-
1
-
-
84872288920
-
-
"Nanog Mailing List," http://www.nanog.org/mailinglist.html.
-
Nanog Mailing List
-
-
-
2
-
-
33645757765
-
-
Apr
-
"7007 Explanation and Apology," Apr 1997, http://www.merit.edu/ mail.archives/nanog/1997-04/msg00444.html.
-
(1997)
7007 Explanation and Apology
-
-
-
3
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A prefix hijack alert system," in Proc. of USENIX Security symposium, 2006.
-
(2006)
Proc. of USENIX Security Symposium
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
4
-
-
44049101942
-
Pretty good BGP: Improving BGP by cautiously adopting routes
-
J. Karlin, S. Forrest, and J. Rexford, "Pretty Good BGP: Improving BGP by Cautiously Adopting Routes," in Proc. of ICNP, 2006.
-
(2006)
Proc. of ICNP
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
6
-
-
64049086532
-
Short-lived prefix hijacking on the internet
-
P. Boothe, J. Hiebert, and R. Bush, "Short-Lived Prefix Hijacking on the Internet," NANOG 36 meeting, 2006, http://www.nanog.org/mtg-0602/pdf/ boothe.pdf.
-
(2006)
NANOG 36 Meeting
-
-
Boothe, P.1
Hiebert, J.2
Bush, R.3
-
8
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (S-BGP)," IEEE Journal on Selected Areas in Communication, vol. 18, no. 4, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communication
, vol.18
, Issue.4
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
9
-
-
25844451341
-
Listen and whisper: Security mechanisms for BGP
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz, "Listen and whisper: Security mechanisms for BGP," in Proc. of USENIX/ACM NSDI, 2004.
-
(2004)
Proc. of USENIX/ACM NSDI
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
10
-
-
85180417570
-
Pretty secure BGP, psBGP
-
T. Wan, E. Kranakis, and P. van Oorschot, "Pretty Secure BGP, psBGP," in Proc. of NDSS, 2005.
-
(2005)
Proc. of NDSS
-
-
Wan, T.1
Kranakis, E.2
Van Oorschot, P.3
-
14
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing," in Proc. of NDSS, 2003.
-
(2003)
Proc. of NDSS
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
15
-
-
35248861643
-
-
LNCS
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, "Topology-based Detection of Anomalous BGP Messages," LNCS, 2003.
-
(2003)
Topology-based Detection of Anomalous BGP Messages
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
16
-
-
0037629741
-
Protecting BGP routes to top level DNS servers
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "Protecting BGP Routes to Top Level DNS Servers," in Proc. of ICDCS, 2003.
-
(2003)
Proc. of ICDCS
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Mankin, A.6
Wu, S.F.7
Zhang, L.8
-
17
-
-
0036922184
-
Detection of invalid routing announcement in the internet
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "Detection of Invalid Routing Announcement in the Internet," in Proc. of DSN, 2002.
-
(2002)
Proc. of DSN
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
18
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
-
S. T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma, and S. F. Wu, "Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP," in Proc. of ACM workshop on Visualization and data mining for computer security, 2004.
-
(2004)
Proc. of ACM Workshop on Visualization and Data Mining for Computer Security
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.-M.3
Ma, K.-L.4
Wu, S.F.5
-
21
-
-
36949036650
-
A light-weight distributed scheme for detecting IP prefix hijacks in realtime
-
August
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Realtime," in Proc. of ACM SIGCOMM, August 2007.
-
(2007)
Proc. of ACM SIGCOMM
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
24
-
-
17744396158
-
A BGP attack against traffic engineering
-
J. Kim, S. Y. Ko, D. M. Nicol, X. A. Dimitropoulos, and G. F. Riley, "A BGP Attack Against Traffic Engineering," in Proc. of WSC, 2004.
-
(2004)
Proc. of WSC
-
-
Kim, J.1
Ko, S.Y.2
Nicol, D.M.3
Dimitropoulos, X.A.4
Riley, G.F.5
-
26
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "An analysis of BGP multiple origin AS (MOAS) conflicts," in Proc. of ACM SIGCOMM IMW, 2001.
-
(2001)
Proc. of ACM SIGCOMM IMW
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
27
-
-
0035009719
-
The impact of internet policy and topology on delayed routing convergence
-
C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence," in Proc. of IEEE INFOCOM, 2001.
