- document
-
Huisman, Rick (author), Weegink, Stefan (author), Kaptein, Stef (author), Jeleniewski, Alex (author), Saveur, Tom (author)The internet consists of many networks connected by the BGP protocol and can easily be manipulated by a hacker. Every day, hackers reroute internet traffic and use that to impersonate entities such as companies, devices and humans. To detect this rerouting, which is also know as a route leak, a BGP monitor can be used. A BGP monitor checks...bachelor thesis 2020