n\n\n<p><strong>Possible hijacks<\/strong> refers to the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. This typically occurs when an Autonomous System announces a prefix that it does not originate.<\/p>\n\n\n\n<p><strong>Outages<\/strong> refers to the loss of visibility of network prefixes by a majority group of sensors.<\/p>\n\n\n\n<p><strong>Route leaks<\/strong>, as the name suggests, refers to the \u2014potentially\u2014 unintentional announcement of a network prefix via BGP. For example, in a private peering traffic exchange, when one of the participants announces the peer&#8217;s prefix to the Internet. This case is the most difficult for algorithms to detect, so some of these incidents are not identified.<\/p>\n\n\n\n<p><strong>How is the data obtained?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>This initiative uses <a href=\"https:\/\/bgpstream.crosswork.cisco.com\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco BGP Stream<\/a>, an automated process that selects the largest and most important incidents, providing information on the nature of the event and the ASNs involved.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--24783\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/interconnection\/a-much-needed-bgp-rfc-as-path-prepending\">A Much-Needed BGP RFC: AS Path Prepending<\/a><\/div><\/div><\/section>\n\n\n<p>The information is openly published, as LACNIC believes that it is important for engineers, network administrators, and organizations to gain insights into the most common incidents in the region and raise awareness about the situation.<\/p>\n\n\n\n<p>This allows quickly investigating events, the rapid development of complex prototypes and tools, as well as large-scale monitoring applications (e.g., detecting connectivity outages, attacks, or BGP hijacks).<\/p>\n\n\n\n<p>Using a system developed by LACNIC&#8217;s R&amp;D department, raw data is collected, plotted, identified, cleaned, stored in a database, and later used to produce statistics and graphs. This occurs automatically every 24 hours.<\/p>\n\n\n\n<p><strong>RESULTS. <\/strong>During the study period \u2014February 2023 to February 2024\u2014 we found the results shown in the charts below, which compare BGP events worldwide vs BGP events in our region.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide-1024x506.png\" alt=\"\" class=\"wp-image-24768\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide-1024x506.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide-300x148.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide-768x379.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide-1536x759.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig1-bgp-events-worldwide.png 1842w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>A comparison between the global chart and the chart specific to the LAC region shows a similar pattern in the order of the most common incidents, with outages being the most frequent type of incident, followed by possible hijacks, and finally prefix leaks. It should also be noted that outages represent a higher percentage of the total number of incidents in our region than at the global level.<\/p>\n\n\n\n<p>An analysis of the results table showing worldwide BGP events vs BGP events in our region reveals the following:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"408\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-1024x408.png\" alt=\"\" class=\"wp-image-24771\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-1024x408.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-300x120.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-768x306.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-1536x612.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig2-bgp-events-worldwide-2048x816.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>TOP 5 countries<\/strong> in our region with the highest number of BGP outages<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Outages<\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>CC<\/strong><strong><\/strong><\/td><td><strong>Events<\/strong><\/td><\/tr><tr><td>BR<\/td><td>781<\/td><\/tr><tr><td>AR<\/td><td>99<\/td><\/tr><tr><td>HT<\/td><td>24<\/td><\/tr><tr><td>MX<\/td><td>22<\/td><\/tr><tr><td>CL<\/td><td>17<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>TOP 5 countries<\/strong> in our region with the highest number of possible Hijacks<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Expected CC<\/strong><strong><\/strong><\/td><td><strong>Detected CC<\/strong><\/td><td><strong>Events<\/strong><\/td><\/tr><tr><td>BR<\/td><td>BR<\/td><td>67<\/td><\/tr><tr><td>BR<\/td><td>none<\/td><td>35<\/td><\/tr><tr><td>PY<\/td><td>BR<\/td><td>24<\/td><\/tr><tr><td>BR<\/td><td>US<\/td><td>22<\/td><\/tr><tr><td>BR<\/td><td>CN<\/td><td>9<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>TOP 3 countries<\/strong> in our region with the highest number of route leaks<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Origin CC<\/strong><strong><\/strong><\/td><td><strong>Leaker CC<\/strong><\/td><td><strong>Events<\/strong><\/td><\/tr><tr><td>VE<\/td><td>VE<\/td><td>7<\/td><\/tr><tr><td>MX<\/td><td>MX<\/td><td>5<\/td><\/tr><tr><td>CL<\/td><td>PA<\/td><td>2<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Impact<\/strong><strong><\/strong><\/p>\n\n\n\n<p>In this first year of operation, LACNIC has observed a reduction in BGP incidents. Several reasons for this have been identified, including a) the deployment and adoption of Resource Certification (RPKI), b) LACNIC&#8217;s Internet Routing Registry (IRR), and the adoption of RFC 9234 (Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"209\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-1024x209.png\" alt=\"\" class=\"wp-image-24774\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-1024x209.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-300x61.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-768x157.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-1536x313.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/fig3-bgp-events-worldwide-2048x417.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The adoption of these tools is being driven by better operator practices and ISOC&#8217;s promotion of MANRS.