메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3-17

Accurate real-time identification of IP prefix hijacking

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; REAL TIME SYSTEMS; ROUTING PROTOCOLS; TELECOMMUNICATION SERVICES;

EID: 34548704917     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.7     Document Type: Conference Paper
Times cited : (165)

References (52)
  • 1
    • 34250818849 scopus 로고    scopus 로고
    • PlanetLab. http://www.planet-lab.org/.
    • PlanetLab
  • 2
    • 34548774315 scopus 로고    scopus 로고
    • University of Oregon Route Views Archive Project
    • University of Oregon Route Views Archive Project, http://www.routeviews. org.
  • 5
    • 34548793272 scopus 로고    scopus 로고
    • Generic Threats to Routing Protocols
    • draft-ietf-rpsec-routing-threats-07, April
    • A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols. IETF Draft: draft-ietf-rpsec-routing-threats-07, April 2004.
    • (2004) IETF Draft
    • Barbir, A.1    Murphy, S.2    Yang, Y.3
  • 9
    • 33645757765 scopus 로고    scopus 로고
    • 7007 Explanation and Apology. NANOG email on
    • Apr 26
    • V. J. Bono. 7007 Explanation and Apology. NANOG email on Apr 26, 1997.
    • (1997)
    • Bono, V.J.1
  • 10
    • 64049086532 scopus 로고    scopus 로고
    • How Prevalent is Prefix Hijacking on the Internet
    • February
    • P. Boothe, J. Hiebert, and R. Bush. How Prevalent is Prefix Hijacking on the Internet. NANOG36 Talk, February 2006.
    • (2006) NANOG36 Talk
    • Boothe, P.1    Hiebert, J.2    Bush, R.3
  • 11
    • 34548756507 scopus 로고    scopus 로고
    • K. Butler, T. Farley, P. McDaniel, and J. Rexfod. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, 2004.
    • K. Butler, T. Farley, P. McDaniel, and J. Rexfod. A Survey of BGP Security Issues and Solutions. Technical Report TD-5UGJ33, AT&T Labs - Research, 2004.
  • 12
    • 34548783626 scopus 로고    scopus 로고
    • Caida. NetGeo, The Internet Geographic Database
    • Caida. NetGeo - The Internet Geographic Database.
  • 13
    • 56649091338 scopus 로고    scopus 로고
    • BGP Security Requirements
    • draft-ietf-rpsec-bgpsecrec-04, March
    • B. Christian and T. Tauber. BGP Security Requirements. IETF Draft: draft-ietf-rpsec-bgpsecrec-04, March 2006.
    • (2006) IETF Draft
    • Christian, B.1    Tauber, T.2
  • 18
    • 0034478521 scopus 로고    scopus 로고
    • On Inferring Autonomous System Relationships in the Internet
    • L. Gao. On Inferring Autonomous System Relationships in the Internet. In Proc. IEEE Global Internet Symposium, 2000.
    • (2000) Proc. IEEE Global Internet Symposium
    • Gao, L.1
  • 19
    • 85180626613 scopus 로고    scopus 로고
    • Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach
    • R. Gerdes, T. Daniels, M. Mina, and S. Russell. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. In Proc. NDSS, 2006.
    • (2006) Proc. NDSS
    • Gerdes, R.1    Daniels, T.2    Mina, M.3    Russell, S.4
  • 20
    • 85180543778 scopus 로고    scopus 로고
    • Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing
    • February
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proc. NDSS, February 2003.
    • (2003) Proc. NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 25
    • 34548709447 scopus 로고    scopus 로고
    • Accurate Real-time Identification of IP Hijacking
    • Technical Report CSE-TR-516-06, University of Michigan, June
    • X. Hu and Z. M. Mao. Accurate Real-time Identification of IP Hijacking. Technical Report CSE-TR-516-06, University of Michigan, June 2006.
    • (2006)
    • Hu, X.1    Mao, Z.M.2
  • 26
    • 34548775489 scopus 로고    scopus 로고
    • Auto-Detecting Address Hijacking?
    • May
    • G. Huston. Auto-Detecting Address Hijacking? Presentation at RIPE-50, May 2005.
    • (2005) Presentation at RIPE-50
    • Huston, G.1
  • 27
    • 34548737453 scopus 로고    scopus 로고
    • The Relationship Between Network Security and Spam
    • October
    • C. Hutzler and R. da Silva. The Relationship Between Network Security and Spam. NANOG 29 Meeting, October 2003.
    • (2003) NANOG 29 Meeting
    • Hutzler, C.1    da Silva, R.2
  • 28
    • 34548811749 scopus 로고    scopus 로고
    • J. W. S. III. BGP4 Inter-Domain Routing in the Internet. Addison-Wesley, 1999.
    • J. W. S. III. BGP4 Inter-Domain Routing in the Internet. Addison-Wesley, 1999.
  • 30
    • 34548800085 scopus 로고    scopus 로고
    • D. Karrenberg. Distributing K-Root Service by Anycast Routing of 193.0.14.129. RIPE 268, 2003.
    • D. Karrenberg. Distributing K-Root Service by Anycast Routing of 193.0.14.129. RIPE 268, 2003.
  • 34
    • 34548706881 scopus 로고    scopus 로고
    • B. A. Mah. pchar: A Tool for Measuring Internet Path Characteristics, http://www.kitchenlab.org/www/bmah/Software/pchar/.
    • B. A. Mah. pchar: A Tool for Measuring Internet Path Characteristics, http://www.kitchenlab.org/www/bmah/Software/pchar/.
  • 36
    • 34548765292 scopus 로고    scopus 로고
    • Extensions to BGP to Support Secure Origin BGP (soBGP)
    • draft-ng-sobgp-bgp-extensions-01.txt, November
    • J. Ng. Extensions to BGP to Support Secure Origin BGP (soBGP). IETF Draft: draft-ng-sobgp-bgp-extensions-01.txt, November 2002.
    • (2002) IETF Draft
    • Ng, J.1
  • 37
    • 0003235158 scopus 로고    scopus 로고
    • An Investigation of Geographic Mapping Techniques for Internet Hosts
    • V. N.Padmanabhan and L. Subramanian. An Investigation of Geographic Mapping Techniques for Internet Hosts. In Proc. ACM SIGCOMM, 2001.
    • (2001) Proc. ACM SIGCOMM
    • Padmanabhan, V.N.1    Subramanian, L.2
  • 40
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the Network-Level Behavior of Spammers
    • A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 41
    • 34548711089 scopus 로고    scopus 로고
    • Y. Rekhter and T. Li. A Border Gateway Protocol. RFC 1771, March 1995.
    • Y. Rekhter and T. Li. A Border Gateway Protocol. RFC 1771, March 1995.
  • 49
    • 34548715031 scopus 로고    scopus 로고
    • F. Yarochkin, M. Kydyraliev, and O. Arkin. Xprobe2, 2006.
    • F. Yarochkin, M. Kydyraliev, and O. Arkin. Xprobe2, 2006.
  • 50
    • 33745774761 scopus 로고    scopus 로고
    • Aggregated Path Authentication for Efficient BGP Security
    • M. Zhao, S. Smith, and D. Nicol. Aggregated Path Authentication for Efficient BGP Security. In Proc. CCS, 2005.
    • (2005) Proc. CCS
    • Zhao, M.1    Smith, S.2    Nicol, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.