메뉴 건너뛰기




Volumn 37, Issue 4, 2007, Pages 277-288

A light-weight distributed scheme for detecting IP prefix hijacks in real-time

Author keywords

BGP; Detection; Hijacking; Interception; Routing

Indexed keywords

BGP; DISTRIBUTED SCHEMES; FALSE POSITIVE AND FALSE NEGATIVES; HIJACKING; INTERNET MEASUREMENT; IP PREFIX HIJACKINGS; MULTIPLE VANTAGE POINTS; ROUTING;

EID: 70350444325     PISSN: 01464833     EISSN: 19435819     Source Type: Conference Proceeding    
DOI: 10.1145/1282427.1282412     Document Type: Article
Times cited : (35)

References (36)
  • 1
    • 84871972422 scopus 로고    scopus 로고
    • RIPE RIS Raw Data. http://www.ripe.net/projects/ris/rawdata.html.
    • RIPE RIS Raw Data
  • 4
    • 36949014918 scopus 로고    scopus 로고
    • A study of prefix hijacking and interception in the internet
    • Aug.
    • H. Ballani, P. Francis, and X. Zhang. A Study of Prefix Hijacking and Interception in the Internet. In Proc. ACM SIGCOMM, Aug. 2007.
    • (2007) Proc. ACM SIGCOMM
    • Ballani, H.1    Francis, P.2    Zhang, X.3
  • 6
    • 34547369855 scopus 로고    scopus 로고
    • Optimizing BGP security by exploiting path stability
    • Nov.
    • K. Butler, P. McDaniel, and W. Aiello. Optimizing BGP Security by Exploiting Path Stability. In Proc. ACM CCS, Nov. 2006.
    • (2006) Proc. ACM CCS
    • Butler, K.1    McDaniel, P.2    Aiello, W.3
  • 8
    • 36949024396 scopus 로고    scopus 로고
    • The generalized TTL security mechanism (GTSM)
    • Feb.
    • V. Gill, J. Heasley, and D. Meyer. The Generalized TTL Security Mechanism (GTSM). RFC 3682, Feb. 2004. http://www.ietf.org/rfc/rfc3682.txt.
    • (2004) RFC 3682
    • Gill, V.1    Heasley, J.2    Meyer, D.3
  • 9
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • Feb.
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proc. NDSS, Feb. 2003.
    • (2003) Proc. NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 10
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • May
    • X. Hu and Z. M. Mao. Accurate Real-time Identification of IP Prefix Hijacking. In Proc. IEEE Security and Privacy, May 2007.
    • (2007) Proc. IEEE Security and Privacy
    • Hu, X.1    Mao, Z.M.2
  • 11
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure path vector routing for securing BGP
    • Aug.
    • Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In Proc. ACM SIGCOMM, Aug. 2004.
    • (2004) Proc. ACM SIGCOMM
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 12
    • 84876277467 scopus 로고    scopus 로고
    • iPlane. http://iplane.cs.washington.edu/.
  • 13
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed DDos traffic
    • Oct.
    • C. Jin, H. Wang, and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic. In Proc. ACM CCS, Oct. 2003.
    • (2003) Proc. ACM CCS
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 14
    • 0014129195 scopus 로고
    • Hierarchical clustering schemes
    • S. Johnson. Hierarchical Clustering Schemes. In Psychometrika, 1967.
    • (1967) Psychometrika
    • Johnson, S.1
  • 15
    • 36949030372 scopus 로고    scopus 로고
    • Pretty good BGP: Protecting BGP by cautiously selecting routes
    • Nov.
    • J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes. In Proc. IEEE ICNP, Nov. 2006.
    • (2006) Proc. IEEE ICNP
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 18
  • 20
    • 36048995031 scopus 로고    scopus 로고
    • Understanding resiliency of internet topology against prefix hijack attacks
    • June
    • M. Lad, R. Oliveira, B. Zhang, and L. Zhang. Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks. In Proc. IEEE/IFIP DSN, June 2007.
    • (2007) Proc. IEEE/IFIP DSN
    • Lad, M.1    Oliveira, R.2    Zhang, B.3    Zhang, L.4
  • 23
  • 24
    • 84876219941 scopus 로고    scopus 로고
    • Aki Nakao. PLUTO BGP Sensor/BGP Feed. http://www.planet-lab-jp.org/pluto/ pluto-bgp-sensor.html.
    • PLUTO BGP Sensor/BGP Feed
  • 27
    • 84876225011 scopus 로고    scopus 로고
    • PlanetLab. http://www.planet-lab.org.
  • 28
    • 38549165399 scopus 로고    scopus 로고
    • Efficient techniques for detecting false origin advertisements in inter-domain routing
    • Nov.
    • S. Y. Qiu, F. Monrose, A. Terzis, and P. D. McDaniel. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. In Proc. IEEE NPsec, Nov. 2006.
    • (2006) Proc. IEEE NPsec
    • Qiu, S.Y.1    Monrose, F.2    Terzis, A.3    McDaniel, P.D.4
  • 29
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Sept.
    • A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Sept. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 30
    • 34548310427 scopus 로고    scopus 로고
    • Neighborhood watch for internet routing: Can we improve the robustness of internet routing today?
    • May
    • G. Siganos and M. Faloutsos. Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? In Proc. IEEE INFOCOM, May 2007.
    • (2007) Proc. IEEE INFOCOM
    • Siganos, G.1    Faloutsos, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.