Border Gateway Protocol (BGP and MP-BGP)

Beneath the surface of the internet lies a vast, ancient root system: the Border Gateway Protocol (BGP). It is the global postal service for digital traffic, the mapmaker that guides your data across the independent networks that make up the web.

When your request leaves your local network and journeys across the world, BGP takes over. But it is not searching for the shortest path; it’s navigating a complex world of handshake deals and business relationships, finding the most acceptable route. Each network announces to its neighbours, “I know how to reach these destinations,” and trust is extended based on private agreements.

This critical system, which also charts the vast new frontiers of IPv6, was built on a foundation of trust, not strong security. This inherent vulnerability means a simple misconfiguration or malicious lie can cause entire continents of data to briefly flow down the wrong path, hijacked. Whilst digital guards like RPKI are now standing watch, the silent, relentless work of BGP remains a testament to both co-operation and fragility.

Disclaimer

An attack tree is structural, not operational. It exists in the comfortable world of pure logic, where things either work or they don’t, gates either open or stay closed, and time is merely a dimension I/you/we draw an arrow along.

It’s comprehensive. It has branches for sub-prefix hijacking, exact-prefix hijacking, squatting attacks, path manipulation, and several dozen other variations. Each node connects logically to its children. The structure is clean.

Until someone takes a tree seriously enough to ask but what would this actually *look* like?