-
5
-
-
64049086532
-
How prevalent is prefix hijacking on the Internet?
-
Feb. [Online]
-
P. Boothe, J. Hiebert, and R. Bush, "How prevalent is prefix hijacking on the Internet?'' in Proc. NANOG 36, Feb. 2006 [Online]. Available: http://www.nanog.org/ mtg-0602/boothe.html-net.shtml
-
(2006)
Proc. NANOG
, vol.36
-
-
Boothe, P.1
Hiebert, J.2
Bush, R.3
-
7
-
-
84875608233
-
-
[Online]
-
Rensys Blog, Pakistan Hijacks YouTube. [Online]. Available: http://www.renesys.com/blog/2008/02/pakistan-hijacks-youtube-1.shtml%
-
Rensys Blog, Pakistan Hijacks YouTube
-
-
-
8
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Aug.
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, Aug. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
9
-
-
36949014918
-
A study of prefix hijacking and interception in the Internet
-
Aug.
-
H. Ballani, P. Francis, and X. Zhang, BA study of prefix hijacking and interception in the Internet," in Proc. ACM SIGCOMM, Aug. 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
11
-
-
72949087509
-
-
[Online]
-
Secure Inter-Domain Routing. [Online]. Available: http://www.ietf.org/ html.charters/sidr-charter.html.
-
Secure Inter-Domain Routing
-
-
-
12
-
-
72949101194
-
-
North American Network Operators Group. [Online]
-
North American Network Operators Group. [Online]. Available: www.nanog.org.
-
-
-
-
13
-
-
1642408605
-
Measuring ISP topologies with Rocketfuel
-
Feb.
-
N. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP topologies with Rocketfuel," IEEE/ACM Trans. Networking, vol. 12, no. 1, pp. 2-16, Feb. 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.1
, pp. 2-16
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
-
17
-
-
33645361020
-
BGP routing policies in ISP networks
-
Nov.-Dec.
-
M. Caesar and J. Rexford, "BGP routing policies in ISP networks," IEEE Network, vol.19, no.6, pp. 5-11, Nov.-Dec. 2005.
-
(2005)
IEEE Network
, vol.19
, Issue.6
, pp. 5-11
-
-
Caesar, M.1
Rexford, J.2
-
18
-
-
0003973081
-
-
2nd ed. Reading, MA: Addison Wesley
-
R. Perlman, Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd ed. Reading, MA: Addison Wesley, 1999.
-
(1999)
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols
-
-
Perlman, R.1
-
20
-
-
0035699394
-
Stable Internet routing without global coordination
-
Dec.
-
L. Gao and J. Rexford, "Stable Internet routing without global coordination," IEEE/ACM Trans. Networking, Dec. 2001.
-
(2001)
IEEE/ACM Trans. Networking
-
-
Gao, L.1
Rexford, J.2
-
21
-
-
0003828107
-
-
Ph.D. dissertation, Massachusetts Inst. Technol., Cambridge, Oct. MIT/LCS/TR-429
-
R. Perlman, "Network layer protocols with Byzantine robustness," Ph.D. dissertation, Massachusetts Inst. Technol., Cambridge, Oct. 1988. MIT/LCS/TR-429.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.1
-
23
-
-
0003629990
-
-
U.S. National Bureau of Standards Aug.
-
U.S. National Bureau of Standards, Secure Hash Standard, FIPS PUB 180-182, Aug. 2002.
-
(2002)
Secure Hash Standard, FIPS PUB
, pp. 180-182
-
-
-
25
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
26
-
-
1942508030
-
On the complexity of the discrete logarithm and Diffie-Hellman problems
-
Apr.-Jun.
-
I. F. Blake and T. Garefalakis, "On the complexity of the discrete logarithm and Diffie-Hellman problems," J. Complexity, vol.20, no.2-3, pp. 148-170, Apr.-Jun. 2004.
-
(2004)
J. Complexity
, vol.20
, Issue.2-3
, pp. 148-170
-
-
Blake, I.F.1
Garefalakis, T.2
-
27
-
-
84964539491
-
Public-key infrastructure for the secure border gateway protocol (S-BGP)
-
Anaheim, CA, Jun.
