메뉴 건너뛰기




Volumn , Issue , 2009, Pages 25-38

A Comparative analysis of BGP anomaly detection and robustness algorithms

Author keywords

[No Author keywords available]

Indexed keywords

ALERT SYSTEMS; ANOMALY DETECTION; BGP MESSAGES; BORDER GATEWAY PROTOCOL; COMPARATIVE ANALYSIS; EVALUATION METHODOLOGIES; EVALUATION PLATFORMS; INTER-DOMAIN; INTERNET REGISTRIES; INTERNET ROUTING; TESTING AND EVALUATION; TRACE DATA;

EID: 66249137443     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CATCH.2009.20     Document Type: Conference Paper
Times cited : (19)

References (44)
  • 1
    • 66249094408 scopus 로고    scopus 로고
    • The day the youtube died: What happened and what we might do about it
    • kuwait April
    • M. Brown, T. Underwood, and E. Zmijewski, "The Day the YouTube Died: What happened and what we might do about it", MENOG 3, Kuwait April 2008 http://www.renesys.com/tech/presentations/pdf/menog3-youtube.pdf
    • (2008) MENOG 3
    • Brown, M.1    Underwood, T.2    Zmijewski, E.3
  • 2
    • 77950463504 scopus 로고    scopus 로고
    • YouTube hijacking: A ripe NCC RIS case study
    • YouTube Hijacking: A RIPE NCC RIS case study, RIPE News and Announcements (2008) http://www.ripe.net/news/study-youtube-hijacking.html
    • (2008) RIPE News and Announcements
  • 3
    • 77955326722 scopus 로고    scopus 로고
    • Stealing The internet: An internet-scale man in the middle attack
    • los angeles, Oct
    • A. Pilosov and T. Kapela, "Stealing The Internet: An Internet-Scale Man In The Middle Attack", NANOG-44, Los Angeles, October 12-15, 2008. http://www.nanog.org/meetings/nanog44/presentations/ Tuesday/Kapela steal internet N44.pdf
    • (2008) NANOG-44 , pp. 12-15
    • Pilosov, A.1    Kapela, T.2
  • 4
    • 66249118220 scopus 로고    scopus 로고
    • Flaw could cripple entire net
    • April 20
    • "Flaw Could Cripple Entire Net", Associated Press, April 20, 2004. http://wiredvig.wired.com/news/technology/0,1282,63143,00.html
    • (2004) Associated press
  • 12
    • 33749866094 scopus 로고    scopus 로고
    • ICMP attacks against TCP
    • draft-gont-tcpm-icmp-attacks-03.txt, December
    • F. Gont, "ICMP Attacks against TCP", IETF Internet Draft, draft-gont-tcpm-icmp-attacks-03.txt, December 2004
    • (2004) IETF Internet Draft
    • Gont, E.1
  • 13
    • 85056462113 scopus 로고    scopus 로고
    • An attack tree for border gateway protocol
    • Feb
    • S. Convery, D. Cook, and M. Franz, "An Attack Tree for Border Gateway Protocol", IETF ID, February 2004. http://ietfreport.isoc.org/ids/ draft-ietf-rpsecbgpattack-00.txt
    • (2004) IETF ID
    • Convery, S.1    Cook, D.2    Franz, M.3
  • 15
    • 8344241940 scopus 로고    scopus 로고
    • Analyzing BGP policies: Methodology and tool
    • G. Siganos and M. Faloutsos, "Analyzing BGP policies: methodology and tool", IEEE Infocom, 2004
    • (2004) IEEE Infocom
    • Siganos, G.1    Faloutsos, M.2
  • 18
    • 66249091097 scopus 로고    scopus 로고
    • Pretty good BGP and the internet alert registry
    • June 5th
    • J. Karlin, S. Forrest, and J. Rexford",Pretty Good BGP and the Internet Alert Registry," NANOG 37, June 5th 2006. http://www.nanog.org/ mtg-0606/pdf/josh-karlin.pdf
    • (2006) NANOG 37
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 20
    • 66249086777 scopus 로고    scopus 로고
    • What's wrong with IRR
    • Los Angeles, October
    • R. Steenbergen, "What's Wrong with IRR", NANOG-44, Los Angeles, October 12-15, 2008.http://www.nanog.org/meetings/nanog44/presentations/ Tuesday/RAS irrdata N44.pdf
    • (2008) NANOG-44 , pp. 12-15
    • Steenbergen, R.1
  • 21
    • 66249091096 scopus 로고    scopus 로고
    • Improving the accuracy of routing registry data
    • los angeles, Oct
    • M. Karir, L. Blunk, T. White, Kevin Chan, and Pat Pannuto, "Improving the Accuracy of Routing Registry Data", NANOG-44, Los Angeles, October 12-15, 2008.http://www.nanog.org/meetings/nanog44/ presentations/ Tuesday/Karir lightning.pdf
    • (2008) NANOG-44 , pp. 12-15
    • Karir, M.1    Blunk, L.2    White, T.3    Chan, K.4    Pannuto, P.5
