Towards uncovering BGP hijacking attacks