메뉴 건너뛰기




Volumn , Issue , 2007, Pages 277-288

A light-weight distributed scheme for detecting ip prefix hijacks in real-time

Author keywords

BGP; Detection; Hijacking; Interception; Routing

Indexed keywords

HIJACKING DETECTION SERVICES; INTERCEPTION; PREFIX HIJACKING;

EID: 36949036650     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1282380.1282412     Document Type: Conference Paper
Times cited : (99)

References (36)
  • 1
    • 84858504284 scopus 로고    scopus 로고
    • RIPE RIS Raw Data. http://www.ripe.net/projects/ris/rawdata.html.
    • Raw Data, R.R.1
  • 2
    • 84858500287 scopus 로고    scopus 로고
    • University of Oregon Route Views Archive Project
    • University of Oregon Route Views Archive Project. http://www.routeview. org.
  • 4
    • 36949014918 scopus 로고    scopus 로고
    • H. Ballani, P. Francis, and X. Zhang. A Study of Prefix Hijacking and Interception in the Internet. In Proc. ACM SIGCOMM, Aug. 2007.
    • H. Ballani, P. Francis, and X. Zhang. A Study of Prefix Hijacking and Interception in the Internet. In Proc. ACM SIGCOMM, Aug. 2007.
  • 6
    • 34547369855 scopus 로고    scopus 로고
    • Optimizing BGP Security by Exploiting Path Stability
    • Nov
    • K. Butler, P. McDaniel, and W. Aiello. Optimizing BGP Security by Exploiting Path Stability. In Proc. ACM CCS, Nov. 2006.
    • (2006) Proc. ACM CCS
    • Butler, K.1    McDaniel, P.2    Aiello, W.3
  • 9
    • 85180543778 scopus 로고    scopus 로고
    • Working Around BGP: An Incremental Approach, to Improving Security and Accuracy of Interdomain Routing
    • Feb
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach, to Improving Security and Accuracy of Interdomain Routing. In Proc. NDSS, Feb. 2003.
    • (2003) Proc. NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 10
    • 34548704917 scopus 로고    scopus 로고
    • Accurate Real-time Identification of IP Prefix Hijacking
    • May
    • X. Hu and Z. M. Mao. Accurate Real-time Identification of IP Prefix Hijacking. In Proc. IEEE Security and Privacy, May 2007.
    • (2007) Proc. IEEE Security and Privacy
    • Hu, X.1    Mao, Z.M.2
  • 11
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure Path Vector Routing for Securing BGP
    • Aug
    • Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In Proc. ACM SIGCOMM, Aug. 2004.
    • (2004) Proc. ACM SIGCOMM
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 12
    • 36949022834 scopus 로고    scopus 로고
    • iPlane. http://iplane.cs.washington.edu/.
    • iPlane. http://iplane.cs.washington.edu/.
  • 13
    • 17644411571 scopus 로고    scopus 로고
    • Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic
    • Oct
    • C. Jin, H. Wang, and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic. In Proc. ACM CCS, Oct. 2003.
    • (2003) Proc. ACM CCS
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 14
    • 0014129195 scopus 로고
    • Hierarchical Clustering Schemes
    • S. Johnson. Hierarchical Clustering Schemes. In Psychometrika, 1967.
    • (1967) Psychometrika
    • Johnson, S.1
  • 15
    • 36949030372 scopus 로고    scopus 로고
    • Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes
    • Nov
    • J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes. In Proc. IEEE ICNP, Nov. 2006.
    • (2006) Proc. IEEE ICNP
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 17
    • 17744396158 scopus 로고    scopus 로고
    • J. Kim, S. Y. Ko, D. M. Nicol, X. A. Dimitropoulos, and G. F. Riley. A BGP Attack against Traffic Engineering. In Proc. of the 36th conference on Winter simulation, 2004.
    • J. Kim, S. Y. Ko, D. M. Nicol, X. A. Dimitropoulos, and G. F. Riley. A BGP Attack against Traffic Engineering. In Proc. of the 36th conference on Winter simulation, 2004.
  • 18
  • 20
    • 36048995031 scopus 로고    scopus 로고
    • Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks
    • June
    • M. Lad, R. Oliveira, B. Zhang, and L. Zhang. Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks. In Proc. IEEE/IFIP DSN, June 2007.
    • (2007) Proc. IEEE/IFIP DSN
    • Lad, M.1    Oliveira, R.2    Zhang, B.3    Zhang, L.4
  • 23
  • 27
    • 34250818849 scopus 로고    scopus 로고
    • PlanetLab. http://www.planet-lab.org.
    • PlanetLab
  • 28
    • 38549165399 scopus 로고    scopus 로고
    • Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing
    • Nov
    • S. Y. Qiu, F. Monrose, A. Terzis, and P. D. McDaniel. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. In Proc. IEEE NPsec, Nov. 2006.
    • (2006) Proc. IEEE NPsec
    • Qiu, S.Y.1    Monrose, F.2    Terzis, A.3    McDaniel, P.D.4
  • 29
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the Network-Level Behavior of Spammers
    • Sept
    • A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Sept. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 30
    • 34548310427 scopus 로고    scopus 로고
    • Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
    • May
    • G. Siganos and M. Faloutsos. Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? In Proc. IEEE INFOCOM, May 2007.
    • (2007) Proc. IEEE INFOCOM
    • Siganos, G.1    Faloutsos, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.