amount of neutralization time in random attack sce-
narios is up to 5 times compared to multiple path
scenarios. This is because the number of neighbors
in the random attack scenario is greater than multi-
ple path scenarios. From the five adversarial prefixes
sent, the average number of attacks on the random
scenario reaches 10.08 attacks, compared to 4.52 at-
tacks received by BlockJack routers in multiple path
attack scenarios. If we take a sample of random attack
scenario with 50 routers, on average BlockJack needs
0.957 seconds to neutralize 12.04 attacks of five ex-
periment attempts. That record is equal to 0.08 sec-
onds to neutralize a single attack.
The standard deviation of prepending and neu-
tralization time is also seen constant in single path
and multiple path scenarios with an average range
of 8.2488 seconds to 11.6154 seconds for prepending
time and 0.0162 seconds to 0.0188 seconds for neu-
tralization time. While the average standard deviation
of prepending and neutralization time in the random
attack scenario was recorded at 20.3712 seconds and
0.8998 seconds, respectively.
4 RELATED WORK
The closest work to our research is the work proposed
by Sfirakis et al., (Sfirakis and Kotronis, 2019). In
the paper Sfirakis et al., introduced the concept of
a Blockchain-based prefix hijacking prevention us-
ing Bitcoin. The proposed system has been tested
in Quagga router software. However, this system re-
quired the AS owner to provide share coins for every
prefix authorization or prefix verification requests, as
the blockchain need miners to attach new blocks to
the blockchain.
5 CONCLUSION
Although the Prefix Authorization and Prefix Ver-
ification processes can ideally be handled in one
BGP Update message, several conditions will cause
a race condition between processes that occur on
the Blockchain and processes that occur in BGP. In
this paper we presented how Blockjack addresses this
specific issue. BlockJack also manages dynamic-
multiple hijacking scenarios due to changes in the
BGP attribute values which cause dynamic changes
in determining the best-valid path in the BGP routing
table.
ACKNOWLEDGEMENTS
The first Author is a Scholarship Awardee of the
Indonesian Endowment Fund for Education (LPDP)
of the Republic of Indonesia, with the LPDP ID
20193221014024. This research is partially funded
by the Optus Macquarie University Cyber Security
Hub.
REFERENCES
BGP-Potaroo (2020). Bgp analysis report-bgp table. https://
bgp.potaroo.net/index-bgp.html. BGP Table Data last
accessed 1 July 2020.
Chiodi, P. C. (2020). Quagga router software code
@github. https://github.com/pierky/dockerfiles/tree/
master/quagga. last accessed 1 July 2020.
Cooper, D., Heilman, E., Brogle, K., Reyzin, L., and Gold-
berg, S. (2013). On the risk of misbehaving rpki au-
thorities. In Proceedings of the Twelfth ACM Work-
shop on Hot Topics in Networks, HotNets-XII, New
York, NY, USA. Association for Computing Machin-
ery.
Geoff, H. (2020). Bgp in 2019 – the bgp table. https://blog.
apnic.net/2020/01/14/bgp-in-2019-the-bgp-table/.
Blog APNIC last accessed 1 Juli 2020.
Hope, A. (2020). Russian rostelecom compro-
mises internet traffic through bgp hijack-
ing. https://www.cpomagazine.com/cyber-
security/russian-rostelecom-compromises-internet-
traffic-through-bgp-hijacking. Accessed: 18/12/2020.
Iamartino, D., Pelsser, C., and Bush, R. (2015). Measur-
ing bgp route origin registration and validation. In
Mirkovic, J. and Liu, Y., editors, Passive and Active
Measurement, pages 28–40, Cham. Springer Interna-
tional Publishing.
Linux-Foundation (2020). Hyperledger fabric release
2.0. https://hyperledger-fabric.readthedocs.io/en/
release-2.0/whatis.html. Hyperledger Fabric Release
2.0 readthedocs last accessed 1 July 2020.
Liu, X., Yan, Z., Geng, G., Lee, X., Tseng, S.-S., and Ku,
C.-H. (2016). Rpki deployment: Risks and alternative
solutions. In Zin, T. T., Lin, J. C.-W., Pan, J.-S., Tin,
P., and Yokota, M., editors, Genetic and Evolutionary
Computing, pages 299–310, Cham. Springer Interna-
tional Publishing.
Liu, Y., Zhang, S., Zhu, H., Wan, P.-J., Gao, L., Zhang, Y.,
and Tian, Z. (2020). A novel routing verification ap-
proach based on blockchain for inter-domain routing
in smart metropolitan area networks. Journal of Par-
allel and Distributed Computing, 142:77 – 89.
Sfirakis, I. and Kotronis, V. (2019). Validating IP
prefixes and as-paths with blockchains. CoRR,
abs/1906.03172.
Tony Bates, Philip Smith, G. H. (2020). Cidr report for 1
jul 20. https://www.cidr-report.org/as2.0/. CIDR Data
report last accessed 1 July 2020.
Vinit, J. and Brad, E. (2018). BGP Message. Cisco Press,
San Fransisco.
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain
679