{"id":79349,"date":"2018-05-07T14:03:56","date_gmt":"2018-05-07T14:03:56","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/"},"modified":"2025-11-27T17:41:51","modified_gmt":"2025-11-27T17:41:51","slug":"what-is-bgp-hijacking-anyway","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/","title":{"rendered":"Mais c&rsquo;est quoi le \u00ab\u00a0BGP Hijacking\u00a0\u00bb ?"},"content":{"rendered":"<p>Il y a deux semaines, nous avons appris que\u00a0<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security\/\">un autre incident de s\u00e9curit\u00e9 de routage<\/a>\u00a0a eu lieu, \u00e0 savoir le d\u00e9tournement de routes BGP vers l&rsquo;infrastructure DNS d&rsquo;Amazon, a \u00e9t\u00e9 utilis\u00e9 comme tremplin pour voler environ 150 000 dollars de la crypto-monnaie Ethereum depuis MyEtherWallet.com. Nous avons beaucoup parl\u00e9 ces derniers temps de d\u00e9tournement de BGP, en creusant dans <a href=\"file:\/\/\/%3Fp=78372\">les d\u00e9tails de ce qui s&rsquo;est pass\u00e9<\/a>. En prenant du recul on pose une question: Quoi de neuf dans le monde est le d\u00e9tournement de BGP, et pourquoi ce ph\u00e9nom\u00e8ne est-il si important? Ici, nous allons expliquer les bases et comment les op\u00e9rateurs du r\u00e9seau, ainsi que les points d&rsquo;\u00e9change Internet peuvent <a href=\"http:\/\/www.manrs.org\/\">rejoindre MANRS<\/a> pour apporter la solution au probl\u00e8me.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/\">Pour savoir plus cliquez ici<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il y a deux semaines, nous avons appris que\u00a0un autre incident de s\u00e9curit\u00e9 de routage\u00a0a eu lieu, \u00e0 savoir le d\u00e9tournement de routes BGP vers l&rsquo;infrastructure DNS d&rsquo;Amazon, a \u00e9t\u00e9 utilis\u00e9 comme tremplin pour voler environ 150 000 dollars de la crypto-monnaie Ethereum depuis MyEtherWallet.com. Nous avons beaucoup parl\u00e9 ces derniers temps de d\u00e9tournement de [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":78473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,2589,169,2545,4909,4775,183,146],"tags":[6250,6254,6283],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4083],"class_list":["post-79349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-garantir-bgp","category-les-normes-internet-ouvertes","category-manrs-fr","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-les-normes-pour-la-securisation-du-routage-mutuellement-agreees-manrs","tag-protocole-bgp-border-gateway-protocol","tag-securite-du-routage","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",5000,3300,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-300x198.jpg",300,198,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-768x507.jpg",768,507,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-1024x676.jpg",1024,676,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",1536,1014,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",2048,1352,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-250x165.jpg",250,165,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",300,198,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",400,264,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",600,396,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"Il y a deux semaines, nous avons appris que\u00a0un autre incident de s\u00e9curit\u00e9 de routage\u00a0a eu lieu, \u00e0 savoir le d\u00e9tournement de routes BGP vers l&rsquo;infrastructure DNS d&rsquo;Amazon, a \u00e9t\u00e9 utilis\u00e9 comme tremplin pour voler environ 150 000 dollars de la crypto-monnaie Ethereum depuis MyEtherWallet.com. Nous avons beaucoup parl\u00e9 ces derniers temps de d\u00e9tournement de\u2026","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=79349"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79349\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/78473"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=79349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=79349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=79349"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=79349"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=79349"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=79349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}