메뉴 건너뛰기




Volumn 20, Issue 1, 2012, Pages 220-230

Abnormally malicious autonomous systems and their internet connectivity

Author keywords

Autonomous systems (ASs); Security

Indexed keywords

AUTONOMOUS SYSTEMS; BOTNETS; CYBERCRIME; INTERNET CONNECTIVITY; IP ADDRESSS; MALICIOUS ACTIVITIES; MALICIOUS BEHAVIOR; NETWORK OPERATOR; SECURITY;

EID: 84857360605     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2157699     Document Type: Article
Times cited : (46)

References (34)
  • 4
    • 84857358597 scopus 로고    scopus 로고
    • Route Views project, University of Oregon Advanced Network Technology Center, Eugene, OR Online
    • "Route Views project," University of Oregon Advanced Network Technology Center, Eugene, OR Online. Available: http://www.routeviews.org/
  • 5
    • 84857358598 scopus 로고    scopus 로고
    • APWG, Anti-Phishing Working Group Online
    • "APWG," Anti-Phishing Working Group Online. Available: http://www.antiphishing.org/
  • 6
    • 84857372108 scopus 로고    scopus 로고
    • PhishTank, OpenDNS, San Francisco, CA Online. Available:
    • "PhishTank," OpenDNS, San Francisco, CA Online. Available: http://www.phishtank.com/
  • 7
    • 84857362476 scopus 로고    scopus 로고
    • Support Intelligence, LLC, Support Intelligence, LLC, San Francisco, CA Online
    • "Support Intelligence, LLC," Support Intelligence, LLC, San Francisco, CA Online. Available: http://www.support-intelligence.com/
  • 8
    • 84857362477 scopus 로고    scopus 로고
    • SURBL
    • "SURBL," Online. Available: http://www.surbl.org/
  • 9
    • 84857360435 scopus 로고    scopus 로고
    • Spamhaus block list (SBL). Spamhaus Project Online
    • "Spamhaus block list (SBL)," Spamhaus Project Online. Available: http://www.spamhaus.org/sbl/index.lasso
  • 10
    • 84857372110 scopus 로고    scopus 로고
    • Exploits block list (XBL), Spamhaus Project Online
    • "Exploits block list (XBL)," Spamhaus Project Online. Available: http://www.spamhaus.org/xbl/index.lasso
  • 11
    • 84857372111 scopus 로고    scopus 로고
    • Viruswatch mailing list, NETpilot GmbH, Munich, Germany Online
    • "Viruswatch mailing list," NETpilot GmbH, Munich, Germany Online. Available: http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch
  • 12
    • 84857372109 scopus 로고    scopus 로고
    • eSoft Inc., eSoft Inc., Broomfield, CO Online
    • "eSoft Inc.," eSoft Inc., Broomfield, CO Online. Available: http://www.esoft.com/
  • 13
    • 84857362479 scopus 로고    scopus 로고
    • Malware block list, Malware Patrol Online
    • "Malware block list,"Malware Patrol Online. Available: http://www.malwarepatrol.net/lists.shtml
  • 14
    • 84857358599 scopus 로고    scopus 로고
    • ShadowServer Foundation
    • "ShadowServer Foundation," Online. Available: http://www.shadowserver.org/wiki/
  • 15
    • 0035704351 scopus 로고    scopus 로고
    • On inferring autonomous system relationships in the Internet
    • DOI 10.1109/90.974527, PII S1063669201105480
    • L.Gao, "On inferring autonomous system relationships in the internet," IEEE/ACM Trans. Netw., vol. 9, no. 6, pp. 733-745, Dec. 2001. (Pubitemid 34099653)
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.6 , pp. 733-745
    • Gao, L.1
  • 16
    • 0042934007 scopus 로고    scopus 로고
    • Computing the types of the relationships between autonomous systems
    • G. D. Battista, M. Patrignani, and M. Pizzonia, "Computing the types of the relationships between autonomous systems," in Proc. IEEE INFOCOM, 2003, vol. 1, pp. 156-165.
    • (2003) Proc. IEEE INFOCOM , vol.1 , pp. 156-165
    • Battista, G.D.1    Patrignani, M.2    Pizzonia, M.3
