메뉴 건너뛰기




Volumn 37, Issue 4, 2007, Pages 265-276

A study of prefix hijacking and interception in the internet

Author keywords

BGP; Hijacking; Interception; Routing

Indexed keywords

BGP; BLACK HOLES; HIJACKING; INTERCEPTION PROBLEM; PREFIX HIJACKING; REAL TRAFFIC; ROUTING;

EID: 70350437166     PISSN: 01464833     EISSN: 19435819     Source Type: Conference Proceeding    
DOI: 10.1145/1282427.1282411     Document Type: Article
Times cited : (116)

References (53)
  • 1
  • 2
    • 33645757765 scopus 로고    scopus 로고
    • Apr
    • "7007 Explanation and Apology," Apr 1997, http://www.merit.edu/ mail.archives/nanog/1997-04/msg00444.html.
    • (1997) 7007 Explanation and Apology
  • 4
    • 44049101942 scopus 로고    scopus 로고
    • Pretty good BGP: Improving BGP by cautiously adopting routes
    • J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes," in Proc. of ICNP, 2006.
    • (2006) Proc. of ICNP
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 6
    • 64049086532 scopus 로고    scopus 로고
    • Short-lived prefix hijacking on the internet
    • P. Boothe, J. Hiebert, and R. Bush, "Short-Lived Prefix Hijacking on the Internet," NANOG 36 meeting, 2006, http://www.nanog.org/mtg-0602/pdf/ boothe.pdf.
    • (2006) NANOG 36 Meeting
    • Boothe, P.1    Hiebert, J.2    Bush, R.3
  • 14
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing," in Proc. of NDSS, 2003.
    • (2003) Proc. of NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 21
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detecting IP prefix hijacks in realtime
    • August
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Realtime," in Proc. of ACM SIGCOMM, August 2007.
    • (2007) Proc. of ACM SIGCOMM
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5
  • 23
  • 30
    • 0035704351 scopus 로고    scopus 로고
    • On inferring autonomous system relationships in the internet
    • L. Gao, "On Inferring Autonomous System relationships in the Internet," IEEE/ACM Trans. Netw., vol. 9, no. 6, 2001.
    • (2001) IEEE/ACM Trans. Netw. , vol.9 , Issue.6
    • Gao, L.1
  • 34
    • 84874550218 scopus 로고    scopus 로고
    • "Alexa Top Sites," http://www.alexa.com/site/ds/top-sites?ts- mode=global.
    • Alexa Top Sites
  • 35
    • 84858511180 scopus 로고    scopus 로고
    • July
    • A. Ma, "CAIDA AS Relationships," July 2006, http://www.caida.org/data/active/as-relationships/.
    • (2006) CAIDA as Relationships
    • Ma, A.1
  • 36
  • 37
    • 36949009796 scopus 로고    scopus 로고
    • Auto-detecting hijacked prefixes?
    • G. Huston, "Auto-Detecting Hijacked Prefixes?" RIPE 50 meeting, 2005, http://www.ripe.net/ripe/meetings/ripe-50/presentations/index.html.
    • (2005) RIPE 50 Meeting
    • Huston, G.1
  • 42
    • 84858492637 scopus 로고    scopus 로고
    • May
    • "SprintLink's BGP Policy," May 2006, http://www.sprintlink.net/ policy/bgp.html.
    • (2006) SprintLink's BGP Policy
  • 44
    • 36048995031 scopus 로고    scopus 로고
    • Understanding resiliency of internet topology against prefix hijack attacks
    • M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks," in Proc. of IEEE/IF IP DSN, 2007.
    • (2007) Proc. of IEEE/IF IP DSN
    • Lad, M.1    Oliveira, R.2    Zhang, B.3    Zhang, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.