-
1
-
-
52049095979
-
-
S. Murphy, BGP Security Vulnerabilities Analysis, RFC 4272, January 2006.
-
S. Murphy, BGP Security Vulnerabilities Analysis, RFC 4272, January 2006.
-
-
-
-
2
-
-
14344266667
-
-
R. Mahajan, D. Wetherall, T. Anderson, Understanding BGP misconfiguration, in: Proceedings of ACM SIGCOMM, 2002, pp. 3-16.
-
R. Mahajan, D. Wetherall, T. Anderson, Understanding BGP misconfiguration, in: Proceedings of ACM SIGCOMM, 2002, pp. 3-16.
-
-
-
-
3
-
-
52049094383
-
-
Renesys Blog, Pakistan Hijacks YouTube, .
-
Renesys Blog, Pakistan Hijacks YouTube, .
-
-
-
-
4
-
-
44049101942
-
-
J. Karlin, S. Forrest, J. Rexford, Pretty good BGP: Improving BGP by cautiously adopting routes, in: Proceedings of IEEE International Conference on Network Protocols, November 2006.
-
J. Karlin, S. Forrest, J. Rexford, Pretty good BGP: Improving BGP by cautiously adopting routes, in: Proceedings of IEEE International Conference on Network Protocols, November 2006.
-
-
-
-
5
-
-
52049116132
-
-
P. Boothe, J. Hiebert, R. Bush, How prevalent is prefix hijacking on the Internet? NANOG 36 , February 2006.
-
P. Boothe, J. Hiebert, R. Bush, How prevalent is prefix hijacking on the Internet? NANOG 36 , February 2006.
-
-
-
-
6
-
-
52049119942
-
-
S.A. Misel, Wow, AS7007! , April 1997.
-
S.A. Misel, Wow, AS7007! , April 1997.
-
-
-
-
7
-
-
52049106888
-
-
Internet Alert Registry forums, , November 2006.
-
Internet Alert Registry forums, , November 2006.
-
-
-
-
8
-
-
52049110555
-
-
Renesys Blog, Con-Ed Steals the'Net, .
-
Renesys Blog, Con-Ed Steals the'Net, .
-
-
-
-
9
-
-
52049087617
-
-
V.J. Bono, 7007 explanation and apology, , April 1997.
-
V.J. Bono, 7007 explanation and apology, , April 1997.
-
-
-
-
10
-
-
52049102924
-
-
American Registry for Internet Numbers, .
-
American Registry for Internet Numbers, .
-
-
-
-
11
-
-
52049103394
-
-
RIPE, .
-
RIPE, .
-
-
-
-
12
-
-
52049124288
-
-
Asia Pacific Network Information Centre, .
-
Asia Pacific Network Information Centre, .
-
-
-
-
13
-
-
52049119802
-
-
W. Leibzon, Question on 7.0.0.0/8, , April 2007.
-
W. Leibzon, Question on 7.0.0.0/8, , April 2007.
-
-
-
-
14
-
-
33750380201
-
-
H. Chan, D. Dash, A. Perrig, H. Zhang, Modeling adoptability of secure BGP protocol, in: SIGCOMM New York, NY, USA, ACM, 2006, pp. 279-290.
-
H. Chan, D. Dash, A. Perrig, H. Zhang, Modeling adoptability of secure BGP protocol, in: SIGCOMM New York, NY, USA, ACM, 2006, pp. 279-290.
-
-
-
-
15
-
-
52049126001
-
-
J. Karlin, S. Forrest, J. Rexford, Protecting BGP from Invalid Paths, University of New Mexico TR-CS-2007-12, 2007.
-
J. Karlin, S. Forrest, J. Rexford, Protecting BGP from Invalid Paths, University of New Mexico TR-CS-2007-12, 2007.
-
-
-
-
16
-
-
52049103867
-
-
Y. Rekhter, T. Li, S. Hares, A border gateway protocol 4 (BGP-4), RFC 4271 (Draft Standard), Jan. 2006. Available: .
-
Y. Rekhter, T. Li, S. Hares, A border gateway protocol 4 (BGP-4), RFC 4271 (Draft Standard), Jan. 2006. Available: .
-
-
-
-
17
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
Gao L. On inferring autonomous system relationships in the Internet. IEEE/ACM Transactions on Networking 9 6 (2001)
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.6
-
-
Gao, L.1
-
18
-
-
70350437166
-
-
H. Ballani, P. Francis, X. Zhang, A study of prefix hijacking and interception in the Internet, in: SIGCOMM, New York, NY, USA, ACM, 2007, pp. 265-276.
