-
1
-
-
33745634736
-
-
Y. Rekhter, T. Li, and S. H. Ed, IETF, RFC 4271, January
-
Y. Rekhter, T. Li, and S. H. Ed., "A Border Gateway Protocol 4 (BGP-4)," IETF, RFC 4271, January 2006.
-
(2006)
A Border Gateway Protocol 4 (BGP-4)
-
-
-
2
-
-
18744392924
-
Wow, AS7007!
-
"Wow, AS7007!" http://www.merit.edu/mail.archives/nanog/1997- 04/msg00340.html.
-
-
-
-
3
-
-
33847737144
-
Understanding the Network-Level Behavior of Spammers
-
Pisa, Italy, September
-
A. Ramachandran and N. Feamster, "Understanding the Network-Level Behavior of Spammers," in Proceedings of ACM SIGCOMM, Pisa, Italy, September 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
4
-
-
33845591142
-
DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
-
Barcelona, Spain
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," in Proceedings of IEEE INFOCOM, Barcelona, Spain, 2006.
-
(2006)
Proceedings of IEEE INFOCOM
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
5
-
-
0033743163
-
Secure Border Gateway Protocol (Secure-BGP)
-
April
-
S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, pp. 582-592, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
7
-
-
36949018346
-
Modeling Adoptability of Secure BGP Protocols
-
Pisa, Itality, September
-
H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling Adoptability of Secure BGP Protocols," in Proceedings of ACM SIGCOMM, Pisa, Itality, September 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Chan, H.1
Dash, D.2
Perrig, A.3
Zhang, H.4
-
9
-
-
8344241940
-
Analyzing BGP Policies: Methodology and Tool
-
Hong Kong, China, March
-
G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool," in Proceedings of IEEE INFOCOM, Hong Kong, China, March 2004.
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Siganos, G.1
Faloutsos, M.2
-
10
-
-
44049101942
-
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
-
November
-
J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes," in Proceedings of IEEE ICNP, November 2006.
-
(2006)
Proceedings of IEEE ICNP
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
11
-
-
82755166662
-
PHAS: A Prefix Hijack Alert System
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A Prefix Hijack Alert System," in Proceedings of 15th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of 15th USENIX Security Symposium
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
13
-
-
35248861643
-
Topology-Based Detection of Anomalous BGP Messages
-
C. Krügel, D. Mutz, W. K. Robertson, and F. Valeur, "Topology-Based Detection of Anomalous BGP Messages," in RAID, 2003, pp. 17-35.
-
(2003)
RAID
, pp. 17-35
-
-
Krügel, C.1
Mutz, D.2
Robertson, W.K.3
Valeur, F.4
-
15
-
-
51349110336
-
-
Route Views Project Page
-
"Route Views Project Page," http://www.routeviews.org.
-
-
-
-
16
-
-
51349098069
-
-
RIPE Route Information Service, http://www.ripe.net/ris/ index.html.
-
"RIPE Route Information Service," http://www.ripe.net/ris/ index.html.
-
-
-
-
17
-
-
51349119429
-
-
J. Qiu. L. Gao, S. Ranjan, and A. Nucci, Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking, Department of ECE, University of Massachusetts, Amherst, Tech. Rep. TR-07-CSE-04, June 2007, http://rio.ecs.umass.edu/j̃qiu/bgpsieve2tech.pdf.
-
J. Qiu. L. Gao, S. Ranjan, and A. Nucci, "Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking," Department of ECE, University of Massachusetts, Amherst, Tech. Rep. TR-07-CSE-04, June 2007, http://rio.ecs.umass.edu/j̃qiu/bgpsieve2tech.pdf.
-
-
-
-
19
-
-
84943526715
-
The Temporal and Topological Characteristics of BGP Path Changes
-
D.-F. Chang, R. Govindan, and J. S. Heidemann, "The Temporal and Topological Characteristics of BGP Path Changes," in ICNP, 2003.
-
(2003)
ICNP
-
-
Chang, D.-F.1
Govindan, R.2
Heidemann, J.S.3
-
20
-
-
77952183219
-
Finding a Needle in a Haystack: Pinpointing Signinficant BGP Routing Changes in an IP Network
-
May
-
J. Wu, Z. M. Mao, J. Rexford, and J. Wang, "Finding a Needle in a Haystack: Pinpointing Signinficant BGP Routing Changes in an IP Network," in Proceedings of Networked Systems Design and Implementation, May 2005.
-
(2005)
Proceedings of Networked Systems Design and Implementation
-
-
Wu, J.1
Mao, Z.M.2
Rexford, J.3
Wang, J.4
-
23
-
-
51349102375
-
-
"AUTONOMOUS SYSTEM NUMBERS," http://www.iana.org/assignments/ as-numbers.
-
-
-
SYSTEM NUMBERS, A.1
-
24
-
-
51349128455
-
How We Learned To Start Worrying and Hate Maximum Prefix Limits)
-
"Anatomy of a Leak: AS9121 (or, "How We Learned To Start Worrying and Hate Maximum Prefix Limits")," http://nanog.org/mtg-0505/ underwood.html.
-
-
-
-
25
-
-
46149124210
-
-
"Con-Ed Steals the "Net," http://www.renesys.com/blog/ 2006/01/coned-steals-the-net.shtml.
-
Con-Ed Steals the Net
-
-
-
26
-
-
51349132956
-
-
Pretty Good BGP and the Internet Alert Registry
-
"Pretty Good BGP and the Internet Alert Registry," http://www.nanog.org/mtg-0606/karlin.html.
-
-
-
-
27
-
-
51349103325
-
-
J. Karlin, a fun hijack:1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today), http://www.merit.edu/mail.archives/ nanog/2006-06/msg00082.html.
-
J. Karlin, "a fun hijack:1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today)," http://www.merit.edu/mail.archives/ nanog/2006-06/msg00082.html.
-
-
-
-
29
-
-
51349167073
-
www.google.com latency/packet loss/very slow thru savvis
-
"www.google.com latency/packet loss/very slow thru savvis," http://www.merit.edu/mail.archives/nanog/2005-12/msg00219.html.
-
-
-
|