-
K. Seo, C. Lynn, and S. Kent, "Public-key infrastructure for the secure border gateway protocol (S-BGP)," in IEEE DARPA Information Survivability Conference and Exposition II, Anaheim, CA, Jun. 2001.
-
(2001)
IEEE DARPA Information Survivability Conference and Exposition II
-
-
Seo, K.1
Lynn, C.2
Kent, S.3
-
29
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Apr.
-
S. M. Bellovin, "Security problems in the TCP/IP protocol suite," Comput. Commun. Rev., vol.2, no.19, pp. 32-48, Apr. 1989.
-
(1989)
Comput. Commun. Rev.
, vol.2
, Issue.19
, pp. 32-48
-
-
Bellovin, S.M.1
-
30
-
-
72949114246
-
BGP security update: Is the sky falling?
-
Jun.
-
B. Green, "BGP security update: Is the sky falling?'' in Proc. NANOG 25, Jun. 2002.
-
(2002)
Proc. NANOG
, vol.25
-
-
Green, B.1
-
32
-
-
0013002936
-
Securing the border gateway routing protocol
-
London, U.K., Nov.
-
B. Smith and J. Garcia-Luna-Aceves, "Securing the border gateway routing protocol," in Global Internet '96, London, U.K., Nov. 1996.
-
(1996)
Global Internet '96
-
-
Smith, B.1
Garcia-Luna-Aceves, J.2
-
33
-
-
0032026162
-
Efficient security mechanisms for the border gateway routing protocol
-
B. Smith and J. Garcia-Luna-Aceves "Efficient security mechanisms for the border gateway routing protocol," Comput. Commun., vol. 21, no. 3, pp. 203-210, 1998.
-
(1998)
Comput. Commun.
, vol.21
, Issue.3
, pp. 203-210
-
-
Smith, B.1
Garcia-Luna-Aceves, J.2
-
34
-
-
0034514644
-
Hop integrity in computer networks
-
M. G. Gouda, E. N. Elnozahy, C.-T. Huang, and T. M. McGuire, "Hop integrity in computer networks," in Proc. 8th Int. Conf. Network Protocols, Osaka, Japan, Nov. 2000.
-
(2000)
Proc. 8th Int. Conf. Network Protocols, Osaka, Japan
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.-T.3
McGuire, T.M.4
-
41
-
-
0003406380
-
-
RFC 2764, Feb.
-
B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis, A Framework for IP Based Virtual Private Networks, RFC 2764, Feb. 2000
-
(2000)
A Framework for IP Based Virtual Private Networks
-
-
Gleeson, B.1
Lin, A.2
Heinanen, J.3
Armitage, G.4
Malis, A.5
-
43
-
-
2142662577
-
-
RFC 2270, Jan.
-
J. Stewart, T. Bates, R. Chandra, and E. Chen, Using a Dedicated AS for Sites Homed to a Single Provider, RFC 2270, Jan. 1998.
-
(1998)
Using A Dedicated AS for Sites Homed to A Single Provider
-
-
Stewart, J.1
Bates, T.2
Chandra, R.3
Chen, E.4
-
46
-
-
11244338691
-
Beware of BGP attacks
-
Apr.
-
O. Nordstr̈om and C. Dovrolis, "Beware of BGP attacks," Comput. Commun. Rev., vol.34, no.2, pp. 1-8, Apr. 2004.
-
(2004)
Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 1-8
-
-
Nordstr̈om, O.1
Dovrolis, C.2
-
47
-
-
14944349328
-
BorderGuard: Detecting cold potatoes from peers
-
Taormina, Italy, Oct.
-
N. Feamster, Z. M. Mao, and J. Rexford, "BorderGuard: Detecting cold potatoes from peers," in Proc. 2004 Internet Measurement Conf., Taormina, Italy, Oct. 2004.
-
(2004)
Proc. 2004 Internet Measurement Conf.
-
-
Feamster, N.1
Mao, Z.M.2
Rexford, J.3
-
48
-
-
0342622841
-
-
RFC 1786, Mar.
-
T. Bates, E. Gerich, L. Joncheray, J.-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu, Representation of IP Routing Policies in a Routing Registry, RFC 1786, Mar. 1995.
