Simulator scenario 3: Prefix hijacking with RPKI validation cover¶
High‑level objective¶
Playbook 3 models the execution of a validated prefix hijack where control‑plane poisoning from earlier phases allows the hijack to appear legitimate to RPKI validators.
The goals are:
Announce a sub‑prefix that validates as RPKI VALID
Verify traffic interception and differential regional impact
Maintain service continuity through transparent forwarding
Monitor operational stability to avoid detection
Execute a controlled withdrawal and assess forensic evidence
Why this matters:
Unlike an invalid hijack, this attack does not trigger RPKI invalid alerts because validation has been poisoned. :contentReferenceoaicite:0
Network defenders relying on RPKI may see compliant states while traffic is diverted.
Service continuity and subtle monitoring make detection harder.
Key narrative:
“Control‑plane poisoning makes hijacks look like valid business routing. This scenario demonstrates the payoff of earlier phases.” :contentReferenceoaicite:1
Simulator scenario definition¶
Playbook 3 scenario.yaml and telemetry.py model the full lifecycle of a validated hijack, from announcement through monitoring and controlled withdrawal.
The timeline includes regional traffic interception tests, forwarding establishment, victim traffic analysis, periodic monitoring checks, and controlled withdrawal phases.
Telemetry for this scenario is defined in telemetry.py. It maps each timeline action to specific observable
signals that a telemetry pipeline will emit when running the simulation.
For example:
phase2_complete→ internal phase transition telemetryhijack_announcement→ BMP route monitoring and realistic BGP syslogannouncement_propagation→bgp.propagationeventsrpki_validation_check→ both RPKI validation events and syslogtraffic_interception_test→ simulated traceroute (network.traceroute)interception_summary→ internal analysis eventsservice_continuity_verified→ service check telemetrymonitoring_check→ internal monitoring statuswithdrawal_announcement→ BMP withdrawal + syslogtraffic_reconvergence→bgp.reconvergenceattribute eventsPost‑operation actions (
hijack_evidence_assessment,cleanup_decision) → internal analysis events summarising forensic evidence
In contrast to Playbook 1 (which establishes legitimacy) and Playbook 2 (which expands scope), Playbook 3 executes an attack that is validated as normal by RPKI.
Defensive systems that rely on RPKI state may fail to raise alarms
BGP syslogs and propagation look typical
Only correlation across multiple telemetry sources reveals the true state
This scenario is ideal for testing SIEM pipelines where signal correlation is essential, not just single‑source detection rules.