FINDING · EVALUATION

The RAD attack requires converting a large number of Chinese edge ASes into transit ASes: placing decoys in 2% of global ASes (random-no-ring-1, China-World scenario) forces 59 edge ASes to become transit ASes, nearly doubling China's 30 existing transit ASes. One Chinese transit AS must carry approximately 122× its normal load; the abstract reports a peak of 2,800× in a more aggressive scenario, a threshold the paper considers operationally infeasible.

From 2014-houmansadr-noNo Direction Home: The True Cost of Routing Around Decoys · §VII-D · 2014 · Network and Distributed System Security

Implications

Tags

censors
cn
techniques
bgp-hijack
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.