-
(1995)
Representation of IP Routing Policies in A Routing Registry
-
-
Bates, T.1
Gerich, E.2
Joncheray, L.3
Jouanigot, J.-M.4
Karrenberg, D.5
Terpstra, M.6
Yu, J.7
-
49
-
-
72949096094
-
Routing Policy Specification Language Next Generation (RPSLng)
-
Mar.
-
L. Blunk, J. Damas, F. Parent, and A. Robachevsky, Routing Policy Specification Language Next Generation (RPSLng), RFC 4012, Mar. 2005.
-
(2005)
RFC
, vol.4012
-
-
Blunk, L.1
Damas, J.2
Parent, F.3
Robachevsky, A.4
-
50
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
Dec.
-
L. Gao, "On inferring autonomous system relationships in the Internet," IEEE/ACM Trans. Networking, vol.9, no.6, pp. 733-745, Dec. 2001.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, Issue.6
, pp. 733-745
-
-
Gao, L.1
-
51
-
-
0036346301
-
Characterizing the Internet hierarchy from multiple vantage points
-
New York, Jun.
-
L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet hierarchy from multiple vantage points," in IEEE INFOCOM 2002, New York, Jun. 2002.
-
(2002)
IEEE INFOCOM 2002
-
-
Subramanian, L.1
Agarwal, S.2
Rexford, J.3
Katz, R.4
-
52
-
-
84876393159
-
AS relationships: Inference and validation
-
Jan.
-
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, K. C. Claffy, and G. Riley, "AS relationships: Inference and validation," ACM SIGCOMM Comput. Commun. Rev., vol.37, no.1, pp. 29-40, Jan. 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 29-40
-
-
Dimitropoulos, X.1
Krioukov, D.2
Fomenkov, M.3
Huffaker, B.4
Hyun, Y.5
Claffy, K.C.6
Riley, G.7
-
54
-
-
72949090575
-
A Profile for Route Origin Authorizations (ROAs)
-
Jul.
-
M. Lepinksi, S. Kent, and D. Kong, A Profile for Route Origin Authorizations (ROAs), Internet Draft, Jul. 2009.
-
(2009)
Internet Draft
-
-
Lepinksi, M.1
Kent, S.2
Kong, D.3
-
55
-
-
72949111149
-
-
APNIC Nov [Online]
-
APNIC. (2006, Nov.). The APNIC Resource Certification Page. [Online]. Available: http://mirin.apnic.net/resourcecerts/
-
(2006)
The APNIC Resource Certification Page
-
-
-
59
-
-
72949083481
-
Lack of priority queueing considered harmful
-
Nov.
-
V. Gill, "Lack of priority queueing considered harmful," ACM Qeue, vol.2, no.8, pp. 64-69, Nov. 2004.
-
(2004)
ACM Qeue
, vol.2
, Issue.8
, pp. 64-69
-
-
Gill, V.1
-
60
-
-
70449418120
-
A survey of security techniques for the border gateway protocol (BGP)
-
M. O. Nicholes and B. Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," IEEE Comm. Surveys & Tutorials, vol.11, no.1, Q1 2009.
-
(2009)
IEEE Comm. Surveys & Tutorials
, vol.11
, Issue.1
-
-
Nicholes, M.O.1
Mukherjee, B.2
-
61
-
-
0033743163
-
Secure Border Gateway Protocol (S-BGP)
-
Apr.
-
S. Kent, C. Lynn, and K. Seo, "Secure Border Gateway Protocol (S-BGP)," IEEE J. Sel. Areas Commun., vol.18, no.4, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
62
-
-
33746235595
-
The performance impact of BGP security
-
Nov./Dec.
-
M. Zhao, S. W. Smith, and D. M. Nicol, "The performance impact of BGP security," IEEE Network, vol.19, no.6, pp. 42-48, Nov./Dec. 2005.
-
(2005)
IEEE Network
, vol.19
, Issue.6
, pp. 42-48
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
63
-
-
84867338222
-
Secure Border Gateway Protocol (S-BGP) real world performance and deployment issues
-
San Diego, CA, Feb.
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure Border Gateway Protocol (S-BGP) real world performance and deployment issues," in Proc. ISOC Symp. Network and Distributed System Security (NDSS), San Diego, CA, Feb. 2000.