  • 22
    • 66249113388 scopus 로고    scopus 로고
    • ARIN engineering report
    • Los Angeles, October 15-17
    • M. Kosters, "ARIN Engineering Report", ARIN-22, Los Angeles, October 15-17, 2008.http://www.arin.net/meetings/minutes/ARIN XXII/PDF/friday/engineering report.pdf
    • (2008) ARIN-22 , pp. 15-17
    • Kosters, M.1
  • 25
  • 27
    • 0342446307 scopus 로고    scopus 로고
    • Protection of BGP sessions via the TCP MD5 signature option
    • August
    • A. Heffernan, "Protection of BGP Sessions via the TCP MD5 Signature Option", IETF RFC 2385,August 1998
    • (1998) IETF RFC 2385
    • Heffernan, A.1
  • 31
    • 0038381467 scopus 로고    scopus 로고
    • Fixing BGP might be difficult-or not so tough
    • May/June
    • G. Goth, "Fixing BGP Might Be Difficult-Or Not So Tough", IEEE Internet Computing,vol. 07, no. 3, pp. 7-9, May/June 2003
    • (2003) IEEE Internet Computing , vol.3 , Issue.3 , pp. 7-9
    • Goth, G.1
  • 32
    • 33749869113 scopus 로고    scopus 로고
    • Study of BGP peering session attacks and their impacts on routing performance
    • DOI 10.1109/JSAC.2006.877218, 1705621
    • K. Sriram, D. Montgomery, O. Borchert, O. Kim, and R. Kuhn",Study of BGP Peering Session Attacks and Their Impacts on Routing Performance," IEEE Journal on Selected Areas in Communications: Special issue on High-Speed Network Security, Vol. 24, No. 10, October 2006, pp.1901-1915 (Pubitemid 44559603)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1901-1915
    • Sriram, K.1    Montgomery, D.2    Borchert, O.3    Kim, O.4    Kyhn, D.R.5
  • 33
    • 66249100109 scopus 로고    scopus 로고
    • Border gateway protocol (BGP): Investigation of vulnerabilities and simulation studies of attack impacts
    • Oct
    • K. Sriram, D. Montgomery, O. Borchert, O. Kim, and R. Kuhn",Border Gateway Protocol (BGP): Investigation of Vulnerabilities and Simulation Studies of Attack Impacts," NIST IIP project presentation slides, October 2006. http://www.antd.nist.gov/ ksriram/BGP Security Analysis NIST Study.pdf
    • (2006) NIST IIP Project Presentation Slides
    • Sriram, K.1    Montgomery, D.2    Borchert, O.3    Kim, O.4    Kuhn, R.5
  • 37
    • 0002790143 scopus 로고    scopus 로고
    • Routing policy specification language(RPSL)
    • June
    • C. Alaettinoglu et al., "Routing Policy Specification Language(RPSL)", IETF RFC 2622,June 1999
    • (1999) IETF RFC 2622
    • Alaettinoglu, C.1
  • 38
    • 66249134800 scopus 로고    scopus 로고
    • Routing policy specification language next generation (RPSLng)
    • March
    • L. Blunk et al., "Routing Policy Specification Language next generation (RPSLng)", IETF RFC 4012, March 2005
    • (2005) IETF RFC 4012
    • Blunk, L.1
  • 39
    • 66249093680 scopus 로고    scopus 로고
    • Routing policy system security
    • C. Villamizar et al., "Routing Policy System Security", IETF RFC 2725. http://www.ietf.org/rfc/rfc2725.txt
    • IETF RFC 2725
    • Villamizar, C.1
  • 40
    • 66249111010 scopus 로고    scopus 로고
    • Merit Network's Routing Assets Database, http://www.radb.net/about.html
  • 41
    • 66249103849 scopus 로고    scopus 로고
    • Validation of route origination in BGP using the resource certificate PKI
    • Oct. 6, draftietf-sidr-roa-validation-01.txt
    • G. Huston and G. Michaelson, "Validation of Route Origination in BGP using the Resource Certificate PKI", October 6, 2008, Work in progress, IETF SIDR Working Group, draftietf-sidr-roa-validation-01.txt.
    • (2008) Work in progress, IETF Sidr Working Group
    • Huston, G.1    Michaelson, G.2
  • 43
    • 66249084389 scopus 로고    scopus 로고
    • IPv4 heatmaps software
    • IPv4 Heatmaps Software, The Measurement Factory, http://maps.measurement- factory.com/software/ipv4-heatmap.1.html
    • The Measurement Factory
  • 44
    • 66249105207 scopus 로고    scopus 로고
    • Online version of this paper with some additional details and color graphics, http://www.antd.nist.gov/ ksriram/NIST BGP-Robustness.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.