1. What are routing anomalies and exactly which of them are being examined here?
    - the broad categories listed in the research question fall within two different groups of
      routing anomalies. namely prefix hijacking(Eavesdropping, MitM), which is also might be
      unintented, as well as intented in the case of filtering.
2. Filtering
    - 


1. Routing anomalies and their characteristics
   A. Filtering
   B. Eavesdropping
   C. Man in the Middle attacks
   D. Or simply routing policy changes

the broad categories listed in the research question fall within two different groups of routing anomalies. namely prefix hijacking(Eavesdropping, MitM), which is also might be unintented, as well as intented in the case of filtering.

they break into two different groups: B,C, D normally executed by maliciously manipulating control plane data in BGP, whereas A is normally carried out within the IGP infrastructure








    As the Internet has experienced exponential growth in recent years, so does its complex-
    ity. The increasing complexity can potentially introduce more network-level instabilities.
    Today, the Internet consists of roughly 20,000 Autonomous Systems (ASes) [32], where
    each AS represents a single administrative entity. As shown in Figure 1.1, to go from
    one endpoint to another, packets have to traverse a number of ASes. Ideally, the pack-
    ets should be delivered both reliably and efficiently through the network. However, in
    reality, the network paths may not be perfect.
    
    