-
H. Ballani, P. Francis, X. Zhang, A study of prefix hijacking and interception in the Internet, in: SIGCOMM, New York, NY, USA, ACM, 2007, pp. 265-276.
-
-
-
-
19
-
-
33750365498
-
-
A. Ramachandran, N. Feamster, Understanding the network-level behavior of spammers, in: Proceedings of ACM SIGCOMM, New York, NY, USA, 2006, pp. 291-302.
-
A. Ramachandran, N. Feamster, Understanding the network-level behavior of spammers, in: Proceedings of ACM SIGCOMM, New York, NY, USA, 2006, pp. 291-302.
-
-
-
-
20
-
-
35248861643
-
-
C. Kruegel, D. Mutz, W. Robertson, FredrikValeur, Topology-based detection of anomalous BGP messages, in: Proceedings of Symposium on Recent Advances in Intrusion Detection, vol. 2820, September 2003, pp. 17-35.
-
C. Kruegel, D. Mutz, W. Robertson, FredrikValeur, Topology-based detection of anomalous BGP messages, in: Proceedings of Symposium on Recent Advances in Intrusion Detection, vol. 2820, September 2003, pp. 17-35.
-
-
-
-
22
-
-
52049115902
-
-
J. Ng, Extensions to BGP to support secure origin BGP (soBGP), expired internet draft draft-ng-sobgp-bgp-extensions-02, April 2004.
-
J. Ng, Extensions to BGP to support secure origin BGP (soBGP), expired internet draft draft-ng-sobgp-bgp-extensions-02, April 2004.
-
-
-
-
23
-
-
52049111899
-
-
T. Wan, E. Kranakis, P. van Oorschot, Pretty secure BGP, psBGP, in: Proceedings of Network and Distributed System Security, 2005.
-
T. Wan, E. Kranakis, P. van Oorschot, Pretty secure BGP, psBGP, in: Proceedings of Network and Distributed System Security, 2005.
-
-
-
-
24
-
-
52049106164
-
-
Y.-C. Hu, D. McGrew, A. Perrig, B. Weis, D. Wendlandt, (r)Evolutionary bootstrapping of a global PKI for securing BGP, in: Hot Topics in Networks Workshop, November 2006.
-
Y.-C. Hu, D. McGrew, A. Perrig, B. Weis, D. Wendlandt, (r)Evolutionary bootstrapping of a global PKI for securing BGP, in: Hot Topics in Networks Workshop, November 2006.
-
-
-
-
25
-
-
83255186150
-
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, R. Katz, Listen and whisper: security mechanisms for BGP, in: Proceedings of Networked Systems Design and Implementation, March 2004.
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, R. Katz, Listen and whisper: security mechanisms for BGP, in: Proceedings of Networked Systems Design and Implementation, March 2004.
-
-
-
-
26
-
-
0036922184
-
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, Detection of invalid routing announcement in the internet, in: Proceedings of Dependable Systems and Networks, 2002.
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, Detection of invalid routing announcement in the internet, in: Proceedings of Dependable Systems and Networks, 2002.
-
-
-
-
27
-
-
0142039755
-
Protecting BGP routes to top level DNS servers
-
Wang L., Zhao X., Pei D., Bush R., Massey D., and Zhang L. Protecting BGP routes to top level DNS servers. IEEE Transactions on Parallel and Distributed Systems 14 9 (2003) 851-860
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 851-860
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Zhang, L.6
-
28
-
-
34548704917
-
-
X. Hu, Z.M. Mao, Accurate real-time identification of IP prefix hijacking, in: Proceedings of IEEE Security and Privacy, 2007.
-
X. Hu, Z.M. Mao, Accurate real-time identification of IP prefix hijacking, in: Proceedings of IEEE Security and Privacy, 2007.
