[193573] in North American Network Operators' Group
Re: BGP IP prefix hijacking
daemon@ATHENA.MIT.EDU (Carlos M. Martinez)
Mon Feb  6 11:14:19 2017
X-Original-To: nanog@nanog.org
From: "Carlos M. Martinez" <carlosm3011@gmail.com>
To: "Nagarjun Govindraj" <nagarjun.govindraj@imaginea.com>
Date: Mon, 06 Feb 2017 12:17:20 -0200
In-Reply-To: <CAESotaGfy2jqV63z0zVAKfVSicgaGhiqAjaWVULwjn3=U1euJw@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
We use a mix of BGPMon and RPKI+RIPE Validator.
On 30 Jan 2017, at 4:41, Nagarjun Govindraj via NANOG wrote:
> Hi All,
>
> I am planning to write a tool to detect real time BGP IP prefix hijacking.
> I am glad to know some of the open problems faced by
> providers/companies/community.
> I would like to know how the community is currently dealing and mitigating
> with such problems.
> It will be very helpful to know some of the adopted strategies by the
> community to detect bgp IP prefix hijacking and problems that are yet to be
> solved.
> Also I would like to know some of the very well industry standard open
> source tools used in the area of BGP which makes life easier.
>
> Regards,
> Nagarjun