메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 3-12

PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based Security

Author keywords

BGP monitoring; Collaboration; Distributed alliance framework; Hijack; Interception; Prefix based security

Indexed keywords

BORDER GATEWAY PROTOCOL; INFORMATION ANALYSIS; SATELLITE INTERCEPTION;

EID: 84937678696     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663876.2663879     Document Type: Conference Paper
Times cited : (8)

References (38)
  • 2
    • 33144458666 scopus 로고    scopus 로고
    • Protocol modifications for the dns security extensions
    • Proposed Standard
    • R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard), 2005.
    • (2005) RFC , pp. 4035
    • Arends, R.1    Austein, R.2    Larson, M.3    Massey, D.4    Rose, S.5
  • 3
    • 84937714224 scopus 로고    scopus 로고
    • Characterizing intelligence gathering and control on an edge network
    • M. Arlitt, N. Carlsson, P. Gill, A. Mahanti, and C. Williamson. Characterizing intelligence gathering and control on an edge network. ACM TOIT, pages 2:1-2:26, 2011.
    • (2011) ACM TOIT , pp. 21-226
    • Arlitt, M.1    Carlsson, N.2    Gill, P.3    Mahanti, A.4    Williamson, C.5
  • 6
    • 70350437166 scopus 로고    scopus 로고
    • A study of prefix hijacking and interception in the Internet
    • H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. ACM CCR, pages 265-276, 2007.
    • (2007) ACM CCR , pp. 265-276
    • Ballani, H.1    Francis, P.2    Zhang, X.3
  • 8
    • 77958459456 scopus 로고    scopus 로고
    • Leveraging organizational etiquette to improve Internet security
    • N. Carlsson and M. Arlitt. Leveraging organizational etiquette to improve Internet security. In Proc. IEEE ICCCN, 2010.
    • (2010) Proc. IEEE, ICCCN
    • Carlsson, N.1    Arlitt, M.2
  • 11
    • 84937703306 scopus 로고    scopus 로고
    • Dynamic trust metrics for peer-to-peer systems
    • C. Duma, N. Shahmehri, and G. Caronni. Dynamic trust metrics for peer-to-peer systems. In Proc. PDMST, 2005.
    • (2005) Proc. PDMST
    • Duma, C.1    Shahmehri, N.2    Caronni, G.3
  • 12
    • 4444266989 scopus 로고    scopus 로고
    • Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • J. Fan, J. Xu, M. H. Ammar, and S. B. Moon. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks, pages 253-272, 2004.
    • (2004) Computer Networks, Pages , pp. 253-272
    • Fan, J.1    Xu, J.2    Ammar, M.H.3    Moon, S.B.4
  • 14
    • 84937694372 scopus 로고    scopus 로고
    • BGP monitoring protocol
    • R. Fernando and S. Stuart. BGP Monitoring Protocol. IETF, 2012.
    • (2012) IETF
    • Fernando, R.1    Stuart, S.2
  • 16
    • 84891392282 scopus 로고    scopus 로고
    • ROVER: Route origin verification using DNS
    • J. Gersch and D. Massey. ROVER: Route origin verification using DNS. In Proc. IEEE ICCCN, 2013.
    • (2013) Proc. IEEE ICCCN
    • Gersch, J.1    Massey, D.2
  • 19
    • 84893853185 scopus 로고    scopus 로고
    • Characterizing large-scale routing anomalies: A case study of the China telecom incident
    • R. Hiran, N. Carlsson, and P. Gill. Characterizing large-scale routing anomalies: A case study of the China telecom incident. In Proc. PAM, 2013.
    • (2013) Proc. PAM
    • Hiran, R.1    Carlsson, N.2    Gill, P.3
  • 21
    • 44049101942 scopus 로고    scopus 로고
    • Pretty good BGP: Improving BGP by cautiously adopting routes
    • J. Karlin, S. Forrest, and J. Rexford. Pretty good BGP: Improving BGP by cautiously adopting routes. In Proc. IEEE ICNP, 2006.
    • (2006) Proc. IEEE ICNP
    • Karlin, J.1    Forrest, S.2    Rexford, J.3
  • 24
    • 84902270294 scopus 로고    scopus 로고
    • BGPSEC protocol specification
    • M. Lepinski. BGPSEC protocol specification. IETF, 2013.
    • (2013) IETF
    • Lepinski, M.1
  • 25
    • 84904094098 scopus 로고    scopus 로고
    • An infrastructure to support secure internet routing
    • Informational
    • M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational), 2012.
    • (2012) RFC , pp. 6480
    • Lepinski, M.1    Kent, S.2
  • 29
    • 84905985354 scopus 로고    scopus 로고
    • Detecting third-party addresses in traceroute traces with IP timestamp option
    • P. Marchetta, W. de Donato, and A. Pescape. Detecting third-party addresses in traceroute traces with IP timestamp option. In Proc. PAM, 2013.
    • (2013) Proc. PAM
    • Marchetta, P.1    Donato, W.D.2    Pescape, A.3
  • 30
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 32
    • 70449516825 scopus 로고    scopus 로고
    • Near-deterministic inference of AS relationships
    • Y. Shavitt, E. Shir, and U. Weinsberg. Near-deterministic inference of AS relationships. In Proc. ConTEL, 2009.
    • (2009) Proc. ConTEL
    • Shavitt, Y.1    Shir, E.2    Weinsberg, U.3
  • 35
    • 80053629786 scopus 로고    scopus 로고
    • A framework to quantify the pitfalls of using traceroute in AS-level topology measurement
    • Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang. A framework to quantify the pitfalls of using traceroute in AS-level topology measurement. IEEE JSAC, pages 1822-1836, 2011.
    • (2011) IEEE JSAC , pp. 1822-1836
    • Zhang, Y.1    Oliveira, R.2    Wang, Y.3    Su, S.4    Zhang, B.5    Bi, J.6    Zhang, H.7    Zhang, L.8
  • 36
    • 65249154022 scopus 로고    scopus 로고
    • Ispy: Detecting IP prefix hijacking on my own
    • Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush. Ispy: detecting IP prefix hijacking on my own. ACM CCR, pages 327-338, 2008.
    • (2008) ACM CCR , pp. 327-338
    • Zhang, Z.1    Zhang, Y.2    Hu, Y.C.3    Mao, Z.M.4    Bush, R.5
  • 37
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detecting IP prefix hijacks in real-time
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In Proc. ACM SIGCOMM, 2007.
    • (2007) Proc. ACM SIGCOMM
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5
  • 38
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C. V. Zhou, C. Leckie, and S. Karunasekera. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security, 29:124-140, 2010.
    • (2010) Computers and Security , vol.29 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.