-
-
-
-
29
-
-
52049099913
-
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, A. Rubin, Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, in: Proceedings of Network and Distributed Systems Security, February 2003.
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, A. Rubin, Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, in: Proceedings of Network and Distributed Systems Security, February 2003.
-
-
-
-
30
-
-
1542300243
-
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, An analysis of BGP multiple origin AS (MOAS) conflicts, in: Proceedings of Internet Measurement Workshop, November 2001.
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, An analysis of BGP multiple origin AS (MOAS) conflicts, in: Proceedings of Internet Measurement Workshop, November 2001.
-
-
-
-
31
-
-
52049084382
-
-
J. Qiu, L. Gao, S. Ranjan, A. Nucci, Detecting bogus BGP route information: going beyond prefix hijacking, SecureComm, 2007.
-
J. Qiu, L. Gao, S. Ranjan, A. Nucci, Detecting bogus BGP route information: going beyond prefix hijacking, SecureComm, 2007.
-
-
-
-
32
-
-
0141762464
-
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.F. Wu, L. Zhang, Observation and analysis of BGP behavior under stress, in: Proceedings of 2nd ACM SIGCOMM Workshop on Internet Measurement, 2002, pp. 183-195.
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.F. Wu, L. Zhang, Observation and analysis of BGP behavior under stress, in: Proceedings of 2nd ACM SIGCOMM Workshop on Internet Measurement, 2002, pp. 183-195.
-
-
-
-
33
-
-
0141920459
-
-
J. Rexford, J. Wang, Z. Xiao, Y. Zhang, BGP routing stability of popular destinations, in: Proceedings of Internet Measurement Workshop, 2002.
-
J. Rexford, J. Wang, Z. Xiao, Y. Zhang, BGP routing stability of popular destinations, in: Proceedings of Internet Measurement Workshop, 2002.
-
-
-
-
36
-
-
52049110334
-
-
Internet Alert Registry, .
-
Internet Alert Registry, .
-
-
-
-
37
-
-
52049113250
-
-
RouteViews, .
-
RouteViews, .
-
-
-
-
38
-
-
52049112589
-
-
Renesys routing intelligence, .
-
Renesys routing intelligence, .
-
-
-
-
39
-
-
82755166662
-
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, L. Zhang, PHAS: A prefix hijack alert system, in: Proceedings of USENIX Security Symposium, 2006.
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, L. Zhang, PHAS: A prefix hijack alert system, in: Proceedings of USENIX Security Symposium, 2006.
-
-
-
-
40
-
-
52049088304
-
-
North American Network Operators Group, .
-
North American Network Operators Group, .
-
-
-
-
41
-
-
52049089267
-
-
African Network Operators Group, .
-
African Network Operators Group, .
-
-
-
-
42
-
-
52049098063
-
-
Australian Network Operators Group, .
-
Australian Network Operators Group, .
-
-
-
-
43
-
-
52049120176
-
-
Japan Network Operators Group, .
-
Japan Network Operators Group, .
-
-
-
-
44
-
-
52049095111
-
-
Pacific Network Operators Group, .
-
Pacific Network Operators Group, .
-
-
-
-
45
-
-
52049095776
-
-
J. Karlin, S. Forrest, J. Rexford, BGP simulator (BSIM), .
-
J. Karlin, S. Forrest, J. Rexford, BGP simulator (BSIM), .
-
-
-
-
46
-
-
52049115469
-
-
The CAIDA AS relationships dataset, , February 2007.
-
The CAIDA AS relationships dataset, , February 2007.
-
-
-
-
47
-
-
70350444325
-
-
C. Zheng, L. Ji, D. Pei, J. Wang, P. Francis, A light-weight distributed scheme for detecting ip prefix hijacks in real-time, in: Proceedings of ACM SIGCOMM, 2007, pp. 277-288.
-
C. Zheng, L. Ji, D. Pei, J. Wang, P. Francis, A light-weight distributed scheme for detecting ip prefix hijacks in real-time, in: Proceedings of ACM SIGCOMM, 2007, pp. 277-288.
-
-
-
|