{"id":28369,"date":"2024-12-16T15:02:33","date_gmt":"2024-12-16T15:02:33","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28369"},"modified":"2024-12-16T15:06:51","modified_gmt":"2024-12-16T15:06:51","slug":"traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/","title":{"rendered":"Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself"},"content":{"rendered":"\n<p>Internet exchange points (IXPs) play a key role in the interconnection of autonomous networks, allowing different Internet service providers (ISPs) to exchange traffic efficiently.<\/p>\n\n\n\n<p>Like any critical infrastructure, ISPs are vulnerable to malicious attacks. One such threat is traffic abuse. During LACNIC 42 LACNOG 2024, Douglas Fischer gave a presentation on the strategies <a href=\"https:\/\/www.youtube.com\/watch?v=8dSUf2KeMYg\" target=\"_blank\" rel=\"noreferrer noopener\">IXPs can adopt to protect themselves from abusive traffic<\/a>.<\/p>\n\n\n\n<p><strong>Internet Exchange Points<\/strong><strong>.<\/strong> IXPs are a physical infrastructure that connects multiple networks, allowing them to exchange traffic directly. This reduces dependence on transit providers, improving performance and reducing operating costs. Think of it as a major intersection where different highways converge to optimize the flow of vehicles or, in this case, data packets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"628\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-1024x628.png\" alt=\"\" class=\"wp-image-28366\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-1024x628.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-300x184.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-538x330.png 538w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-768x471.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024-1536x941.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/fig1-abuso-de-trafico-en-ixp-2024.png 1560w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28369\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/ix-br-promotes-the-use-of-segment-routing-v6-vpn\/\">IX.br Promotes the Use of Segment Routing v6 VPN<\/a><\/div><\/div><\/section>\n\n\n<p><strong>How does the abuse occur? <\/strong>Traffic abuse occurs at an IXP when a network maliciously uses interconnection facilities to transfer traffic to third parties. This can overload the networks that are part of the IXP, generating additional costs and negative impacts on their operations.<\/p>\n\n\n\n<p>Fischer presented some examples, <strong>calling one of them<\/strong> a \u201crecipe for mischief\u201d.The\u2018Sun of a Beach\u2019 network advertises its routes through the servers of an IXP, to member networks such as \u2018Juice Net\u2019 and \u2018Coffee Net\u2019. These routes are accepted and installed in the member networks\u2019 Forwarding Information Base (FIB).<\/p>\n\n\n\n<p>A Sun of a Beach Net router located in Buenos Aires receives packets destined for Asunci\u00f3n and learns the corresponding routes using iBGP.<\/p>\n\n\n\n<p>This router manipulates the routing policy and changes the packets\u2019 next-hop, redirecting them to the LAN of the IXP belonging to Juice Net and Coffee Net. As a result, traffic is offloaded onto the member networks, thus overloading their resources.<\/p>\n\n\n\n<p>This form of abuse reflects a strategy where traffic is maintained on the network to a point that is further away or until it is delivered incorrectly.<\/p>\n\n\n\n<p><strong>How to protect yourself. <\/strong>According to Fischer, preventing these practices requires monitoring and controlling network traffic. He then explained some basic measures:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Continuous monitoring<\/strong>: Using tools such as NetFlow, IPFIX or sFlow to collect detailed data about traffic, and analyze this information to identify anomalous patterns that might be a sign of abuse.<\/li>\n\n\n\n<li><strong>Implementing control policies: <\/strong>His suggestion is to filter unwanted routes on route servers and establish clear policies to accept or reject route advertisements. As for the data, Fischer recommends the use of filtering policies (ACLs) to block malicious traffic. In this sense, he suggests implementing FlowSpec to quickly respond to attacks based on traffic patterns. He also suggests adopting QoS policy propagation through BGP or destination class policies to mitigate the impact of unwanted traffic.<\/li>\n\n\n\n<li><strong>Transparency and collaboration:<\/strong> In Fischer\u2019s opinion, it is essential to collaborate with other IXP members to define and apply best security practices. It is also important to report malicious behavior to IXP administrators and actively contribute to impact mitigation.<\/li>\n<\/ol>\n\n\n\n<p>In summary, traffic abuse at IXPs is a challenge that can compromise the stability of member networks and overload valuable resources. A proactive approach, including rigorous monitoring and effective controls, is crucial to preventing such practices.