-
1
-
-
84871972422
-
-
RIPE RIS Raw Data. http://www.ripe.net/projects/ris/rawdata.html.
-
RIPE RIS Raw Data
-
-
-
4
-
-
36949014918
-
A study of prefix hijacking and interception in the internet
-
Aug.
-
H. Ballani, P. Francis, and X. Zhang. A Study of Prefix Hijacking and Interception in the Internet. In Proc. ACM SIGCOMM, Aug. 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
6
-
-
34547369855
-
Optimizing BGP security by exploiting path stability
-
Nov.
-
K. Butler, P. McDaniel, and W. Aiello. Optimizing BGP Security by Exploiting Path Stability. In Proc. ACM CCS, Nov. 2006.
-
(2006)
Proc. ACM CCS
-
-
Butler, K.1
McDaniel, P.2
Aiello, W.3
-
8
-
-
36949024396
-
The generalized TTL security mechanism (GTSM)
-
Feb.
-
V. Gill, J. Heasley, and D. Meyer. The Generalized TTL Security Mechanism (GTSM). RFC 3682, Feb. 2004. http://www.ietf.org/rfc/rfc3682.txt.
-
(2004)
RFC 3682
-
-
Gill, V.1
Heasley, J.2
Meyer, D.3
-
9
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
Feb.
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proc. NDSS, Feb. 2003.
-
(2003)
Proc. NDSS
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
10
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
May
-
X. Hu and Z. M. Mao. Accurate Real-time Identification of IP Prefix Hijacking. In Proc. IEEE Security and Privacy, May 2007.
-
(2007)
Proc. IEEE Security and Privacy
-
-
Hu, X.1
Mao, Z.M.2
-
11
-
-
26444521917
-
SPV: Secure path vector routing for securing BGP
-
Aug.
-
Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure Path Vector Routing for Securing BGP. In Proc. ACM SIGCOMM, Aug. 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
12
-
-
84876277467
-
-
iPlane. http://iplane.cs.washington.edu/.
-
-
-
-
13
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDos traffic
-
Oct.
-
C. Jin, H. Wang, and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDos Traffic. In Proc. ACM CCS, Oct. 2003.
-
(2003)
Proc. ACM CCS
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
14
-
-
0014129195
-
Hierarchical clustering schemes
-
S. Johnson. Hierarchical Clustering Schemes. In Psychometrika, 1967.
-
(1967)
Psychometrika
-
-
Johnson, S.1
-
15
-
-
36949030372
-
Pretty good BGP: Protecting BGP by cautiously selecting routes
-
Nov.
-
J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes. In Proc. IEEE ICNP, Nov. 2006.
-
(2006)
Proc. IEEE ICNP
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
17
-
-
17744396158
-
A BGP attack against traffic engineering
-
J. Kim, S. Y. Ko, D. M. Nicol, X. A. Dimitropoulos, and G. F. Riley. A BGP Attack against Traffic Engineering. In Proc. of the 36th conference on Winter simulation, 2004.
-
(2004)
Proc. of the 36th Conference on Winter Simulation
-
-
Kim, J.1
Ko, S.Y.2
Nicol, D.M.3
Dimitropoulos, X.A.4
Riley, G.F.5
-
19
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
Aug.
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A Prefix Hijack Alert System. In Proc. USENIX Security Symposium, Aug. 2006.
-
(2006)
Proc. USENIX Security Symposium
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
20
-
-
36048995031
-
Understanding resiliency of internet topology against prefix hijack attacks
-
June
-
M. Lad, R. Oliveira, B. Zhang, and L. Zhang. Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks. In Proc. IEEE/IFIP DSN, June 2007.
-
(2007)
Proc. IEEE/IFIP DSN
-
-
Lad, M.1
Oliveira, R.2
Zhang, B.3
Zhang, L.4
-
24
-
-
84876219941
-
-
Aki Nakao. PLUTO BGP Sensor/BGP Feed. http://www.planet-lab-jp.org/pluto/ pluto-bgp-sensor.html.
-
PLUTO BGP Sensor/BGP Feed
-
-
-
27
-
-
84876225011
-
-
PlanetLab. http://www.planet-lab.org.
-
-
-
-
28
-
-
38549165399
-
Efficient techniques for detecting false origin advertisements in inter-domain routing
-
Nov.
-
S. Y. Qiu, F. Monrose, A. Terzis, and P. D. McDaniel. Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing. In Proc. IEEE NPsec, Nov. 2006.
-
(2006)
Proc. IEEE NPsec
-
-
Qiu, S.Y.1
Monrose, F.2
Terzis, A.3
McDaniel, P.D.4
-
29
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Sept.
-
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
30
-
-
34548310427
-
Neighborhood watch for internet routing: Can we improve the robustness of internet routing today?
-
May
-
G. Siganos and M. Faloutsos. Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? In Proc. IEEE INFOCOM, May 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Siganos, G.1
Faloutsos, M.2
-
32
-
-
25844451341
-
Listen and whisper: Security mechanisms for BGP
-
Mar.
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proc. USENIX NSDI, Mar. 2004.
-
(2004)
Proc. USENIX NSDI
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.H.5
-
34
-
-
0037629741
-
Protecting BGP routes to top level DNS servers
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, and L. Zhang. Protecting BGP Routes to Top Level DNS Servers. In Proc. IEEE ICDCS, 2003.
-
(2003)
Proc. IEEE ICDCS
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Mankin, A.6
Wu, S.7
Zhang, L.8
-
35
-
-
1542300243
-
An analysis BGP multiple origin AS(MOAS) conflicts
-
Oct.
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang. An Analysis BGP Multiple Origin AS(MOAS) Conflicts. In Proc. ACM IMW, Oct. 2001.
-
(2001)
Proc. ACM IMW
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
36
-
-
0036922184
-
Dection of invalid routing announcement in the internet
-
June
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang. Dection of Invalid Routing Announcement in the Internet. In Proc. IEEE/IFIP DSN, June 2002.
-
(2002)
Proc. IEEE/IFIP DSN
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
|