Routing attacks Divert traffic to malicious nodes ◆B|ack-ho|e ◆ Eavesdropping How to implement routing attacks? ◆ Distance∨ ector: ◆Link- state: BGP vulnerabilities 15-411: F08 security 9Routing attacks • Divert traffic to malicious nodes Black-hole Eavesdropping • How to implement routing attacks? Distance-Vector: Link-state: • BGP vulnerabilities 15-411: F08 security 9