My friends at Spamhaus published a fine summary of several types of network hijacking attacks, see Network hijacking: the low down.
I wrote a series of posts, Internet address hijacking, spoofing and squatting attacks in 2011. This series of articles explores attacks that exploit the Internet’s routing system in this manner. The series also describes the motives for such attacks, classifies the attacks based on certain distinguishing characteristics, and suggests measures that can be taken to mitigate attacks of these kinds.
Mine is a good complement to Spamhaus' assessment of the current hijacking landscape if you're interested in digging deeper.
It's depressing that many of the 2011 attack forms remain popular today.
We really don't learn very well, or very fast, do we?
You can follow this conversation by subscribing to the comment feed for this post.