-
(2000)
Proc. ISOC Symp. Network and Distributed System Security (NDSS)
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
64
-
-
3042699520
-
Evaluation of efficient security for BGP route announcements using parallel simulation
-
Jul.
-
D. M. Nicol, S. W. Smith, and M. Zhao, "Evaluation of efficient security for BGP route announcements using parallel simulation," Simul. Model. Prac. Theor., vol.12, no.3-4, pp. 187-216, Jul. 2004.
-
(2004)
Simul. Model. Prac. Theor.
, vol.12
, Issue.3-4
, pp. 187-216
-
-
Nicol, D.M.1
Smith, S.W.2
Zhao, M.3
-
65
-
-
72949111150
-
SBGPVSecure BGP
-
Jun.
-
S. Bellovin, "SBGPVSecure BGP," in NANOG 28, Jun. 2003.
-
(2003)
NANOG
, vol.28
-
-
Bellovin, S.1
-
66
-
-
2442631758
-
Extensions to BGP to support Secure Origin BGP (soBGP)
-
Apr.
-
J. Ng, Extensions to BGP to Support Secure Origin BGP (soBGP), Internet Draft, Apr. 2004.
-
(2004)
Internet Draft
-
-
Ng, J.1
-
68
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
San Diego, CA, Feb.
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy of interdomain routing," in Proc. ISOC NDSS'03, San Diego, CA, Feb. 2003, pp. 75-85.
-
(2003)
Proc. ISOC NDSS'03
, pp. 75-85
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
70
-
-
0001569845
-
Gossips and telephones
-
B. Baker and R. Shostak, "Gossips and telephones," Discrete Math., no.2, pp. 191-193, 1972.
-
(1972)
Discrete Math.
, vol.2
, pp. 191-193
-
-
Baker, B.1
Shostak, R.2
-
71
-
-
33747891596
-
Origin authentication in interdomain routing
-
Nov.
-
P. McDaniel, W. Aiello, K. Butler, and J. Ioannidis, "Origin authentication in interdomain routing," Comput. Networks, vol.50, no.16, pp. 2953-2980, Nov. 2006.
-
(2006)
Comput. Networks
, vol.50
, Issue.16
, pp. 2953-2980
-
-
McDaniel, P.1
Aiello, W.2
Butler, K.3
Ioannidis, J.4
-
72
-
-
0009554659
-
Protocols for public key cryptosystems
-
Oakland, CA, Apr.
-
R. Merkle, "Protocols for public key cryptosystems," in IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1980.
-
(1980)
IEEE Symp. Security and Privacy
-
-
Merkle, R.1
-
73
-
-
0033733822
-
Certificate revocation and certificate update
-
Apr.
-
M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE J. Sel. Areas Commun., vol.18, no.4, pp. 561-570, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
-
74
-
-
84982836904
-
Efficient security mechanisms for routing protocols
-
San Diego, CA, Feb.
-
Y. Hu, A. Perrig, and D. Johnson, "Efficient security mechanisms for routing protocols," in Proc. ISOC Network and Distributed Systems Security Symp. (NDSS), San Diego, CA, Feb. 2003.
-
(2003)
Proc. ISOC Network and Distributed Systems Security Symp. (NDSS)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
75
-
-
26444521917
-
SPV: Secure path vector routing for securing BGP
-
Portland, OR, Aug.
-
Y.-C. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," in Proc. ACM SIGCOMM, Portland, OR, Aug. 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
76
-
-
0003157491
-
On-line/off-line digital signatures
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," J. Cryptol., vol.9, no.1, pp. 35-67, 1996.
-
(1996)
J. Cryptol.
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
77
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Aug.
-
C. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Networking, vol.7, no.4, pp. 502-513, Aug. 1999.
-
(1999)
IEEE/ACM Trans. Networking
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.1
Lam, S.2
-
79
-
-
0012881303
-
ESIGN: An efficient digital signature implementation for smart cards
-
Brighton, U.K., Apr.
-
A. Fujioka, T. Okamoto, and S. Miyaguchi, "ESIGN: An efficient digital signature implementation for smart cards," in Proc. EUROCYPT, Brighton, U.K., Apr. 1991.
