메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Listen and whisper: Security mechanisms for BGP

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SYSTEMS ANALYSIS;

EID: 83255186150     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (140)

References (35)
  • 1
    • 56449096542 scopus 로고    scopus 로고
    • Cisco ios netflow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.
    • Cisco ios netflow
  • 4
    • 85094679576 scopus 로고    scopus 로고
    • Internet routing registry. Version current January 2003
    • Internet routing registry. http://www.irr.net/. Version current January 2003.
  • 5
    • 85094673437 scopus 로고    scopus 로고
    • libpcap utility
    • libpcap utility. http://sourceforge.net/projects/libpcap.
  • 7
    • 85094668065 scopus 로고    scopus 로고
    • Ripe ncc
    • Ripe ncc. http://www.ripe.net.
  • 8
    • 85094654594 scopus 로고    scopus 로고
    • Routeviews
    • Routeviews. http://www.routeviews.org/.
  • 9
    • 85094668568 scopus 로고    scopus 로고
    • Sprint IPMON project
    • Sprint IPMON project. http://ipmon.sprint.com/.
  • 17
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • at
    • C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000. Available online at URL http://www.counterpane.com/pki-risks.html.
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 19
    • 85180543778 scopus 로고    scopus 로고
    • Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
    • San Diego, CA, USA, Feb
    • G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proc. of NDSS, San Diego, CA, USA, Feb. 2003.
    • (2003) Proc. of NDSS
    • Goodell, G.1    Aiello, W.2    Griffin, T.3    Ioannidis, J.4    McDaniel, P.5    Rubin, A.6
  • 20
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • June
    • Y. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proc. of WMCSA, June 2002.
    • (2002) Proc. of WMCSA
    • Hu, Y.1    Johnson, D. B.2    Perrig, A.3
  • 22
    • 84982836904 scopus 로고    scopus 로고
    • Efficient security mechanisms for routing protocols
    • February
    • Y. Hu, A. Perrig, and D. B. Johnson. Efficient security mechanisms for routing protocols. In Proc. of NDSS'03, February 2003.
    • (2003) Proc. of NDSS'03
    • Hu, Y.1    Perrig, A.2    Johnson, D. B.3
  • 23
    • 85094679179 scopus 로고    scopus 로고
    • Design and analysis of the Secure Border Gateway Protocol (S-BGP)
    • S. Kent, C. Lynn, and K. Seo. Design and analysis of the Secure Border Gateway Protocol (S-BGP). In Proc. of DISCEX'00.
    • Proc. of DISCEX'00
    • Kent, S.1    Lynn, C.2    Seo, K.3
  • 27
    • 84961751347 scopus 로고    scopus 로고
    • Retrofitting security into Internet infrastructure protocols
    • S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington. Retrofitting security into Internet infrastructure protocols. In Proc. of DISCEX'00, volume 1, pages 3-17, 1999.
    • (1999) Proc. of DISCEX'00 , vol.1 , pp. 3-17
    • Murphy, S.1    Gudmundsson, O.2    Mundy, R.3    Wellington, B.4
  • 29
    • 3042669550 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V. N. Padmanabhan and D. R. Simon. Secure traceroute to detect faulty or malicious routing. In Proc. HotNets-I, 2002.
    • (2002) Proc. HotNets-I
    • Padmanabhan, V. N.1    Simon, D. R.2
  • 30
    • 85013350011 scopus 로고
    • Wide area traffic: Failure of poisson modeling
    • V. Paxson and S.Floyd. Wide area traffic: Failure of poisson modeling. In Proc. ACM SIGCOMM, 1994.
    • (1994) Proc. ACM SIGCOMM
    • Paxson, V.1    Floyd, S.2
  • 31
  • 32
    • 0036346301 scopus 로고    scopus 로고
    • Characterizing the Internet hierarchy from multiple vantage points
    • New York
    • L. Subramanian, S.Agarwal, J.Rexford, and R. H. Katz. Characterizing the Internet hierarchy from multiple vantage points. In IEEE INFOCOM, New York, 2002.
    • (2002) IEEE INFOCOM
    • Subramanian, L.1    Agarwal, S.2    Rexford, J.3    Katz, R. H.4
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.