-
4
-
-
0033743163
-
Secure Border Gateway Protocol (Secure-BGP)
-
April
-
S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications, vol. 18, pp. 582-592, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
5
-
-
46249089845
-
-
J. Ng, Extensions to BGP to support secure origin BGP (draft), in Network Working Group, 2003.
-
J. Ng, "Extensions to BGP to support secure origin BGP (draft)," in Network Working Group, 2003.
-
-
-
-
6
-
-
11244282960
-
Origin authentication in Inter-domain routing
-
W. Aiello, J. Ioannidis, and P. McDaniel, "Origin authentication in Inter-domain routing," in Proc. of ACM Conference on Computer and Communications Security, pp. 165-178, 2003.
-
(2003)
Proc. of ACM Conference on Computer and Communications Security
, pp. 165-178
-
-
Aiello, W.1
Ioannidis, J.2
McDaniel, P.3
-
7
-
-
21844463097
-
SPV: Secure path vector routing for securing BGP
-
Y. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," in Proc. of SIGCOMM pp. 179-192, 2004.
-
(2004)
Proc. of SIGCOMM
, pp. 179-192
-
-
Hu, Y.1
Perrig, A.2
Sirbu, M.3
-
8
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans, on Networking, vol. 9, no. 6, pp. 733-745, 2000.
-
(2000)
IEEE/ACM Trans, on Networking
, vol.9
, Issue.6
, pp. 733-745
-
-
Gao, L.1
-
9
-
-
46249119183
-
-
University of Oregon Route Mew Project
-
University of Oregon Route Mew Project, http://routeviews.org
-
-
-
-
10
-
-
0036346301
-
Characterizing the Internet hierarchy from multiple vantage points
-
L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, "Characterizing the Internet hierarchy from multiple vantage points," in Proc. of INFOCOM, pp. 618-627, 2002.
-
(2002)
Proc. of INFOCOM
, pp. 618-627
-
-
Subramanian, L.1
Agarwal, S.2
Rexford, J.3
Katz, R.H.4
-
11
-
-
34547279477
-
Characterizing address use structure and stability of origin advertisement in Inter-domain routing
-
S. Qiu, P. McDaniel, F. Monrose, and A. Rubin, "Characterizing address use structure and stability of origin advertisement in Inter-domain routing," in Proc. of IEEE Symposium on Computers and Communications, pp. 489-496, 2006.
-
(2006)
Proc. of IEEE Symposium on Computers and Communications
, pp. 489-496
-
-
Qiu, S.1
McDaniel, P.2
Monrose, F.3
Rubin, A.4
-
12
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "An analysis of BGP multiple origin AS (MOAS) conflicts," in Proc. of Internet Measurement Workshop, pp. 31-35, 2001.
-
(2001)
Proc. of Internet Measurement Workshop
, pp. 31-35
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
14
-
-
46249089270
-
BGP security vulnerabilities analysis
-
Task Force
-
S. Murphy, "BGP security vulnerabilities analysis," in Internet Research Task Force, 2002.
-
(2002)
Internet Research
-
-
Murphy, S.1
-
16
-
-
46249096374
-
-
Multi-origin Prefixes http://bgp.potaroo.net/as6447/bgp- multi-orgas.txt
-
Multi-origin Prefixes
-
-
-
17
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy in Inter-domain routing
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy in Inter-domain routing," in Proc. of Network and Distributed System Security Symposium, pp. 75-85, 2003.
-
(2003)
Proc. of Network and Distributed System Security Symposium
, pp. 75-85
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
18
-
-
0036922184
-
Detection of invalid routing announcement in the Internet
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Detection of invalid routing announcement in the Internet," in Proc. of Dependable Systemsand Networks, pp. 59-68, 2002.
-
(2002)
Proc. of Dependable Systemsand Networks
, pp. 59-68
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
19
-
-
35248861643
-
Topology-based detection of anomalous BGP messages
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, "Topology-based detection of anomalous BGP messages," in Proc. of International Symposiumon Recent Advances in Intrusion Detection, pp. 17-35, 2003.
-
(2003)
Proc. of International Symposiumon Recent Advances in Intrusion Detection
, pp. 17-35
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
20
-
-
83255186150
-
Listen and Whisper: Security mechanisms for BGP
-
L. Subramanian, V Roth, I. Stoica, S. Shenker, and R. Katz, "Listen and Whisper: Security mechanisms for BGP," in Proc. of Network Systems Design and Implementation, pp. 127-140, 2004.
-
(2004)
Proc. of Network Systems Design and Implementation
, pp. 127-140
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
21
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A prefix hijack alert system," in Proc. of USENIX Security, pp. 153-166, 2006.
-
(2006)
Proc. of USENIX Security
, pp. 153-166
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
22
-
-
84964539491
-
Public-Key Infrastructure for the Secure Border Gateway Protocol (S-BGP)
-
June
-
K. Seo, C. Lynn, and S. Kent, "Public-Key Infrastructure for the Secure Border Gateway Protocol (S-BGP)," in Proc. of DARPA Information Survivability Conf and Exposition II, pp. 239-253, June 2001.
-
(2001)
Proc. of DARPA Information Survivability Conf and Exposition
, vol.2
, pp. 239-253
-
-
Seo, K.1
Lynn, C.2
Kent, S.3
|