-
(1991)
Proc. EUROCYPT
-
-
Fujioka, A.1
Okamoto, T.2
Miyaguchi, S.3
-
80
-
-
33745774761
-
Aggregated path authentication for efficient BGP security
-
Alexandia, VA, Nov.
-
M. Zhao, S. W. Smith, and D. M. Nicol, "Aggregated path authentication for efficient BGP security," in Proc. 12th ACM Conf. Computer and Communications Security (CCS'05), Alexandia, VA, Nov. 2005.
-
(2005)
Proc. 12th ACM Conf. Computer and Communications Security (CCS'05)
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
81
-
-
33745769875
-
Evaluating the performance impact of PKI on BGP security
-
Gaithersburg, MD, Feb.
-
M. Zhao, S. W. Smith, and D. M. Nicol, "Evaluating the performance impact of PKI on BGP security," in Proc. 4th Annu. PKI R&D Workshop, Gaithersburg, MD, Feb. 2005.
-
(2005)
Proc. 4th Annu. PKI R&D Workshop
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
82
-
-
34547369855
-
Optimizing BGP security by exploiting path stability
-
Alexandia, VA, Nov.
-
K. Butler, P. McDaniel, and W. Aiello, "Optimizing BGP security by exploiting path stability," in Proc. 13th ACM Conf. Computer and Communications Security (CCS'06), Alexandia, VA, Nov. 2006.
-
(2006)
Proc. 13th ACM Conf. Computer and Communications Security (CCS'06)
-
-
Butler, K.1
McDaniel, P.2
Aiello, W.3
-
84
-
-
0041296839
-
Integrating security in inter-domain routing protocols
-
Oct.
-
B. Kumar and J. Crowcroft, "Integrating security in inter-domain routing protocols," ACM SIGCOMM Comput. Commun. Rev., vol.23, no.5, pp. 36-51, Oct. 1993.
-
(1993)
ACM SIGCOMM Comput. Commun. Rev.
, vol.23
, Issue.5
, pp. 36-51
-
-
Kumar, B.1
Crowcroft, J.2
-
86
-
-
34547504417
-
On inter-domain routing security and pretty secure BGP (psBGP)
-
Jul.
-
P. C. van Oorschot, T. Wang, and E. Kranakis, "On inter-domain routing security and pretty secure BGP (psBGP)," ACM Trans. Inf. Syst. Security (TISSEC), vol.10, no.3, Jul. 2007.
-
(2007)
ACM Trans. Inf. Syst. Security (TISSEC)
, vol.10
, Issue.3
-
-
Van Oorschot, P.C.1
Wang, T.2
Kranakis, E.3
-
87
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
San Francisco, CA, Nov.
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "An analysis of BGP multiple origin AS (MOAS) conflicts," in Proc. ACM SIGCOMM Internet Measurement Workshop, 2001, San Francisco, CA, Nov. 2001.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
, vol.2001
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
89
-
-
33750345532
-
Detection of invalid routing announcement in the Internet
-
Washington, DC, Jun.
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Detection of invalid routing announcement in the Internet," in IEEE DSN 2002, Washington, DC, Jun. 2002.
-
(2002)
IEEE DSN 2002
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
90
-
-
0142039755
-
Protecting BGP routes to top level DNS servers
-
Sep.
-
L. Wang, X. Zhao,D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Protecting BGP routes to top level DNS servers," IEEE Trans. Parallel Distrib. Syst., vol.14, no.9, pp. 851-860, Sep. 2003.
-
(2003)
IEEE Trans. Parallel Distrib. Syst.
, vol.14
, Issue.9
, pp. 851-860
-
-
Wang, L.1
Zhaod. Pei, X.2
Bush, R.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
91
-
-
35248861643
-
Topology-based detection of anomalous BGP messages
-
Sep.
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, "Topology-based detection of anomalous BGP messages," in Proc. 6th Symp. Recent Advances in Intrusion Detection (RAID), Sep. 2003, pp. 17-35.
-
(2003)
Proc. 6th Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 17-35
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
92
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
Vancouver, BC, Canada, Aug.
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A prefix hijack alert system," in Proc. 15th USENIX Security Symp., Vancouver, BC, Canada, Aug. 2006.
-
(2006)
Proc. 15th USENIX Security Symp.
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
95
-
-
0141663800
-
Understanding BGP misconfiguration
-
Pittsburgh, PA, Aug.
-
R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in Proc. ACM SIGCOMM 2002, Pittsburgh, PA, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM 2002
-
-
Mahajan, R.1
Wetherall, D.2
Anderson, T.3
-
96
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
Oakland, CA, May
-
X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy
-
-
Hu, X.1
Mao, Z.M.2
-
97
-
-
42149130846
-
On the impact of route monitor selection
-
San Diego, CA, Oct.
-
Y. Zhang, Z. Zhang, Z. M. Mao, Y. C. Hu, and B. M. Maggs, "On the impact of route monitor selection," in Proc. ACM Internet Measurement Conf. (IMC), San Diego, CA, Oct. 2007.
-
(2007)
Proc. ACM Internet Measurement Conf. (IMC)
-
-
Zhang, Y.1
Zhang, Z.2
Mao, Z.M.3
Hu, Y.C.4
Maggs, B.M.5
-
98
-
-
83255186150
-
Listen and Whisper: Security mechanisms for BGP
-
San Francisco, CA, Mar.
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz, "Listen and Whisper: Security mechanisms for BGP," in Proc. Symp. Networked Systems Design and Implementation (NSDI), San Francisco, CA, Mar. 2004.
-
(2004)
Proc. Symp. Networked Systems Design and Implementation (NSDI)
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
-
99
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. M. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, no.2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.M.3
-
101
-
-
72949098279
-
BGP security, availability, and operator needs
-
Jun.
-
C. Meyer and A. Partan, "BGP security, availability, and operator needs," in Proc. NANOG 28, Jun. 2003.
-
(2003)
Proc. NANOG 28
-
-
Meyer, C.1
Partan, A.2
-
102
-
-
0038734643
-
Efficient protocols for signing routing messages
-
San Diego, CA, Mar.
-
K. Zhang, "Efficient protocols for signing routing messages," in Proc. ISOC NDSS'98, San Diego, CA, Mar. 1998.
-
(1998)
Proc. ISOC NDSS'98
-
-
Zhang, K.1
-
104
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, H. Shacham, and B. Lynn, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proc. Eurocrypt 2003, 2003, vol.LNCS 2656, pp. 416-432.
-
(2003)
Proc. Eurocrypt 2003
, vol.LNCS
, Issue.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
105
-
-
23044435711
-
Short signatures from the Weil pairing
-
Sep.
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol.17, no.4, pp. 297-319, Sep. 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
106
-
-
79958074367
-
A forward-secure digital signature scheme
-
M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Advances in CryptologyVCRYPTO '99 Proc., 1999, vol.LNCS 1666, pp. 431-438.
-
(1999)
Advances in CryptologyVCRYPTO '99 Proc.
, vol.LNCS
, Issue.1666
, pp. 431-438
-
-
Bellare, M.1
Miner, S.2
-
107
-
-
12744279165
-
On the performance, feasibility, and use of forward-secure signatures
-
Washington, DC, Oct.
-
E. Cronin, S. Jamin, T. Malkin, and P. McDaniel, "On the performance, feasibility, and use of forward-secure signatures," in Proc. ACM CCS'03, Washington, DC, Oct. 2003.
-
(2003)
Proc. ACM CCS'03
-
-
Cronin, E.1
Jamin, S.2
Malkin, T.3
McDaniel, P.4
-
108
-
-
36949018346
-
Modeling adoptability of secure BGP protocols
-
Pisa, Italy, Sep.
-
H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling adoptability of secure BGP protocols," in Proc. ACM SIGCOMM 2006, Pisa, Italy, Sep. 2006.
-
(2006)
Proc. ACM SIGCOMM 2006
-
-
Chan, H.1
Dash, D.2
Perrig, A.3
Zhang, H.4
-
109
-
-
0034188591
-
Advances in network simulation
-
May
-
L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Y. Xu, and H. Yu, "Advances in network simulation," IEEE Computer, vol.33, no.5, pp. 59-67, May 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.5
, pp. 59-67
-
-
Breslau, L.1
Estrin, D.2
Fall, K.3
Floyd, S.4
Heidemann, J.5
Helmy, A.6
Huang, P.7
McCanne, S.8
Varadhan, K.9
Xu, Y.10
Yu, H.11
-
110
-
-
0003687333
-
Towards realistic million-node Internet simulations
-
Las Vegas, NV, Jun.
-
J. Cowie, H. Liu, J. Liu, D. Nicol, and A. Ogielski, "Towards realistic million-node Internet simulations," in Proc. 1999 Int. Conf. Parallel and Distributed Processing Techniques and Applications (PTPTA'99), Las Vegas, NV, Jun. 2000.
-
(2000)
Proc. 1999 Int. Conf. Parallel and Distributed Processing Techniques and Applications (PTPTA'99)
-
-
Cowie, J.1
Liu, H.2
Liu, J.3
Nicol, D.4
Ogielski, A.5
-
111
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
Barcelona, Spain, Mar.
-
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Experience with DETER: A testbed for security research," in Proc. 2nd IEEE Conf. Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 20006), Barcelona, Spain, Mar. 2006.
-
(2006)
Proc. 2nd IEEE Conf. Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 20006)
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
112
-
-
0041513348
-
A framework for incremental deployment strategies for router-assisted services
-
San Francisco, CA, Apr.
-
X. He and C. Papadopoulos, "A framework for incremental deployment strategies for router-assisted services," in IEEE INFOCOM 2003, San Francisco, CA, Apr. 2003.
-
(2003)
IEEE INFOCOM 2003
-
-
He, X.1
Papadopoulos, C.2
-
114
-
-
0005720916
-
SPHERE: A binding model and middleware for routing protocols
-
Anchorage, AK, Apr.
-
V. Stachtos, M. Kounavis, and A. Campbell, "SPHERE: A binding model and middleware for routing protocols," in Proc. 4th Conf. Open Architecture and Network Programming (OPENARCH 2001), Anchorage, AK, Apr. 2001.
-
(2001)
Proc. 4th Conf. Open Architecture and Network Programming (OPENARCH 2001)
-
-
Stachtos, V.1
Kounavis, M.2
Campbell, A.3
-
115
-
-
2342453262
-
BA framework for resilient Internet routing protocols
-
Mar.-Apr.
-
D. Pei, D. Massey, and L. Zhang, BA framework for resilient Internet routing protocols," IEEE Network, vol. 18, no. 2, pp. 5-12, Mar.-Apr. 2003.
-
(2003)
IEEE Network
, vol.18
, Issue.2
, pp. 5-12
-
-
Pei, D.1
Massey, D.2
Zhang, L.3
-
117
-
-
0038647019
-
BAn efficient algorithm for malicious update detection & recovery in distance vector protocols
-
Anchorage, AK, May
-
A. Chakrabarti and G. Manimaran, BAn efficient algorithm for malicious update detection & recovery in distance vector protocols," in IEEE Int. Conf. Communications, Anchorage, AK, May 2003.
-
(2003)
IEEE Int. Conf. Communications
-
-
Chakrabarti, A.1
Manimaran, G.2
-
118
-
-
8344236729
-
Highly secure and efficient routing
-
Hong Kong, Mar. PRC
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing," in IEEE INFOCOM 2004, Hong Kong, Mar. 2004. PRC.
-
IEEE INFOCOM 2004
, vol.2004
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
119
-
-
27644478879
-
Resilience characteristics of the Internet backbone routing infrastructure
-
Boston, MA
-
C. Labovitz, A. Ahuja, R. Wattenhofer, and S. Venkatachary, "Resilience characteristics of the Internet backbone routing infrastructure," in Proc. 3rd Information Survivability Workshop, Boston, MA, 2000.
-
(2000)
Proc. 3rd Information Survivability Workshop
-
-
Labovitz, C.1
Ahuja, A.2
Wattenhofer, R.3
Venkatachary, S.4
-
120
-
-
18144372829
-
Measuring the effects of Internet path faults on reactive routing
-
San Diego, CA, Jun.
-
N. Feamster, D. Andersen, H. Balakrishnan, and M. Kaashoek, "Measuring the effects of Internet path faults on reactive routing," in Proc. ACM SIGMETRICS 2003, San Diego, CA, Jun. 2003.
-
(2003)
Proc. ACM SIGMETRICS 2003
-
-
Feamster, N.1
Andersen, D.2
Balakrishnan, H.3
Kaashoek, M.4
-
121
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
Jan.
-
V. Padmanabhan and D. Simon, "Secure traceroute to detect faulty or malicious routing," ACM SIGCOMM Comput. Commun. Rev., vol.33, no.1, pp. 77-82, Jan. 2003.
-
(2003)
ACM SIGCOMM Comput. Commun. Rev.
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.1
Simon, D.2
-
122
-
-
4544363839
-
Towards an accurate AS-level traceroute tool
-
Karlsruhe, Germany, Aug.
-
Z. Mao, J. Rexford, J. Wang, and R. Katz, "Towards an accurate AS-level traceroute tool," in Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM 2003
-
-
Mao, Z.1
Rexford, J.2
Wang, J.3
Katz, R.4
-
123
-
-
70350247409
-
Rationality and traffic attraction: Incentives for honest path announcements in BGP
-
Aug.
-
S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright, "Rationality and traffic attraction: Incentives for honest path announcements in BGP," in Proc. ACM SIGCOMM, Aug. 2008.
-
(2008)
Proc. ACM SIGCOMM
-
-
Goldberg, S.1
Halevi, S.2
Jaggard, A.D.3
Ramachandran, V.4
Wright, R.N.5
-
124
-
-
36849023890
-
Truth in advertising: Lightweight verification of route integrity
-
Aug.
-
E. L. Wong, P. Balasubramanian, L. Alvisi, M. G. Gouda, and V. Shmatikov, "Truth in advertising: Lightweight verification of route integrity," in Proc. 26th Annu. ACM SIGACT-SIGOPS Symp. Principles of Distributed Computing (PODC 2007), Aug. 2007.
-
(2007)
Proc. 26th Annu. ACM SIGACT-SIGOPS Symp. Principles of Distributed Computing (PODC 2007)
-
-
Wong, E.L.1
Balasubramanian, P.2
Alvisi, L.3
Gouda, M.G.4
Shmatikov, V.5
-
125
-
-
66249140097
-
How small groups can secure interdomain routing
-
Dec.
-
I. Avramopoulos, M. Suchara, and J. Rexford, "How small groups can secure interdomain routing," Princeton Univ. Comput. Sci. Dept., Tech. Rep. TR-808-907, Dec. 2007.
-
(2007)
Princeton Univ. Comput. Sci. Dept., Tech. Rep. TR-808-907
-
-
Avramopoulos, I.1
Suchara, M.2
Rexford, J.3
-
126
-
-
36949025380
-
Don't secure routing protocols, secure data delivery
-
Nov.
-
D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford, "Don't secure routing protocols, secure data delivery," in Proc. ACM SIGCOMM Workshop on Hot Topics in Networking, Nov. 2006.
-
(2006)
Proc. ACM SIGCOMM Workshop on Hot Topics in Networking
-
-
Wendlandt, D.1
Avramopoulos, I.2
Andersen, D.3
Rexford, J.4
-
127
-
-
72949087508
-
Deployment Considerations for Secure Origin BGP (soBGP)
-
Jun.
-
R. White, Deployment Considerations for Secure Origin BGP (soBGP), Internet Draft, Jun. 2006
-
(2006)
Internet Draft
-
-
White, R.1
-
128
-
-
0003976930
-
-
Jan.
-
T. Bates, R. Chandra, D. Katz, and Y. Rekhter, Multiprotocol Extensions for BGP-4, RFC 4760, Jan. 2007.
-
(2007)
Multiprotocol Extensions for BGP-4, RFC 4760
-
-
Bates, T.1
Chandra, R.2
Katz, D.3
Rekhter, Y.4
-
129
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
C. Ellison and B. Schneier, "Ten risks of PKI: What you're not being told about public key infrastructure," Comput. Security J., vol.16, no.1, 2000.
-
(2000)
Comput. Security J.
, vol.16
, Issue.1
-
-
Ellison, C.1
Schneier, B.2
|