  • 18
    • 0036346301 scopus 로고    scopus 로고
    • Characterizing the internet hierarchy from multiple vantage points
    • L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, "Characterizing the internet hierarchy from multiple vantage points," in Proc. IEEE INFOCOM, 2002, vol. 2, pp. 618-627.
    • (2002) Proc. IEEE INFOCOM , vol.2 , pp. 618-627
    • Subramanian, L.1    Agarwal, S.2    Rexford, J.3    Katz, R.H.4
  • 20
    • 21844445354 scopus 로고    scopus 로고
    • Locating Internet routing instabilities
    • DOI 10.1145/1030194.1015491, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • A. Feldmann, O. Maennel, Z.M. Mao, A. Berger, and B. Maggs, "Locating internet routing instabilities," in Proc. ACM SIGCOMM, 2004, pp. 205-218. (Pubitemid 40954881)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 205-218
    • Feldmann, A.1    Maennel, O.2    Mao, Z.M.3    Berger, A.4    Maggs, B.5
  • 21
    • 65249154022 scopus 로고    scopus 로고
    • ISPY: Detecting IP prefix hijacking on my own
    • Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, "iSPY: Detecting IP prefix hijacking on my own," in Proc. ACM SIGCOMM, 2008, pp. 327-338.
    • (2008) Proc. ACM SIGCOMM , pp. 327-338
    • Zhang, Z.1    Zhang, Y.2    Hu, Y.C.3    Mao, Z.M.4
  • 22
    • 56749151567 scopus 로고    scopus 로고
    • Practical defenses against BGP prefix hijacking
    • Article no. 3
    • Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, "Practical defenses against BGP prefix hijacking," in Proc. CoNEXT, 2007, Article no. 3.
    • (2007) Proc. CoNEXT
    • Zhang, Z.1    Zhang, Y.2    Hu, Y.C.3    Mao, Z.M.4
  • 23
    • 0033743163 scopus 로고    scopus 로고
    • Secure border gateway protocol (S-BGP)
    • Apr.
    • S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (S-BGP)," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 582-592, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4 , pp. 582-592
    • Kent, S.1    Lynn, C.2    Seo, K.3
  • 24
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin BGP (soBGP)
    • R. White, "Securing BGP through secure origin BGP (soBGP)," Internet Protocol J., vol. 6, no. 3, pp. 15-22, 2003.
    • (2003) Internet Protocol J. , vol.6 , Issue.3 , pp. 15-22
    • White, R.1
  • 26
  • 28
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • DOI 10.1145/1151659.1159947
    • A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, 2006, pp. 291-302. (Pubitemid 44623735)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2
  • 31
    • 49949109773 scopus 로고    scopus 로고
    • The Honeynet Project, Naperville, IL, Whitepaper, Jul.
    • "Know your enemy: Fast-flux service networks," The Honeynet Project, Naperville, IL, Whitepaper, Jul. 2007 Online. Available: http://www.honeynet.org/papers/ff
    • (2007) Know Your Enemy: Fast-flux Service Networks
  • 32
    • 70350145115 scopus 로고    scopus 로고
    • Phishing infrastructure fluxes all the way
    • Sep.-Oct.
    • D. K. McGrath, A. Kalafut, and M. Gupta, "Phishing infrastructure fluxes all the way," IEEE Security Privacy, vol. 7, no. 5, pp. 21-28, Sep.-Oct. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.5 , pp. 21-28
    • McGrath, D.K.1    Kalafut, A.2    Gupta, M.3
  • 33
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking
    • DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in Proc. IEEE Symp. Security Privacy, 2007, pp. 3-17. (Pubitemid 47432512)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 3-17
    • Hu, X.1    Mao, Z.M.2
  • 34


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.