<\/p>\n\n\n\n<p><strong>Conclusions<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Possible hijacks, outages, and route leaks are the most common types of BGP incidents. During the initial year of data collection, a decrease in the number of cases was observed. However, it is expected that they will not disappear entirely in the near future. Implementing robust redundancy and resiliency measures in networks is crucial, as is the early detection and prevention of possible hijacks to ensure the integrity and reliability of Internet routes.<\/p>\n\n\n\n<p>At LACNIC, our goal is to raise awareness and encourage ISPs and organizations to be prepared to handle these incidents efficiently when they occur.<\/p>\n\n\n\n<p><strong>References<\/strong><strong><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/stats.labs.lacnic.net\/BGP\/bgpstream-lac-region.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/stats.labs.lacnic.net\/BGP\/bgpstream-lac-region.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/stats.labs.lacnic.net\/BGP\/bgpstream.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/stats.labs.lacnic.net\/BGP\/bgpstream.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/bgpstream.crosswork.cisco.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/bgpstream.crosswork.cisco.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Alejandro Acosta, R&amp;D Coordinator at LACNIC LACNIC presents the first webpage designed to show incidents and an analysis of Border Gateway Protocol (BGP) measurement data in Latin America and the Caribbean. MAIN INCIDENTS. In addition to a summary of the information, the page shows three main types of events: possible network hijacks, BGP outages, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":24785,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[919],"tags":[1280],"archivo":[1345,1451],"taxonomy-authors":[1248],"tipo_autor":[],"class_list":["post-24783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-routing","tag-routing","archivo-editions","archivo-highlights-2023","taxonomy-authors-alejandro-acosta-en"],"acf":{"author":"Alejandro Acosta, R&D Coordinator at LACNIC","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents\" \/>\n<meta property=\"og:description\" content=\"By Alejandro Acosta, R&amp;D Coordinator at LACNIC LACNIC presents the first webpage designed to show incidents and an analysis of Border Gateway Protocol (BGP) measurement data in Latin America and the Caribbean. MAIN INCIDENTS. In addition to a summary of the information, the page shows three main types of events: possible network hijacks, BGP outages, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-04T12:54:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T13:09:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"BGP Stream: An Analysis of One Year of BGP Incidents\",\"datePublished\":\"2024-03-04T12:54:57+00:00\",\"dateModified\":\"2024-03-04T13:09:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\"},\"wordCount\":688,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png\",\"keywords\":[\"Routing\"],\"articleSection\":[\"Routing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\",\"name\":\"LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png\",\"datePublished\":\"2024-03-04T12:54:57+00:00\",\"dateModified\":\"2024-03-04T13:09:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BGP Stream: An Analysis of One Year of BGP Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents","og_description":"By Alejandro Acosta, R&amp;D Coordinator at LACNIC LACNIC presents the first webpage designed to show incidents and an analysis of Border Gateway Protocol (BGP) measurement data in Latin America and the Caribbean. MAIN INCIDENTS. In addition to a summary of the information, the page shows three main types of events: possible network hijacks, BGP outages, [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-03-04T12:54:57+00:00","article_modified_time":"2024-03-04T13:09:37+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"BGP Stream: An Analysis of One Year of BGP Incidents","datePublished":"2024-03-04T12:54:57+00:00","dateModified":"2024-03-04T13:09:37+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/"},"wordCount":688,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","keywords":["Routing"],"articleSection":["Routing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/","url":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/","name":"LACNIC Blog | BGP Stream: An Analysis of One Year of BGP Incidents","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","datePublished":"2024-03-04T12:54:57+00:00","dateModified":"2024-03-04T13:09:37+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/bgp-stream-an-analysis-of-one-year-of-bgp-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"BGP Stream: An Analysis of One Year of BGP Incidents"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/03\/bgp-incidentes-por-ale-acosta-2024-en.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":24764,"post_title":"BGP Stream: un a\u00f1o de an\u00e1lisis sobre incidentes BGP","slug":"bgp-stream-un-ano-de-analisis-sobre-incidentes-bgp","href":"https:\/\/blog.lacnic.net\/bgp-stream-un-ano-de-analisis-sobre-incidentes-bgp\/"},{"locale":"pt_BR","id":24792,"post_title":"BGP Stream: um ano de an\u00e1lise sobre incidentes BGP","slug":"bgp-stream-um-ano-de-analise-sobre-incidentes-bgp","href":"https:\/\/blog.lacnic.net\/pt-br\/bgp-stream-um-ano-de-analise-sobre-incidentes-bgp\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=24783"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24783\/revisions"}],"predecessor-version":[{"id":24795,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24783\/revisions\/24795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/24785"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=24783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=24783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=24783"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=24783"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=24783"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=24783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}