Internet Exchange Points (IXPs) are crucial components of the Internet ecosystem, enabling efficient interconnection among Autonomous Systems (ASes). Their operation relies on Route Servers (RSes), which simplify public peering by allowing ASes to maintain a single Border Gateway Protocol (BGP) session rather than multiple bilateral ones. However, BGP's reliance on implicit trust exposes it to vulnerabilities that can be exploited to hijack or disrupt traffic. To mitigate these risks, IXPs deploy filtering mechanisms based on Internet Routing Registries (IRRs) and the Resource Public Key Infrastructure (RPKI). Current practices exhibit a critical blind spot: IRR-based filtering heavily relies on AS-SET objects, failing to bind IP prefixes to their legitimate AS, allowing hijacks to evade detection. In this work, we formally define and analyze this vulnerability, showing how it can be exploited to perform prefix hijacking via IXPs. We quantify its prevalence across the EURO-IX community and validate our findings using real-world data from the RSes of two major European IXPs, AMS-IX and NAMEX. Finally, we propose practical countermeasures to strengthen RS filtering.

Exploring the Blind Spot of Internet Exchange Point Route Servers / Servillo, Stefano; Spadaccino, Pietro; Konstantaras, Stavros; Luciani, Flavio; Cuomo, Francesca. - (2026). ( IEEE/IFIP Network Operations and Management Symposium 2026 Roma, Italy ).

Exploring the Blind Spot of Internet Exchange Point Route Servers

Stefano Servillo
;
Pietro Spadaccino;Francesca Cuomo
2026

Abstract

Internet Exchange Points (IXPs) are crucial components of the Internet ecosystem, enabling efficient interconnection among Autonomous Systems (ASes). Their operation relies on Route Servers (RSes), which simplify public peering by allowing ASes to maintain a single Border Gateway Protocol (BGP) session rather than multiple bilateral ones. However, BGP's reliance on implicit trust exposes it to vulnerabilities that can be exploited to hijack or disrupt traffic. To mitigate these risks, IXPs deploy filtering mechanisms based on Internet Routing Registries (IRRs) and the Resource Public Key Infrastructure (RPKI). Current practices exhibit a critical blind spot: IRR-based filtering heavily relies on AS-SET objects, failing to bind IP prefixes to their legitimate AS, allowing hijacks to evade detection. In this work, we formally define and analyze this vulnerability, showing how it can be exploited to perform prefix hijacking via IXPs. We quantify its prevalence across the EURO-IX community and validate our findings using real-world data from the RSes of two major European IXPs, AMS-IX and NAMEX. Finally, we propose practical countermeasures to strengthen RS filtering.
2026
IEEE/IFIP Network Operations and Management Symposium 2026
BGP, Routing security, IXPs, AS-SET
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Exploring the Blind Spot of Internet Exchange Point Route Servers / Servillo, Stefano; Spadaccino, Pietro; Konstantaras, Stavros; Luciani, Flavio; Cuomo, Francesca. - (2026). ( IEEE/IFIP Network Operations and Management Symposium 2026 Roma, Italy ).
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1767056
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact