-
1
-
-
0004092895
-
A border gateway protocol 4 (BGP-4)
-
Jan. [Online]. Available
-
Y. Rekhter, T. Li, and S. Hares, "A border gateway protocol 4 (BGP-4)," RFC 4271 (Draft Standard), Internet Engineering Task Force, Jan. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4271.txt
-
(2006)
RFC 4271 (Draft Standard), Internet Engineering Task Force
-
-
Rekhter, Y.1
Li, T.2
Hares, S.3
-
4
-
-
84868376521
-
Pakistan hijacks YouTube
-
Feb [Online]. Available
-
M. A. Brown, "Pakistan hijacks YouTube," Renesys Blog, Feb 2008. [Online]. Available: http://www.renesys.com/blog/2008/02/pakistan-hijacks- youtube-1.shtml
-
(2008)
Renesys Blog
-
-
Brown, M.A.1
-
5
-
-
65249085507
-
Rationality and traffic attraction: Incentives for honest path announcements in BGP
-
S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright, "Rationality and traffic attraction: incentives for honest path announcements in BGP," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 267-278, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 267-278
-
-
Goldberg, S.1
Halevi, S.2
Jaggard, A.D.3
Ramachandran, V.4
Wright, R.N.5
-
7
-
-
21844469807
-
Generic threats to routing protocols
-
Oct. [Online]. Available
-
A. Barbir, S. Murphy, and Y. Yang, "Generic threats to routing protocols," RFC 4593 (Informational), Internet Engineering Task Force, Oct. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4593.txt
-
(2006)
RFC 4593 (Informational), Internet Engineering Task Force
-
-
Barbir, A.1
Murphy, S.2
Yang, Y.3
-
8
-
-
36949014918
-
A study of prefix hijacking and interception in the internet
-
DOI 10.1145/1282380.1282411, ACM SIGCOMM 2007: Conference on Computer Communications
-
H. Ballani, P. Francis, and X. Zhang, "A study of prefix hijacking and interception in the Internet," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 265-276, 2007. (Pubitemid 350239790)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 265-276
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
9
-
-
70449367901
-
-
Wired Mag.-ThreadLevel Aug [Online]. Available
-
K. Zetter, "Revealed: The Internet's Biggest Security Hole," Wired Mag.-ThreadLevel, Aug 2008. [Online]. Available: http://www.wired.com/ threatlevel/2008/08/revealed-the-in/
-
(2008)
Revealed: The Internet's Biggest Security Hole
-
-
Zetter, K.1
-
10
-
-
33645757765
-
-
Apr. [Online] Available
-
V. J. Bono, "7007 Explanation and Apology," Apr. 1997. [Online]. Available: http://www.merit.edu/mail.archives/nanog/1997-04/msg00444. html
-
(1997)
7007 Explanation and Apology
-
-
Bono, V.J.1
-
11
-
-
84868354029
-
Con-Ed steals the 'net'
-
Jan [Online]. Available
-
T. Underwood, "Con-Ed steals the 'net'," Renesys Blog, Jan 2006. [Online]. Available: http://www.renesys.com/blog/2006/01/coned-steals-the- net.shtml
-
(2006)
Renesys Blog
-
-
Underwood, T.1
-
12
-
-
77952372835
-
Some Foundational Problems in Interdomain Routing
-
(HotNets), San Diego, CA Nov.
-
N. Feamster, H. Balakrishnan, and J. Rexford, "Some Foundational Problems in Interdomain Routing," in 3rd ACM SIGCOMM Workshop Hot Topics Netw. (HotNets), San Diego, CA, Nov. 2004.
-
(2004)
3rd ACM SIGCOMM Workshop Hot Topics Netw
-
-
Feamster, N.1
Balakrishnan, H.2
Rexford, J.3
-
14
-
-
54249097101
-
-
June [Online] Available
-
G. Huston, "The BGP report for 2005," June 2006. [Online]. Available: http://www.potaroo.net/ispcol/2006-06/bgpupds.html
-
(2006)
The BGP Report for 2005
-
-
Huston, G.1
-
15
-
-
70449418120
-
A survey of security techniques for the border gateway protocol (BGP)
-
Quarter
-
M. Nicholes and B. Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," Commun. Surveys and Tuts, IEEE, vol. 11, no. 1, pp. 52-65, Quarter 2009.
-
(2009)
Commun. Surveys and Tuts IEEE
, vol.11
, Issue.1
, pp. 52-65
-
-
Nicholes, M.1
Mukherjee, B.2
-
17
-
-
0004216472
-
-
2nd Edition. Upper Saddle River, NJ, USA: Prentice-Hall, Inc.
-
C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, 2nd Edition. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 2002.
-
(2002)
Network Security: Private Communication in A Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
18
-
-
84868367462
-
Internet Protocol
-
Sept. updated by RFC 1349. [Online]. Available
-
J. Postel, "Internet Protocol," RFC 791 (Standard), Internet Engineering Task Force, Sept. 1981, updated by RFC 1349. [Online]. Available: http://www.ietf.org/rfc/rfc791.txt
-
(1981)
RFC 791 (Standard), Internet Engineering Task Force
-
-
Postel, J.1
-
20
-
-
57049122748
-
Internet topology discovery: A survey
-
Quarter
-
B. Donnet and T. Friedman, "Internet topology discovery: A survey," Commun. Surveys Tuts, IEEE, vol. 9, no. 4, pp. 56-69, Quarter 2007.
-
(2007)
Commun. Surveys Tuts IEEE
, vol.9
, Issue.4
, pp. 56-69
-
-
Donnet, B.1
Friedman, T.2
-
21
-
-
0003247401
-
Guidelines for creation, selection, and registration of an autonomous system (AS)
-
Mar [Online]. Available
-
J. Hawkinson and T. Bates, "Guidelines for creation, selection, and registration of an autonomous system (AS)," RFC 1930 (Best Current Practice), Internet Engineering Task Force, Mar. 1996. [Online]. Available: http://www.ietf.org/rfc/rfc1930.txt
-
(1996)
RFC 1930 (Best Current Practice), Internet Engineering Task Force
-
-
Hawkinson, J.1
Bates, T.2
-
22
-
-
0003919801
-
Routing information protocol
-
Jun. updated by RFCs 1388 [Online]. Available
-
C. Hedrick, "Routing information protocol," RFC 1058 (Historic), Internet Engineering Task Force, Jun. 1988, updated by RFCs 1388, 1723. [Online]. Available: http://www.ietf.org/rfc/rfc1058.txt
-
(1988)
RFC 1058 (Historic), Internet Engineering Task Force
, vol.1723
-
-
Hedrick, C.1
-
24
-
-
84868362046
-
Intermediate system to intermediate system intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)
-
[Online]. Available 10589
-
"Intermediate system to intermediate system intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)," ISO/IEC 10589:2002, 2002. [Online]. Available: http://standards.iso.org/ittf/ PubliclyAvailableStandards/c030932-ISO-IEC-10589-2002(E).zip
-
(2002)
ISO/IEC
, pp. 2002
-
-
-
25
-
-
84892619905
-
Network topologies: Inference, modeling, and generation
-
Quarter
-
H. Haddadi, M. Rio, G. Iannaccone, A. Moore, and R. Mortier, "Network topologies: Inference, modeling, and generation," Commun. Surveys Tuts, IEEE, vol. 10, no. 2, pp. 48-69, Quarter 2008.
-
(2008)
Commun. Surveys Tuts IEEE
, vol.10
, Issue.2
, pp. 48-69
-
-
Haddadi, H.1
Rio, M.2
Iannaccone, G.3
Moore, A.4
Mortier, R.5
-
27
-
-
84868377805
-
Border gateway protocol (BGP)
-
June obsoleted by RFC 1267. [Online]. Available
-
"Border gateway protocol (BGP)," RFC 1163 (Historic), Internet Engineering Task Force, June 1990, obsoleted by RFC 1267. [Online]. Available: http://www.ietf.org/rfc/rfc1163.txt
-
(1990)
RFC 1163 (Historic), Internet Engineering Task Force
-
-
-
28
-
-
84868368355
-
Border gateway protocol 3 (BGP-3)
-
Oct. [Online]. Available
-
"Border gateway protocol 3 (BGP-3)," RFC 1267 (Historic), Internet Engineering Task Force, Oct. 1991. [Online]. Available: http://www.ietf.org/rfc/rfc1267.txt
-
(1991)
RFC 1267 (Historic), Internet Engineering Task Force
-
-
-
29
-
-
0004092895
-
A border gateway protocol 4 (BGP-4)
-
Mar. obsoleted by RFC 4271. [Online]. Available
-
Y. Rekhter and T. Li, "A border gateway protocol 4 (BGP-4)," RFC 1771 (Draft Standard), Internet Engineering Task Force, Mar. 1995, obsoleted by RFC 4271. [Online]. Available: http://www.ietf.org/rfc/rfc1771.txt
-
(1995)
RFC 1771 (Draft Standard), Internet Engineering Task Force
-
-
Rekhter, Y.1
Li, T.2
-
31
-
-
84908168935
-
Transmission Control Protocol
-
Sep. updated by RFCs 1122 [Online]. Available
-
J. Postel, "Transmission Control Protocol," RFC 793 (Standard), Internet Engineering Task Force, Sep. 1981, updated by RFCs 1122, 3168. [Online]. Available: http://www.ietf.org/rfc/rfc793.txt
-
(1981)
RFC 793 (Standard), Internet Engineering Task Force
, vol.3168
-
-
Postel, J.1
-
33
-
-
0343448479
-
BGP route reflection-an alternative to full mesh IBGP
-
Apr. obsoleted by RFC 4456. [Online]. Available
-
T. Bates, R. Chandra, and E. Chen, "BGP route reflection-an alternative to full mesh IBGP," RFC 2796 (Proposed Standard), Internet Engineering Task Force, Apr. 2000, obsoleted by RFC 4456. [Online]. Available: http://www.ietf.org/rfc/rfc2796.txt
-
(2000)
RFC 2796 (Proposed Standard), Internet Engineering Task Force
-
-
Bates, T.1
Chandra, R.2
Chen, E.3
-
35
-
-
17744368054
-
On inferring and characterizing internet routing policies
-
Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
-
F Wang and L. Gao, "On inferring and characterizing internet routing policies," in IMC '03: Proc. 3rd ACM SIGCOMM Conf. Internet Measurement. New York, NY, USA: ACM, 2003, pp. 15-26. (Pubitemid 40730635)
-
(2003)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 15-26
-
-
Wang, F.1
Gao, L.2
-
37
-
-
0003585440
-
BGP route flap damping
-
Nov. [Online]. Available
-
C. Villamizar, R. Chandra, and R. Govindan, "BGP route flap damping," RFC 2439 (Proposed Standard), Internet Engineering Task Force, Nov. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2439. txt
-
(1998)
RFC 2439 (Proposed Standard), Internet Engineering Task Force
-
-
Villamizar, C.1
Chandra, R.2
Govindan, R.3
-
38
-
-
67549121881
-
RIPE routing working group recommendations on route-flap damping
-
May obsoletes: ripe-229, ripe-210, ripe-178. [Online]. Available
-
P. Smith and C. Panigl, "RIPE routing working group recommendations on route-flap damping," ripe-378, May 2006, obsoletes: ripe-229, ripe-210, ripe-178. [Online]. Available: http://www.ripe.net/docs/ripe-378. html
-
(2006)
Ripe-378
-
-
Smith, P.1
Panigl, C.2
-
39
-
-
33749869113
-
Study of BGP peering session attacks and their impacts on routing performance
-
DOI 10.1109/JSAC.2006.877218, 1705621
-
K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. Kuhn, "Study of BGP peering session attacks and their impacts on routing performance," Sel. Areas Commun., IEEE J., vol. 24, no. 10, pp. 1901-1915, Oct. 2006. (Pubitemid 44559603)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1901-1915
-
-
Sriram, K.1
Montgomery, D.2
Borchert, O.3
Kim, O.4
Kyhn, D.R.5
-
40
-
-
11244338691
-
Beware of BGP attacks
-
O. Nordström and C. Dovrolis, "Beware of BGP attacks," SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 1-8, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 1-8
-
-
Nordström, O.1
Dovrolis, C.2
-
42
-
-
14344266667
-
Understanding BGP misconfiguration
-
DOI 10.1145/964725.633027, Proceedings of the ACM SIGCOMM 2002 Conference - Applications, Technologies, Architectures, and Protocols for Computer Communications
-
R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP misconfiguration," in SIGCOMM '02: Proc. 2002 Conf. Appl., Technol., Architectures, Protocols Comput. Commun. New York, NY, USA: ACM, 2002, pp. 3-16. (Pubitemid 43843771)
-
(2002)
Computer Communication Review
, vol.32
, Issue.4
, pp. 3-16
-
-
Mahajan, R.1
Wetherall, D.2
Anderson, T.3
-
43
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
DOI 10.1145/1151659.1159947
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 291-302, 2006. (Pubitemid 44623735)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
45
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar, "Integration of security in network routing protocols," SIGSAC Rev., vol. 11, no. 2, pp. 18-25, 1993.
-
(1993)
SIGSAC Rev.
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
46
-
-
0041296839
-
Integrating security in inter-domain routing protocols
-
B. Kumar and J. Crowcroft, "Integrating security in inter-domain routing protocols," SIGCOMM Comput. Commun. Rev., vol. 23, no. 5, pp. 36-51, 1993.
-
(1993)
SIGCOMM Comput. Commun. Rev.
, vol.23
, Issue.5
, pp. 36-51
-
-
Kumar, B.1
Crowcroft, J.2
-
48
-
-
36949024396
-
The generalized TTL security mechanism (GTSM)
-
Feb. obsoleted by RFC 5082. [Online]. Available
-
V. Gill, J. Heasley, and D. Meyer, "The generalized TTL security mechanism (GTSM)," RFC 3682 (Experimental), Internet Engineering Task Force, Feb. 2004, obsoleted by RFC 5082. [Online]. Available: http://www.ietf.org/rfc/rfc3682.txt
-
(2004)
RFC 3682 (Experimental), Internet Engineering Task Force
-
-
Gill, V.1
Heasley, J.2
Meyer, D.3
-
49
-
-
84901406146
-
The generalized TTL security mechanism (GTSM)
-
Oct. [Online]. Available
-
V. Gill, J. Heasley, D. Meyer, P. Savola, and C. Pignataro, "The generalized TTL security mechanism (GTSM)," RFC 5082 (Proposed Standard), Internet Engineering Task Force, Oct. 2007. [Online]. Available: http://www.ietf.org/rfc/rfc5082.txt
-
(2007)
RFC 5082 (Proposed Standard), Internet Engineering Task Force
-
-
Gill, V.1
Heasley, J.2
Meyer, D.3
Savola, P.4
Pignataro, C.5
-
50
-
-
61849089615
-
TCP SYN flooding attacks and common mitigations
-
Aug. [Online]. Available
-
W. Eddy, "TCP SYN flooding attacks and common mitigations," RFC 4987 (Informational), Internet Engineering Task Force, Aug. 2007. [Online]. Available: http://www.ietf.org/rfc/rfc4987.txt
-
(2007)
RFC 4987 (Informational), Internet Engineering Task Force
-
-
Eddy, W.1
-
51
-
-
0003470642
-
Security architecture for the internet protocol
-
Nov. obsoleted by RFC 4301, updated by RFC 3168. [Online]. Available
-
S. Kent and R. Atkinson, "Security architecture for the internet protocol," RFC 2401 (Proposed Standard), Internet Engineering Task Force, Nov. 1998, obsoleted by RFC 4301, updated by RFC 3168. [Online]. Available: http://www.ietf.org/rfc/rfc2401.txt
-
(1998)
RFC 2401 (Proposed Standard), Internet Engineering Task Force
-
-
Kent, S.1
Atkinson, R.2
-
53
-
-
0342446307
-
Protection of BGP sessions via the TCP MD5 signature option
-
Aug. [Online]. Available
-
A. Heffernan, "Protection of BGP sessions via the TCP MD5 signature option," RFC 2385 (Proposed Standard), Internet Engineering Task Force, Aug. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2385. txt
-
(1998)
RFC 2385 (Proposed Standard), Internet Engineering Task Force
-
-
Heffernan, A.1
-
54
-
-
84868363557
-
BGP session security requirements
-
Aug. [Online]. Available
-
M. Behringer, "BGP session security requirements," Internet-Draft (Informational), Aug. 2007. [Online]. Available: http://tools.ietf.org/html/draft-behringer-bgp-session-sec-req-02
-
(2007)
Ternet-Draft (Informational)
-
-
Behringer, M.1
-
55
-
-
84868351086
-
BGP security requirements
-
Nov. [Online]. Available
-
B. Christian and T. Tauber, "BGP security requirements," Internet-Draft (Informational), Nov. 2008. [Online]. Available: http://tools.ietf. org/html/draft-ietf-rpsec-bgpsecrec-10
-
(2008)
Ternet-Draft (Informational)
-
-
Christian, B.1
Tauber, T.2
-
56
-
-
0003851399
-
-
C P. Sutherland Ed. New York NY USA: John Wiley & Sons, Inc.
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, P. Sutherland, Ed. New York, NY, USA: John Wiley & Sons, Inc., 1995.
-
(1995)
Applied Cryptography: Protocols Algorithms and Source Code
-
-
Schneier, B.1
-
57
-
-
84868348030
-
-
Nov. [Online] Available
-
S. Murphy, "BGP security analysis," Nov. 2001. [Online]. Available: http://tools.ietf.org/html/draft-murphy-bgp-secr-04
-
(2001)
BGP Security Analysis
-
-
Murphy, S.1
-
58
-
-
0041291986
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
Apr. obsoleted by RFC 5280, updated by RFCs 4325 [Online]. Available
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," RFC 3280 (Proposed Standard), Internet Engineering Task Force, Apr. 2002, obsoleted by RFC 5280, updated by RFCs 4325, 4630. [Online]. Available: http://www.ietf.org/rfc/rfc3280.txt
-
(2002)
RFC 3280 (Proposed Standard), Internet Engineering Task Force
, vol.4630
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
59
-
-
51049122345
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
May [Online]. Available
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," RFC 5280 (Proposed Standard), Internet Engineering Task Force, May 2008. [Online]. Available: http://www.ietf.org/rfc/ rfc5280.txt
-
(2008)
RFC 5280 (Proposed Standard), Internet Engineering Task Force
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
60
-
-
44649138087
-
X.509 extensions for IP Addresses and AS identifiers
-
June [Online]. Available
-
C. Lynn, S. Kent, and K. Seo, "X.509 extensions for IP Addresses and AS identifiers," RFC 3779 (Proposed Standard), Internet Engineering Task Force, June 2004. [Online]. Available: http://www.ietf.org/rfc/rfc3779.txt
-
(2004)
RFC 3779 (Proposed Standard), Internet Engineering Task Force
-
-
Lynn, C.1
Kent, S.2
Seo, K.3
-
61
-
-
0041513348
-
A framework for incremental deployment strategies for router-assisted services
-
Mar.-3 Apr. 2003
-
X. He, C. Papadopoulos, and P. Radoslavov, "A framework for incremental deployment strategies for router-assisted services," in INFOCOM 2003. Twenty-Second Annual Joint Conf. IEEE Comput. Commun. Societies. IEEE, vol. 2, Mar.-3 Apr. 2003, pp. 1488-1498 vol.2.
-
FOCOM 2003. Twenty-Second Annual Joint Conf. IEEE Comput. Commun. Societies. IEEE
, vol.2
, Issue.2
, pp. 1488-1498
-
-
He, X.1
Papadopoulos, C.2
Radoslavov, P.3
-
62
-
-
56749165563
-
Securing BGP incrementally
-
New York, NY, USA: ACM
-
M. Suchara, I. Avramopoulos, and J. Rexford, "Securing BGP incrementally," in CoNEXT '07: Proc. 2007 ACM CoNEXT Conf. New York, NY, USA: ACM, 2007, pp. 1-2.
-
(2007)
CoNEXT '07: Proc. 2007 ACM CoNEXT Conf
, pp. 1-2
-
-
Suchara, M.1
Avramopoulos, I.2
Rexford, J.3
-
65
-
-
33750327326
-
Modeling adoptability of secure BGP protocols
-
DOI 10.1145/1140103.1140334, SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
-
H. Chan, D. Dash, A. Perrig, and H. Zhang, "Modeling adoptability of secure BGP protocols," in SIGMETRICS '06/Performance '06: Proc. Joint International Conf. Measurement Modeling Computer Syst. New York, NY, USA: ACM, 2006, pp. 389-390. (Pubitemid 44619120)
-
(2006)
Performance Evaluation Review
, vol.34
, Issue.1
, pp. 389-390
-
-
Chan, H.1
Dash, D.2
Perrig, A.3
Zhang, H.4
-
66
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
Apr.
-
S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (S-BGP)," Sel. Areas Commun., IEEE J., vol. 18, no. 4, pp. 582-592, Apr. 2000.
-
(2000)
Sel. Areas Commun. IEEE J.
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
67
-
-
84867338222
-
Secure border gateway protocol (S-BGP)-real world performance and deployment issues
-
Feb.
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure border gateway protocol (S-BGP)-real world performance and deployment issues," in 7th Annual Netw. Distributed Syst. Security Symp. (NDSS'00), Feb. 2000, pp. 103-116.
-
(2000)
7th Annual Netw. Distributed Syst. Security Symp. (NDSS'00)
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
68
-
-
27544500277
-
Securing BGP through secure origin BGP
-
Sept.
-
R. White, "Securing BGP through secure origin BGP," Internet Protocol J., vol. 6, no. 3, Sept. 2003.
-
(2003)
Ternet Protocol J.
, vol.6
, Issue.3
-
-
White, R.1
-
69
-
-
34547504417
-
On interdomain routing security and pretty secure BGP (psBGP)
-
P. v. Oorschot, T. Wan, and E. Kranakis, "On interdomain routing security and pretty secure BGP (psBGP)," ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, p. 11, 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.3
, pp. 11
-
-
Oorschot, P.V.1
Wan, T.2
Kranakis, E.3
-
70
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
Feb.
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, "Working around BGP: An incremental approach to improving security and accuracy of interdomain routing," in Proc. Internet Society Symp. Netw. Distributed Syst. Security (NDSS 03), Feb. 2003.
-
(2003)
Proc. Internet Society Symp. Netw. Distributed Syst. Security (NDSS 03)
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
71
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
S. M. Bellovin, "Security problems in the TCP/IP protocol suite," SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, 1989.
-
(1989)
SIGCOMM Comput. Commun. Rev.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
72
-
-
21644436994
-
Key management considerations for the TCP MD5 signature option
-
July [Online]. Available
-
M. Leech, "Key management considerations for the TCP MD5 signature option," RFC 3562 (Informational), Internet Engineering Task Force, July 2003. [Online]. Available: http://www.ietf.org/rfc/rfc3562.txt
-
(2003)
RFC 3562 (Informational), Internet Engineering Task Force
-
-
Leech, M.1
-
75
-
-
84868371712
-
Deploying a new Hash Algorithm
-
October [Online]. Available
-
S. Bellovin and E. Rescorla, "Deploying a new Hash Algorithm," in NIST Cryptographic Hash Workshop, October 2005. [Online]. Available: http://csrc.nist.gov/groups/ST/hash/documents/Bellovin-new-hash.pdf
-
(2005)
NIST Cryptographic Hash Workshop
-
-
Bellovin, S.1
Rescorla, E.2
-
76
-
-
84868352544
-
NIST Cryptographic Standards Status Report
-
April [Online]. Available
-
B. Burr, "NIST Cryptographic Standards Status Report," Internet 2 5th Annual PKI R&D Workshop, April 2006. [Online]. Available: http://middleware.internet2.edu/pki06/proceedings/burr-nist-crypto-standards.ppt
-
(2006)
Ternet 2 5th Annual PKI R&D Workshop
-
-
Burr, B.1
-
77
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
X. Wang and H. Yu, "How to break MD5 and other hash functions," in EUROCRYPT, 2005, pp. 19-35. [Online]. Available: http://dx.doi.org/10.1007/ 11426639-2 (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
78
-
-
77954806438
-
Standards maturity variance regarding the TCP MD5 signature option (RFC 2385) and the BGP-4 specification
-
Jan. [Online]. Available
-
S. Bellovin and A. Zinin, "Standards maturity variance regarding the TCP MD5 signature option (RFC 2385) and the BGP-4 specification," RFC 4278 (Informational), Internet Engineering Task Force, Jan. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4278.txt
-
(2006)
RFC 4278 (Informational), Internet Engineering Task Force
-
-
Bellovin, S.1
Zinin, A.2
-
80
-
-
78049399140
-
UMAC: Message authentication code using universal hashing
-
Mar. [Online]. Available
-
T. Krovetz, "UMAC: Message authentication code using universal hashing," RFC 4418 (Informational), Internet Engineering Task Force, Mar. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4418.txt
-
(2006)
RFC 4418 (Informational), Internet Engineering Task Force
-
-
Krovetz, T.1
-
81
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Feb. [Online]. Available
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-hashing for message authentication," RFC 2104 (Informational), Internet Engineering Task Force, Feb. 1997. [Online]. Available: http://www.ietf.org/rfc/rfc2104.txt
-
(1997)
RFC 2104 (Informational), Internet Engineering Task Force
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
83
-
-
78349243155
-
-
Feb. [Online] Available
-
R. Bonica, B. Weis, S. Viswanathan, A. Lange, and O. Wheeler, "Authentication for TCP-based routing and management protocols," Feb. 2007. [Online]. Available: http://tools.ietf.org/html/draft-bonica-tcp-auth-06
-
(2007)
Authentication for TCP-based Routing and Management Protocols
-
-
Bonica, R.1
Weis, B.2
Viswanathan, S.3
Lange, A.4
Wheeler, O.5
-
86
-
-
0012784236
-
IP security document roadmap
-
Nov. [Online]. Available
-
R. Thayer, N. Doraswamy, and R. Glenn, "IP security document roadmap," RFC 2411 (Informational), Internet Engineering Task Force, Nov. 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2411.txt
-
(1998)
RFC 2411 (Informational), Internet Engineering Task Force
-
-
Thayer, R.1
Doraswamy, N.2
Glenn, R.3
-
87
-
-
84868373016
-
-
Jan. [Online] Available
-
D. Ward, "Securing BGPv4 using IPsec," Jan. 2002. [Online]. Available: http://tools.ietf. org/html/draft-ward-bgp-ipsec-00
-
(2002)
Securing BGPv4 Using IPsec
-
-
Ward, D.1
-
89
-
-
0003828107
-
Network layer protocols with byzantine robustness
-
[Online]. Available
-
R. Perlman, "Network layer protocols with byzantine robustness," Tech. Rep., 1988. [Online]. Available: http://www.lcs.mit.edu/ publications/specpub. php?id=997
-
(1988)
Tech. Rep.
-
-
Perlman, R.1
-
90
-
-
0030373106
-
Securing the border gateway routing protocol
-
GLOBECOM '96. 'Commun.: Key Global Prosperity, Nov 1996
-
B. Smith and J. Garcia-Luna-Aceves, "Securing the border gateway routing protocol," in Global Telecommun. Conf., 1996. GLOBECOM '96. 'Commun.: Key Global Prosperity, Nov 1996, pp. 81-85.
-
(1996)
Global Telecommun. Conf.
, pp. 81-85
-
-
Smith, B.1
Garcia-Luna-Aceves, J.2
-
91
-
-
0032026162
-
Efficient security mechanisms for the border gateway routing protocol
-
Mar.
-
"Efficient security mechanisms for the border gateway routing protocol," Computer Commun., vol. 21, no. 3, pp. 203-210, Mar. 1998.
-
(1998)
Computer Commun.
, vol.21
, Issue.3
, pp. 203-210
-
-
-
92
-
-
84868371104
-
Protocol for exchange of inter-domain routeing information among intermediate systems to support forwarding of ISO 8473 PDUs
-
[Online]. Available 10747
-
"Protocol for exchange of inter-domain routeing information among intermediate systems to support forwarding of ISO 8473 PDUs," ISO/IEC 10747:1994, 1994. [Online]. Available: http://www.iso.org/iso/iso-catalogue/ catalogue-tc/catalogue-detail.htm?csnumber=21417
-
(1994)
ISO/IEC
, pp. 1994
-
-
-
94
-
-
33144457195
-
DNS security introduction and requirements
-
Mar. [Online]. Available
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, "DNS security introduction and requirements," RFC 4033 (Proposed Standard), Internet Engineering Task Force, Mar. 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4033.txt
-
(2005)
RFC 4033 (Proposed Standard), Internet Engineering Task Force
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
96
-
-
84964539491
-
Public-key infrastructure for the secure border gateway protocol (S-BGP)
-
vol. 1
-
K. Seo, C. Lynn, and S. Kent, "Public-key infrastructure for the secure border gateway protocol (S-BGP)," in DARPA Inf. Survivability Conf. Exposition II, 2001. DISCEX '01. Proc, vol. 1, 2001, pp. 239-253 vol. 1.
-
(2001)
DARPA Inf. Survivability Conf. Exposition II, 2001. DISCEX '01. Proc
, vol.1
, pp. 239-253
-
-
Seo, K.1
Lynn, C.2
Kent, S.3
-
97
-
-
84868383614
-
Evaluating the performance impact of PKI on BGP security
-
Apr. [Online]. Available
-
M. Zhao and D. Nicol, "Evaluating the performance impact of PKI on BGP security," Internet 2 4th Annual PKI R&D Workshop, Apr. 2005. [Online]. Available: http://middleware.internet2.edu/pki05/proceedings/zhao- sbgp.pdf
-
(2005)
Ternet 2 4th Annual PKI R&D Workshop
-
-
Zhao, M.1
Nicol, D.2
-
98
-
-
33746235595
-
The performance impact of BGP security
-
DOI 10.1109/MNET.2005.1541720
-
M. Zhao, S. Smith, and D. Nicol, "The performance impact of BGP security," Netw., IEEE, vol. 19, no. 6, pp. 42-48, Nov.-Dec. 2005. (Pubitemid 46444793)
-
(2005)
IEEE Network
, vol.19
, Issue.6
, pp. 42-48
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
101
-
-
47749104797
-
Exploring autonomous system numbers
-
Mar.
-
G. Huston, "Exploring autonomous system numbers," Internet Protocol J., vol. 9, no. 1, Mar. 2006.
-
(2006)
Ternet Protocol J.
, vol.9
, Issue.1
-
-
Huston, G.1
-
102
-
-
0342622841
-
Representation of IP routing policies in a routing registry (ripe-81++)
-
Mar. [Online]. Available
-
T. Bates, E. Gerich, L. Joncheray, J.-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu, "Representation of IP routing policies in a routing registry (ripe-81++)," RFC 1786 (Informational), Internet Engineering Task Force, Mar. 1995. [Online]. Available: http://www.ietf.org/rfc/rfc1786.txt
-
(1995)
RFC 1786 (Informational), Internet Engineering Task Force
-
-
Bates, T.1
Gerich, E.2
Joncheray, L.3
Jouanigot, J.-M.4
Karrenberg, D.5
Terpstra, M.6
Yu, J.7
-
103
-
-
0003739790
-
Routing policy specification language (RPSL)
-
Jun. updated by RFC 4012. [Online]. Available
-
C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra, "Routing policy specification language (RPSL)," RFC 2622 (Proposed Standard), Internet Engineering Task Force, Jun. 1999, updated by RFC 4012. [Online]. Available: http://www.ietf.org/ rfc/rfc2622.txt
-
(1999)
RFC 2622 (Proposed Standard), Internet Engineering Task Force
-
-
Alaettinoglu, C.1
Villamizar, C.2
Gerich, E.3
Kessens, D.4
Meyer, D.5
Bates, T.6
Karrenberg, D.7
Terpstra, M.8
-
104
-
-
72949096094
-
Routing policy specification language next generation (RPSLng)
-
Mar. [Online]. Available
-
L. Blunk, J. Damas, F Parent, and A. Robachevsky, "Routing policy specification language next generation (RPSLng)," RFC 4012 (Proposed Standard), Internet Engineering Task Force, Mar. 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4012.txt
-
(2005)
RFC 4012 (Proposed Standard), Internet Engineering Task Force
-
-
Blunk, L.1
Damas, J.2
Parent, F.3
Robachevsky, A.4
-
108
-
-
33747891596
-
Origin authentication in interdomain routing
-
DOI 10.1016/j.comnet.2005.11.007, PII S1389128605003920
-
P. McDaniel, W. Aiello, K. Butler, and J. Ioannidis, "Origin authentication in interdomain routing," Comput. Netw., vol. 50, no. 16, pp. 2953-2980, 2006. (Pubitemid 44292593)
-
(2006)
Computer Networks
, vol.50
, Issue.16
, pp. 2953-2980
-
-
McDaniel, P.1
Aiello, W.2
Butler, K.3
Ioannidis, J.4
-
109
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. C. Merkle, "Protocols for public key cryptosystems," Security Privacy, IEEE Symp., vol. 0, p. 122, 1980.
-
(1980)
Security Privacy IEEE Symp.
, vol.0
, pp. 122
-
-
Merkle, R.C.1
-
110
-
-
21844463097
-
SPV: Secure path vector routing for securing BGP
-
DOI 10.1145/1030194.1015488, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
Y.-C. Hu, A. Perrig, and M. Sirbu, "SPV: Secure path vector routing for securing BGP," in SIGCOMM '04: Proc. 2004 Conf. Appl., Technol., Architectures, Protocols Comput. Commun. New York, NY, USA: ACM, 2004, pp. 179-192. (Pubitemid 40954879)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 179-192
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
111
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Aug.
-
C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," Netw., IEEE/ACM Trans., vol. 7, no. 4, pp. 502-513, Aug. 1999.
-
(1999)
Netw. IEEE/ACM Trans.
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.2
-
112
-
-
85028913061
-
On-line/off-line digital signatures
-
New York, NY, USA: Springer-Verlag New York, Inc.
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," in CRYPTO '89: Proc. Advances Cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1989, pp. 263-275.
-
(1989)
CRYPTO '89: Proc. Advances Cryptology
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
113
-
-
56349120333
-
Analysis of the SPV secure routing protocol: Weaknesses and lessons
-
B. Raghavan, S. Panjwani, and A. Mityagin, "Analysis of the SPV secure routing protocol: Weaknesses and lessons," SIGCOMM Comput. Commun. Rev., vol. 37, no. 2, pp. 29-38, 2007.
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.2
, pp. 29-38
-
-
Raghavan, B.1
Panjwani, S.2
Mityagin, A.3
-
115
-
-
33745774761
-
Aggregated path authentication for efficient BGP security
-
CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
M. Zhao, S. W. Smith, and D. M. Nicol, "Aggregated path authentication for efficient BGP security," in CCS '05: Proc. 12th ACM Conf. Comput. Commun. Security. New York, NY, USA: ACM, 2005, pp. 128-138. (Pubitemid 44021997)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
116
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Springer Berlin/Heidelberg, Jan. 2003
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Advances in Cryptology-EUROCRYPT 2003, vol. 2656. Springer Berlin/Heidelberg, Jan. 2003, p. 641.
-
(2003)
Advances in Cryptology-EUROCRYPT
, vol.2656
, pp. 641
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
117
-
-
56349132859
-
Ordered mul-tisignatures and identity-based sequential aggregate signatures, with applications to secure routing
-
New York, NY, USA: ACM
-
A. Boldyreva, C. Gentry, A. O'Neill, and D. H. Yum, "Ordered mul-tisignatures and identity-based sequential aggregate signatures, with applications to secure routing," in CCS '07: Proc. 14th ACM Conf. Comput. Commun. Security. New York, NY, USA: ACM, 2007, pp. 276-285.
-
(2007)
CCS '07: Proc. 14th ACM Conf. Comput. Commun. Security
, pp. 276-285
-
-
Boldyreva, A.1
Gentry, C.2
O'Neill, A.3
Yum, D.H.4
-
118
-
-
56349146197
-
New multiparty signature schemes for network routing applications
-
"New multiparty signature schemes for network routing applications," ACM Trans. Inf. Syst. Secur, vol. 12, no. 1, pp. 1-39, 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.1
, pp. 1-39
-
-
-
119
-
-
34547369855
-
Optimizing BGP security by exploiting path stability
-
DOI 10.1145/1180405.1180442, 1180442, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
K. Butler, P. McDaniel, and W. Aiello, "Optimizing BGP security by exploiting path stability," in CCS '06: Proc. 13th ACM Conf. Comput. Commun. Security. New York, NY, USA: ACM, 2006, pp. 298-310. (Pubitemid 47131378)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 298-310
-
-
Butler, K.1
McDaniel, P.2
Aiello, W.3
-
120
-
-
44049101942
-
Pretty good BGP: Improving BGP by cautiously adopting routes
-
Washington DC, USA: IEEE Comput. Society
-
J. Karlin, S. Forrest, and J. Rexford, "Pretty good BGP: Improving BGP by cautiously adopting routes," in ICNP '06: Proc. 2006 IEEE International Conf. Netw. Protocols. Washington, DC, USA: IEEE Comput. Society, 2006, pp. 290-299.
-
(2006)
ICNP '06: Proc. 2006 IEEE International Conf. Netw. Protocols
, pp. 290-299
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
121
-
-
52049098470
-
Autonomous security for autonomous systems
-
"Autonomous security for autonomous systems," Comput. Netw., vol. 52, no. 15, pp. 2908-2923, 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.15
, pp. 2908-2923
-
-
-
122
-
-
51349120643
-
Detecting bogus BGP route information: Going beyond prefix hijacking
-
Sept. 2007
-
J. Qiu, L. Gao, S. Ranjan, and A. Nucci, "Detecting bogus BGP route information: Going beyond prefix hijacking," in Security Privacy Commun. Netw. Workshops, 2007. SecureComm 2007. Third International Conf, Sept. 2007, pp. 381-390.
-
Security Privacy Commun. Netw. Workshops 2007. SecureComm 2007. Third International Conf
, pp. 381-390
-
-
Qiu, J.1
Gao, L.2
Ranjan, S.3
Nucci, A.4
-
123
-
-
36949036650
-
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
-
DOI 10.1145/1282380.1282412, ACM SIGCOMM 2007: Conference on Computer Communications
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detecting ip prefix hijacks in real-time," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 277-288, 2007. (Pubitemid 350239791)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 277-288
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
124
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in SP '07: Proc. 2007 IEEE Symp. Security Privacy. Washington, DC, USA: IEEE Comput. Society, 2007, pp. 3-17. (Pubitemid 47432512)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Hu, X.1
Mao, Z.M.2
-
125
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
X. Hu and Z. Mao, "Accurate real-time identification of IP prefix hijacking," in Security Privacy, 2007. SP '07. IEEE Symp., May 2007, pp. 3-17. (Pubitemid 47432512)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Hu, X.1
Mao, Z.M.2
-
126
-
-
35248861643
-
Topology-based detection of anomalous BGP messages
-
Springer Berlin/Heidelberg, Feb.
-
C. Kruegel, D. Mutz, W. Robertson, and F Valeur, "Topology-based detection of anomalous BGP messages," in Recent Advances Intrusion Detection, vol. 2820. Springer Berlin/Heidelberg, Feb. 2003, pp. 17-35.
-
(2003)
Recent Advances Intrusion Detection
, vol.2820
, pp. 17-35
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
127
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
Berkeley, CA, USA: USENIX Association
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, "PHAS: A prefix hijack alert system," in USENIX-SS'06: Proc. 15th Conf. USENIX Security Symp. Berkeley, CA, USA: USENIX Association, 2006.
-
(2006)
USENIX-SS'06: Proc. 15th Conf. USENIX Security Symp
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
128
-
-
34247362891
-
Identity-based registry for secure interdomain routing
-
DOI 10.1145/1128817.1128866, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
E.-y. Kim, K. Nahrstedt, L. Xiao, and K. Park, "Identity-based registry for secure interdomain routing," in ASIACCS '06: Proc. 2006 ACM Symp. Inf., Comput. Commun. Security. New York, NY, USA: ACM, 2006, pp. 321-331. (Pubitemid 46644750)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 321-331
-
-
Kim, E.-Y.1
Nahrstedt, K.2
Xiao, L.3
Park, K.4
-
129
-
-
56749151567
-
Practical defenses against BGP prefix hijacking
-
New York, NY, USA: ACM
-
Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, "Practical defenses against BGP prefix hijacking," in CoNEXT '07: Proc. 2007 ACM CoNEXT Conf. New York, NY, USA: ACM, 2007, pp. 1-12.
-
(2007)
CoNEXT '07: Proc. 2007. ACM CoNEXT Conf
, pp. 1-12
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
-
131
-
-
42149130846
-
On the impact of route monitor selection
-
New York, NY, USA: ACM
-
Y. Zhang, Z. Zhang, Z. M. Mao, C. Hu, and B. MacDowell Maggs, "On the impact of route monitor selection," in IMC '07: Proc. 7th ACM SIGCOMM Conf. Internet Measurement. New York, NY, USA: ACM, 2007, pp. 215-220.
-
(2007)
IMC '07: Proc. 7th ACM SIGCOMM Conf. Internet Measurement
, pp. 215-220
-
-
Zhang, Y.1
Zhang, Z.2
Mao, Z.M.3
Hu, C.4
MacDowell Maggs, B.5
-
132
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
New York, NY, USA: ACM
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "An analysis of BGP multiple origin AS (MOAS) conflicts," in IMW '01: Proc. 1st ACM SIGCOMM Workshop Internet Measurement. New York, NY, USA: ACM, 2001, pp. 31-35.
-
(2001)
IMW '01: Proc. 1st ACM SIGCOMM Workshop Internet Measurement
, pp. 31-35
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
133
-
-
0036922184
-
Detection of invalid routing announcement in the internet
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Detection of invalid routing announcement in the internet," in Dependable Syst. Netw., 2002. DSN 2002. Proc. International Conf., 2002, pp. 59-68.
-
(2002)
Dependable Syst. Netw. 2002. DSN 2002. Proc. International Conf.
, pp. 59-68
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.6
Zhang, L.7
-
134
-
-
65249154022
-
ISPY: Detecting IP prefix hijacking on my own
-
New York, NY, USA: ACM
-
Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush, "ISPY: Detecting IP prefix hijacking on my own," in SIGCOMM '08: Proc. ACM SIGCOMM 2008 Conf. Data Commun. New York, NY, USA: ACM, 2008, pp. 327-338.
-
(2008)
SIGCOMM '08: Proc. ACM SIGCOMM 2008 Conf. Data Commun
, pp. 327-338
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
Bush, R.5
-
135
-
-
36048995031
-
Understanding resiliency of internet topology against prefix hijack attacks
-
DOI 10.1109/DSN.2007.95, 4272988, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
-
M. Lad, R. Oliveira, B. Zhang, and L. Zhang, "Understanding resiliency of internet topology against prefix hijack attacks," in DSN '07: Proc. 37th Annual IEEE/IFIP International Conf. Dependable Syst. Netw. Washington, DC, USA: IEEE Comput. Society, 2007, pp. 368-377. (Pubitemid 350080442)
-
(2007)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 368-377
-
-
Lad, M.1
Oliveira, R.2
Zhang, B.3
Zhang, L.4
-
136
-
-
66249137443
-
A comparative analysis of BGP anomaly detection and robustness algorithms
-
K. Sriram, O. Borchert, O. Kim, P. Gleichmann, and D. Montgomery, "A comparative analysis of BGP anomaly detection and robustness algorithms," Conf. Homeland Security, Cybersecurity Applications Technol., vol. 0, pp. 25-38, 2009.
-
(2009)
Conf. Homeland Security, Cybersecurity Applications Technol.
, vol.0
, pp. 25-38
-
-
Sriram, K.1
Borchert, O.2
Kim, O.3
Gleichmann, P.4
Montgomery, D.5
-
138
-
-
38049150830
-
Measures of self-similarity of BGP updates and implications for securing BGP
-
PAM Heidelberg, DE: Springer-Verlag Berlin, Apr. 2007
-
G. Huston, "Measures of self-similarity of BGP updates and implications for securing BGP," in Proc. 8th International Conf. Passive Active Netw. Measurement (PAM 2007), vol. 4427. Heidelberg, DE: Springer-Verlag Berlin, Apr. 2007, pp. 1-10.
-
(2007)
Proc. 8th International Conf. Passive Active Netw. Measurement
, vol.4427
, pp. 1-10
-
-
Huston, G.1
-
139
-
-
34547406892
-
Quantifying path exploration in the internet
-
DOI 10.1145/1177080.1177116, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
R. Oliveira, B. Zhang, D. Pei, R. Izhak-Ratzin, and L. Zhang, "Quantifying path exploration in the internet," in IMC '06: Proc. 6th ACM SIGCOMM Conf. Internet Measurement. New York, NY, USA: ACM, 2006, pp. 269-282. (Pubitemid 47165609)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 269-282
-
-
Oliveira, R.1
Zhang, B.2
Pei, D.3
Izhak-Ratzin, R.4
Zhang, L.5
-
140
-
-
25644444009
-
Limiting path exploration in BGP
-
Mar. 2005
-
J. Chandrashekar, Z. Duan, Z.-L. Zhang, and J. Krasky, "Limiting path exploration in BGP," in INFOCOM 2005. 24th Annual Joint Conf. IEEE Comput. Commun. Societies. Proc. IEEE, vol. 4, Mar. 2005, pp. 2337-2348 vol. 4.
-
FOCOM 2005. 24th Annual Joint Conf. IEEE Comput. Commun. Societies. Proc. IEEE
, vol.4
, pp. 2337-2348
-
-
Chandrashekar, J.1
Duan, Z.2
Zhang, Z.-L.3
Krasky, J.4
-
141
-
-
34247194569
-
Network-wide prediction of BGP routes
-
DOI 10.1109/TNET.2007.892876
-
N. Feamster and J. Rexford, "Network-wide prediction of BGP routes," Netw., IEEE/ACM Trans., vol. 15, no. 2, pp. 253-266, April 2007. (Pubitemid 46621608)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
, pp. 253-266
-
-
Feamster, N.1
Rexford, J.2
-
142
-
-
36949025380
-
Don't secure routing protocols, secure data delivery
-
Irvine, CA, Nov.
-
D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford, "Don't secure routing protocols, secure data delivery," in Proc. 5th ACM Workshop Hot Topics Netw. (Hotnets-V), Irvine, CA, Nov. 2006.
-
(2006)
Proc. 5th ACM Workshop Hot Topics Netw. (Hotnets-V)
-
-
Wendlandt, D.1
Avramopoulos, I.2
Andersen, D.3
Rexford, J.4
-
143
-
-
1242287695
-
Towards an accurate AS-level traceroute tool
-
New York, NY, USA: ACM
-
Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz, "Towards an accurate AS-level traceroute tool," in SIGCOMM '03: Proc. 2003 Conf. Appl., Technol., Architectures, Protocols Comput. Commun. New York, NY, USA: ACM, 2003, pp. 365-378.
-
(2003)
SIGCOMM '03: Proc. 2003 Conf. Appl., Technol., Architectures, Protocols Comput. Commun
, pp. 365-378
-
-
Mao, Z.M.1
Rexford, J.2
Wang, J.3
Katz, R.H.4
-
144
-
-
85077313871
-
Stealth probing: Efficient data-plane security for IP routing
-
CA, USA: USENIX Association
-
I. Avramopoulos and J. Rexford, "Stealth probing: Efficient data-plane security for IP routing," in ATEC '06: Proc. Annual Conf. USENIX '06 Annual Technical Conf. Berkeley, CA, USA: USENIX Association, 2006, pp. 25-25.
-
(2006)
ATEC '06: Proc. Annual Conf. USENIX '06 Annual Technical Conf. Berkeley
, pp. 25-25
-
-
Avramopoulos, I.1
Rexford, J.2
-
145
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
V. N. Padmanabhan and D. R. Simon, "Secure traceroute to detect faulty or malicious routing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev.
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.N.1
Simon, D.R.2
-
146
-
-
27544472999
-
Fatih: Detecting and isolating malicious routers
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
A. T. Mizrak, "Fatih: Detecting and isolating malicious routers," in DSN '05: Proc. 2005 International Conf. Dependable Syst. Netw. Washington, DC, USA: IEEE Comput. Society, 2005, pp. 538-547. (Pubitemid 41538268)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 538-547
-
-
Mizrak, A.T.1
Cheng, Y.-C.2
Marzullo, K.3
Savage, S.4
-
147
-
-
33748117052
-
Detecting and isolating malicious routers
-
DOI 10.1109/TDSC.2006.34, 1673382
-
Y.-C. Cheng, "Detecting and isolating malicious routers," IEEE Trans. Dependable Secur. Comput., vol. 3, no. 3, pp. 230-244, 2006, Student Member-Mizrak, Alper Tugay and Member-Marzullo, Keith and Member-Savage, Stefan. (Pubitemid 44304210)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 230-244
-
-
Mizrak, A.T.1
Cheng, Y.-C.2
Marzullo, K.3
Savage, S.4
-
148
-
-
83255186150
-
Listen and whisper: Security mechanisms for BGP
-
Berkeley, CA, USA: USENIX Association
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz, "Listen and whisper: security mechanisms for BGP," in NSDI'04: Proc. 1st Conf. Symp. Netw. Syst. Design Implementation. Berkeley, CA, USA: USENIX Association, 2004, pp. 10-10.
-
(2004)
NSDI'04: Proc. 1st Conf. Symp. Netw. Syst. Design Implementation
, pp. 10-10
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.H.5
-
149
-
-
36849023890
-
Truth in advertising: Lightweight verification of route integrity
-
DOI 10.1145/1281100.1281123, PODC'07: Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing
-
E. L. Wong, P. Balasubramanian, L. Alvisi, M. G. Gouda, and V. Shmatikov, "Truth in advertising: Lightweight verification of route integrity," in PODC '07: Proc. Twenty-Sixth Annual ACM Symp. Principles Distributed Comput. New York, NY, USA: ACM, 2007, pp. 147-156. (Pubitemid 350229311)
-
(2007)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, pp. 147-156
-
-
Wong, E.L.1
Balasubramanian, P.2
Alvisi, L.3
Gouda, M.G.4
Shmatikov, V.5
-
150
-
-
72949118871
-
A survey of BGP security issues and solutions
-
Jan. 2010
-
K. Butler, T. R. Farley, P. McDaniel, and J. Rexford, "A survey of BGP security issues and solutions," Proc. IEEE, vol. 98, no. 1, pp. 100-122, Jan. 2010.
-
Proc. IEEE
, vol.98
, Issue.1
, pp. 100-122
-
-
Butler, K.1
Farley, T.R.2
McDaniel, P.3
Rexford, J.4
-
151
-
-
57749091537
-
Public key superstructure 'it's PKI Jim, but not as we know it!'
-
New York, NY, USA: ACM
-
S. Wilson, "Public key superstructure 'it's PKI Jim, but not as we know it!'," in IDtrust '08: Proc. 7th Symp. Identity Trust on Internet. New York, NY, USA: ACM, 2008, pp. 72-88.
-
(2008)
IDtrust '08: Proc. 7th Symp. Identity Trust on Internet
, pp. 72-88
-
-
Wilson, S.1
-
152
-
-
33847617478
-
Reengineering the internet for better security
-
M. Parameswaran, X. Zhao, A. B. Whinston, and F. Fang, "Reengineering the internet for better security," Comput., vol. 40, no. 1, pp. 40-44, 2007.
-
(2007)
Comput.
, vol.40
, Issue.1
, pp. 40-44
-
-
Parameswaran, M.1
Zhao, X.2
Whinston, A.B.3
Fang, F.4
-
154
-
-
2342453262
-
A framework for resilient Internet routing protocols
-
Mar.-Apr.
-
D. Pei, L. Zhang, and D. Massey, "A framework for resilient Internet routing protocols," Netw., IEEE, vol. 18, no. 2, pp. 5-12, Mar.-Apr. 2004.
-
(2004)
Netw. IEEE
, vol.18
, Issue.2
, pp. 5-12
-
-
Pei, D.1
Zhang, L.2
Massey, D.3
-
155
-
-
84868366104
-
-
Nov. [Online] Available
-
N. Hilliard, "RFC 5082 GTSM for Quagga bgpd," Nov. 2008. [Online]. Available: http://lists.quagga.net/pipermail/quagga-dev/2008-November/ 006116.html
-
(2008)
RFC 5082 GTSM for Quagga Bgpd
-
-
Hilliard, N.1
-
159
-
-
4243968055
-
Commentary on inter-domain routing in the internet
-
Dec. [Online]. Available
-
G. Huston, "Commentary on inter-domain routing in the internet," RFC 3221 (Informational), Internet Engineering Task Force, Dec. 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3221.txt
-
(2001)
RFC 3221 (Informational), Internet Engineering Task Force
-
-
Huston, G.1
-
160
-
-
80052036188
-
Scaling inter-domain routing-a view forward
-
Dec
-
"Scaling inter-domain routing-a view forward," Internet Protocol J., vol. 4, no. 4, Dec 2001.
-
(2001)
Ternet Protocol J.
, vol.4
, Issue.4
-
-
-
162
-
-
84876250553
-
BGP routing dynamics revisited
-
J. Li, M. Guidero, Z. Wu, E. Purpus, and T. Ehrenkranz, "BGP routing dynamics revisited," SIGCOMMComput. Commun. Rev., vol. 37, no. 2, pp. 5-16, 2007.
-
(2007)
SIGCOMMComput. Commun. Rev.
, vol.37
, Issue.2
, pp. 5-16
-
-
Li, J.1
Guidero, M.2
Wu, Z.3
Purpus, E.4
Ehrenkranz, T.5
-
163
-
-
0003976930
-
Multiprotocol extensions for BGP-4
-
Jan. [Online]. Available
-
T. Bates, R. Chandra, D. Katz, and Y. Rekhter, "Multiprotocol extensions for BGP-4," RFC 4760 (Draft Standard), Internet Engineering Task Force, Jan. 2007. [Online]. Available: http://www.ietf.org/rfc/rfc4760.txt
-
(2007)
RFC 4760 (Draft Standard), Internet Engineering Task Force
-
-
Bates, T.1
Chandra, R.2
Katz, D.3
Rekhter, Y.4
-
164
-
-
77957595181
-
-
last accessed June [Online]. Available
-
T. Bates, P. Smith, and G. Huston, "The CIDR report," last accessed: June 2009. [Online]. Available: http://www.cidr-report.org/as2.0/
-
(2009)
The CIDR Report
-
-
Bates, T.1
Smith, P.2
Huston, G.3
|