-
(2001)
Proc. of IEEE INFOCOM
-
-
Labovitz, C.1
Ahuja, A.2
Wattenhofer, R.3
Srinivasan, V.4
-
30
-
-
0035704351
-
On inferring autonomous system relationships in the internet
-
L. Gao, "On Inferring Autonomous System relationships in the Internet," IEEE/ACM Trans. Netw., vol. 9, no. 6, 2001.
-
(2001)
IEEE/ACM Trans. Netw.
, vol.9
, Issue.6
-
-
Gao, L.1
-
33
-
-
0141920459
-
BGP routing stability of popular destinations
-
J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP routing stability of popular destinations," in Proc. of Internet Measurment Workshop, 2002.
-
(2002)
Proc. of Internet Measurment Workshop
-
-
Rexford, J.1
Wang, J.2
Xiao, Z.3
Zhang, Y.4
-
34
-
-
84874550218
-
-
"Alexa Top Sites," http://www.alexa.com/site/ds/top-sites?ts- mode=global.
-
Alexa Top Sites
-
-
-
35
-
-
84858511180
-
-
July
-
A. Ma, "CAIDA AS Relationships," July 2006, http://www.caida.org/data/active/as-relationships/.
-
(2006)
CAIDA as Relationships
-
-
Ma, A.1
-
36
-
-
84858487584
-
-
Apr
-
"Quagga Routing Suite," Apr 2006, http://www.quagga.net/.
-
(2006)
Quagga Routing Suite
-
-
-
37
-
-
36949009796
-
Auto-detecting hijacked prefixes?
-
G. Huston, "Auto-Detecting Hijacked Prefixes?" RIPE 50 meeting, 2005, http://www.ripe.net/ripe/meetings/ripe-50/presentations/index.html.
-
(2005)
RIPE 50 Meeting
-
-
Huston, G.1
-
38
-
-
84872956076
-
IPlane: An information plane for distributed services
-
H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani., "iPlane: An Information Plane for Distributed Services," in Proc. of OSDI, 2006.
-
(2006)
Proc. of OSDI
-
-
Madhyastha, H.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.5
Krishnamurthy, A.6
Venkataramani, A.7
-
39
-
-
10444287344
-
PlanetLab: An overlay testbed for broad-coverage services
-
July
-
B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman, "PlanetLab: An Overlay Testbed for Broad-Coverage Services," ACM SIGCOMM Computer Communication Review, vol. 33, no. 3, July 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.3
-
-
Chun, B.1
Culler, D.2
Roscoe, T.3
Bavier, A.4
Peterson, L.5
Wawrzoniak, M.6
Bowman, M.7
-
41
-
-
4544363839
-
Towards an accurate AS-level traceroute tool
-
Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz, "Towards an accurate AS-level traceroute tool," in Proc. of ACM SIGCOMM, 2003.
-
(2003)
Proc. of ACM SIGCOMM
-
-
Mao, Z.M.1
Rexford, J.2
Wang, J.3
Katz, R.H.4
-
42
-
-
84858492637
-
-
May
-
"SprintLink's BGP Policy," May 2006, http://www.sprintlink.net/ policy/bgp.html.
-
(2006)
SprintLink's BGP Policy
-
-
-
43
-
-
36949025380
-
Don't secure routing protocols, secure data delivery
-
D. Wendlandt, I. Avramopoulos, D. G. Andersen, and J. Rexford, "Don't Secure Routing Protocols, Secure Data Delivery," in Proc. of workshop on Hot Topics in Networks, 2006.
-
(2006)
Proc. of Workshop on Hot Topics in Networks
-
-
Wendlandt, D.1
Avramopoulos, I.2
Andersen, D.G.3
Rexford, J.4
-
44
-
-
36048995031
-
Understanding resiliency of internet topology against prefix hijack attacks
-
M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks," in Proc. of IEEE/IF IP DSN, 2007.
-
(2007)
Proc. of IEEE/IF IP DSN
-
-
Lad, M.1
Oliveira, R.2
Zhang, B.3
Zhang, L.4
-
45
-
-
36949026321
-
Building an AS-topology model that captures route diversity
-
W. Mühlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig, "Building an AS-topology model that captures route diversity," in Proc. of ACM Sigcomm, 2006.
-
(2006)
Proc. of ACM Sigcomm
-
-
Mühlbauer, W.1
Feldmann, A.2
Maennel, O.3
Roughan, M.4
Uhlig, S.5
-
48
-
-
33645783230
-
An empirical study of "bogon" route advertisements
-
N. Feamster, J. Jung, and H. Balakrishnan, "An empirical study of "bogon" route advertisements," SIGCOMM Comput. Commun. Rev., vol. 35, no. 1, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.1
-
-
Feamster, N.1
Jung, J.2
Balakrishnan, H.3
|