FINDING · DEFENSE

If China attempts the Routing-Around-Decoys (RAD) attack by blackholing paths that transit the 30 key ASes, 92.25% of all paths transiting Chinese ASes (306,874 of 332,742) originate at ASes outside China, making such filtering self-defeating through severe collateral damage to foreign transit customers. The 30 key ASes cover 98.8% of paths from Chinese ASes to globally popular destinations and at least 80% for nearly all adversary countries studied.

From 2017-gosain-devil-sThe Devil's in The Details: Placing Decoy Routers in the Internet · §6.2, Figure 7, Figure 9 · 2017 · ACSAC

Implications

Tags

censors
cn
techniques
asn-blackholing
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.