메뉴 건너뛰기




Volumn , Issue , 2007, Pages 381-390

Detecting bogus BGP route information: Going beyond prefix hijacking

Author keywords

[No Author keywords available]

Indexed keywords

INTERNATIONAL CONFERENCES; ROUTING INFORMATION; SECURITY AND PRIVACY;

EID: 51349120643     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOM.2007.4550358     Document Type: Conference Paper
Times cited : (62)

References (29)
  • 1
    • 33745634736 scopus 로고    scopus 로고
    • Y. Rekhter, T. Li, and S. H. Ed, IETF, RFC 4271, January
    • Y. Rekhter, T. Li, and S. H. Ed., "A Border Gateway Protocol 4 (BGP-4)," IETF, RFC 4271, January 2006.
    • (2006) A Border Gateway Protocol 4 (BGP-4)
  • 2
    • 18744392924 scopus 로고    scopus 로고
    • Wow, AS7007!
    • "Wow, AS7007!" http://www.merit.edu/mail.archives/nanog/1997- 04/msg00340.html.
  • 3
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the Network-Level Behavior of Spammers
    • Pisa, Italy, September
    • A. Ramachandran and N. Feamster, "Understanding the Network-Level Behavior of Spammers," in Proceedings of ACM SIGCOMM, Pisa, Italy, September 2006.
    • (2006) Proceedings of ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 4
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
    • Barcelona, Spain
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," in Proceedings of IEEE INFOCOM, Barcelona, Spain, 2006.
    • (2006) Proceedings of IEEE INFOCOM
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 7
    • 36949018346 scopus 로고    scopus 로고
    • Modeling Adoptability of Secure BGP Protocols
    • Pisa, Itality, September
    • H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling Adoptability of Secure BGP Protocols," in Proceedings of ACM SIGCOMM, Pisa, Itality, September 2006.
    • (2006) Proceedings of ACM SIGCOMM
    • Chan, H.1    Dash, D.2    Perrig, A.3    Zhang, H.4
  • 9
    • 8344241940 scopus 로고    scopus 로고
    • Analyzing BGP Policies: Methodology and Tool
    • Hong Kong, China, March
    • G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool," in Proceedings of IEEE INFOCOM, Hong Kong, China, March 2004.
    • (2004) Proceedings of IEEE INFOCOM
    • Siganos, G.1    Faloutsos, M.2
  • 10
    • 44049101942 scopus 로고    scopus 로고
    • Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
    • November
    • J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes," in Proceedings of IEEE ICNP, November 2006.
    • (2006) Proceedings of IEEE ICNP
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 13
    • 35248861643 scopus 로고    scopus 로고
    • Topology-Based Detection of Anomalous BGP Messages
    • C. Krügel, D. Mutz, W. K. Robertson, and F. Valeur, "Topology-Based Detection of Anomalous BGP Messages," in RAID, 2003, pp. 17-35.
    • (2003) RAID , pp. 17-35
    • Krügel, C.1    Mutz, D.2    Robertson, W.K.3    Valeur, F.4
  • 15
    • 51349110336 scopus 로고    scopus 로고
    • Route Views Project Page
    • "Route Views Project Page," http://www.routeviews.org.
  • 16
    • 51349098069 scopus 로고    scopus 로고
    • RIPE Route Information Service, http://www.ripe.net/ris/ index.html.
    • "RIPE Route Information Service," http://www.ripe.net/ris/ index.html.
  • 17
    • 51349119429 scopus 로고    scopus 로고
    • J. Qiu. L. Gao, S. Ranjan, and A. Nucci, Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking, Department of ECE, University of Massachusetts, Amherst, Tech. Rep. TR-07-CSE-04, June 2007, http://rio.ecs.umass.edu/j̃qiu/bgpsieve2tech.pdf.
    • J. Qiu. L. Gao, S. Ranjan, and A. Nucci, "Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking," Department of ECE, University of Massachusetts, Amherst, Tech. Rep. TR-07-CSE-04, June 2007, http://rio.ecs.umass.edu/j̃qiu/bgpsieve2tech.pdf.
  • 19
    • 84943526715 scopus 로고    scopus 로고
    • The Temporal and Topological Characteristics of BGP Path Changes
    • D.-F. Chang, R. Govindan, and J. S. Heidemann, "The Temporal and Topological Characteristics of BGP Path Changes," in ICNP, 2003.
    • (2003) ICNP
    • Chang, D.-F.1    Govindan, R.2    Heidemann, J.S.3
  • 23
    • 51349102375 scopus 로고    scopus 로고
    • "AUTONOMOUS SYSTEM NUMBERS," http://www.iana.org/assignments/ as-numbers.
    • SYSTEM NUMBERS, A.1
  • 24
    • 51349128455 scopus 로고    scopus 로고
    • How We Learned To Start Worrying and Hate Maximum Prefix Limits)
    • "Anatomy of a Leak: AS9121 (or, "How We Learned To Start Worrying and Hate Maximum Prefix Limits")," http://nanog.org/mtg-0505/ underwood.html.
  • 25
    • 46149124210 scopus 로고    scopus 로고
    • "Con-Ed Steals the "Net," http://www.renesys.com/blog/ 2006/01/coned-steals-the-net.shtml.
    • Con-Ed Steals the Net
  • 26
    • 51349132956 scopus 로고    scopus 로고
    • Pretty Good BGP and the Internet Alert Registry
    • "Pretty Good BGP and the Internet Alert Registry," http://www.nanog.org/mtg-0606/karlin.html.
  • 27
    • 51349103325 scopus 로고    scopus 로고
    • J. Karlin, a fun hijack:1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today), http://www.merit.edu/mail.archives/ nanog/2006-06/msg00082.html.
    • J. Karlin, "a fun hijack:1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today)," http://www.merit.edu/mail.archives/ nanog/2006-06/msg00082.html.
  • 29
    • 51349167073 scopus 로고    scopus 로고
    • www.google.com latency/packet loss/very slow thru savvis
    • "www.google.com latency/packet loss/very slow thru savvis," http://www.merit.edu/mail.archives/nanog/2005-12/msg00219.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.