<\/p>\n\n\n\n<p>Click <a href=\"https:\/\/apievt.lacnic.net\/wp-content\/uploads\/2024\/10\/abuso-de-trafico-en-los-ixp-como-sucede-y-como-protegerse-douglas-fischer-lacnic42.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a> to read the presentation.<\/p>\n\n\n\n<p>Click <a href=\"https:\/\/youtu.be\/8dSUf2KeMYg?si=ncKBsU4B275XBW7s&amp;t=1819\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a> to watch the video.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Sesio\u0301n IXP\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/8dSUf2KeMYg?start=1819&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Internet exchange points (IXPs) play a key role in the interconnection of autonomous networks, allowing different Internet service providers (ISPs) to exchange traffic efficiently. Like any critical infrastructure, ISPs are vulnerable to malicious attacks. One such threat is traffic abuse. During LACNIC 42 LACNOG 2024, Douglas Fischer gave a presentation on the strategies IXPs can [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28360,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1327],"tags":[1292],"archivo":[1345,1451],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-28369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interconnection","tag-interconnection","archivo-editions","archivo-highlights-2023"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Internet exchange points (IXPs) play a key role in the interconnection of autonomous networks, allowing different Internet service providers (ISPs) to exchange traffic efficiently. Like any critical infrastructure, ISPs are vulnerable to malicious attacks. One such threat is traffic abuse. During LACNIC 42 LACNOG 2024, Douglas Fischer gave a presentation on the strategies IXPs can [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T15:02:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T15:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself\",\"datePublished\":\"2024-12-16T15:02:33+00:00\",\"dateModified\":\"2024-12-16T15:06:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\"},\"wordCount\":546,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png\",\"keywords\":[\"Interconnection\"],\"articleSection\":[\"Interconnection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\",\"name\":\"LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png\",\"datePublished\":\"2024-12-16T15:02:33+00:00\",\"dateModified\":\"2024-12-16T15:06:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself","og_description":"Internet exchange points (IXPs) play a key role in the interconnection of autonomous networks, allowing different Internet service providers (ISPs) to exchange traffic efficiently. Like any critical infrastructure, ISPs are vulnerable to malicious attacks. One such threat is traffic abuse. During LACNIC 42 LACNOG 2024, Douglas Fischer gave a presentation on the strategies IXPs can [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-12-16T15:02:33+00:00","article_modified_time":"2024-12-16T15:06:51+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself","datePublished":"2024-12-16T15:02:33+00:00","dateModified":"2024-12-16T15:06:51+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/"},"wordCount":546,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","keywords":["Interconnection"],"articleSection":["Interconnection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/","url":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/","name":"LACNIC Blog | Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","datePublished":"2024-12-16T15:02:33+00:00","dateModified":"2024-12-16T15:06:51+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/traffic-abuse-at-an-ixp-how-it-happens-and-how-you-can-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Traffic Abuse at an IXP: How It Happens and How You Can Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/12\/abuso-de-trafico-en-ixp-proteccion-y-ciberseguridad.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28357,"post_title":"Abuso de tr\u00e1fico en un IXP: c\u00f3mo sucede y c\u00f3mo protegerse","slug":"abuso-de-trafico-en-un-ixp-como-sucede-y-como-protegerse","href":"https:\/\/blog.lacnic.net\/abuso-de-trafico-en-un-ixp-como-sucede-y-como-protegerse\/"},{"locale":"pt_BR","id":28372,"post_title":"Abuso de tr\u00e1fego em um IXP: como acontece e como se proteger","slug":"abuso-de-trafego-em-um-ixp-como-acontece-e-como-se-proteger","href":"https:\/\/blog.lacnic.net\/pt-br\/abuso-de-trafego-em-um-ixp-como-acontece-e-como-se-proteger\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28369"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28369\/revisions"}],"predecessor-version":[{"id":28380,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28369\/revisions\/28380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28360"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28369"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28369"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28369"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}