-
2
-
-
33144458666
-
Protocol modifications for the dns security extensions
-
Proposed Standard
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard), 2005.
-
(2005)
RFC
, pp. 4035
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
3
-
-
84937714224
-
Characterizing intelligence gathering and control on an edge network
-
M. Arlitt, N. Carlsson, P. Gill, A. Mahanti, and C. Williamson. Characterizing intelligence gathering and control on an edge network. ACM TOIT, pages 2:1-2:26, 2011.
-
(2011)
ACM TOIT
, pp. 21-226
-
-
Arlitt, M.1
Carlsson, N.2
Gill, P.3
Mahanti, A.4
Williamson, C.5
-
6
-
-
70350437166
-
A study of prefix hijacking and interception in the Internet
-
H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. ACM CCR, pages 265-276, 2007.
-
(2007)
ACM CCR
, pp. 265-276
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
7
-
-
72949118871
-
A survey of BGP security issues and solutions
-
K. Butler, T. Farley, P. McDaniel, and J. Rexford. A survey of BGP security issues and solutions. Proceedings of IEEE, 98:100-121, 2010.
-
(2010)
Proceedings of IEEE
, vol.98
, pp. 100-121
-
-
Butler, K.1
Farley, T.2
McDaniel, P.3
Rexford, J.4
-
8
-
-
77958459456
-
Leveraging organizational etiquette to improve Internet security
-
N. Carlsson and M. Arlitt. Leveraging organizational etiquette to improve Internet security. In Proc. IEEE ICCCN, 2010.
-
(2010)
Proc. IEEE, ICCCN
-
-
Carlsson, N.1
Arlitt, M.2
-
9
-
-
76749106199
-
Where the sidewalk ends: Extending the internet as graph using traceroutes from p2p users
-
K. Chen, D. R. Choffnes, R. Potharaju, Y. Chen, F. E. Bustamante, D. Pei, and Y. Zhao. Where the sidewalk ends: Extending the Internet AS graph using traceroutes from p2p users. In Proc. CoNEXT, 2009.
-
(2009)
Proc. CoNEXT
-
-
Chen, K.1
Choffnes, D.R.2
Potharaju, R.3
Chen, Y.4
Bustamante, F.E.5
Pei, D.6
Zhao, Y.7
-
10
-
-
84893259709
-
On the risk of misbehaving RPKI authorities
-
D. Cooper, E. Heilman, K. Brogle, L. Reyzin, and S. Goldberg. On the risk of misbehaving RPKI authorities. In Proc. ACM HotNets, 2013.
-
(2013)
Proc. ACM HotNets
-
-
Cooper, D.1
Heilman, E.2
Brogle, K.3
Reyzin, L.4
Goldberg, S.5
-
12
-
-
4444266989
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
J. Fan, J. Xu, M. H. Ammar, and S. B. Moon. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks, pages 253-272, 2004.
-
(2004)
Computer Networks, Pages
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
13
-
-
11244271633
-
The case for separating routing from routers
-
N. Feamster, H. Balakrishnan, J. Rexford, A. Shaikh, and J. van der Merwe. The case for separating routing from routers. In Proc. ACM SIGCOMM FDNA, 2004.
-
(2004)
Proc. ACM SIGCOMM FDNA
-
-
Feamster, N.1
Balakrishnan, H.2
Rexford, J.3
Shaikh, A.4
Van Der Merwe, J.5
-
15
-
-
30144440132
-
PlanetSim: A new overlay network simulation framework
-
P. Garca, C. Pairot, R. Mondjar, J. Pujol, H. Tejedor, and R. Rallo. PlanetSim: A new overlay network simulation framework. In Proc. SEM, 2004.
-
(2004)
Proc. SEM
-
-
Garca, P.1
Pairot, C.2
Mondjar, R.3
Pujol, J.4
Tejedor, H.5
Rallo, R.6
-
16
-
-
84891392282
-
ROVER: Route origin verification using DNS
-
J. Gersch and D. Massey. ROVER: Route origin verification using DNS. In Proc. IEEE ICCCN, 2013.
-
(2013)
Proc. IEEE ICCCN
-
-
Gersch, J.1
Massey, D.2
-
17
-
-
84883649048
-
Efficient routing for peer-to-peer overlays
-
A. Gupta, B. Liskov, and R. Rodrigues. Efficient routing for peer-to-peer overlays. In Proc. NSDI, San Francisco, CA, 2004.
-
(2004)
Proc. NSDI, San Francisco, CA
-
-
Gupta, A.1
Liskov, B.2
Rodrigues, R.3
-
19
-
-
84893853185
-
Characterizing large-scale routing anomalies: A case study of the China telecom incident
-
R. Hiran, N. Carlsson, and P. Gill. Characterizing large-scale routing anomalies: A case study of the China telecom incident. In Proc. PAM, 2013.
-
(2013)
Proc. PAM
-
-
Hiran, R.1
Carlsson, N.2
Gill, P.3
-
21
-
-
44049101942
-
Pretty good BGP: Improving BGP by cautiously adopting routes
-
J. Karlin, S. Forrest, and J. Rexford. Pretty good BGP: Improving BGP by cautiously adopting routes. In Proc. IEEE ICNP, 2006.
-
(2006)
Proc. IEEE ICNP
-
-
Karlin, J.1
Forrest, S.2
Rexford, J.3
-
23
-
-
82755166662
-
PHAS: A prefix hijack alert system
-
M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: A prefix hijack alert system. In Proc. USENIX Security Symp., 2006.
-
(2006)
Proc. USENIX Security Symp
-
-
Lad, M.1
Massey, D.2
Pei, D.3
Wu, Y.4
Zhang, B.5
Zhang, L.6
-
24
-
-
84902270294
-
BGPSEC protocol specification
-
M. Lepinski. BGPSEC protocol specification. IETF, 2013.
-
(2013)
IETF
-
-
Lepinski, M.1
-
25
-
-
84904094098
-
An infrastructure to support secure internet routing
-
Informational
-
M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational), 2012.
-
(2012)
RFC
, pp. 6480
-
-
Lepinski, M.1
Kent, S.2
-
26
-
-
84890050382
-
AS relationships, customer cones, and validation
-
M. Luckie, B. Huffaker, A. Dhamdhere, V. Giotsas, and kc claffy. AS relationships, customer cones, and validation. In Proc. IMC, 2013.
-
(2013)
Proc. IMC
-
-
Luckie, M.1
Huffaker, B.2
Dhamdhere, A.3
Giotsas, V.4
Claffy, K.5
-
27
-
-
84872956076
-
IPlane: An information plane for distributed services
-
H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An information plane for distributed services. In Proc. OSDI, 2006.
-
(2006)
Proc. OSDI
-
-
Madhyastha, H.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.5
Krishnamurthy, A.6
Venkataramani, A.7
-
29
-
-
84905985354
-
Detecting third-party addresses in traceroute traces with IP timestamp option
-
P. Marchetta, W. de Donato, and A. Pescape. Detecting third-party addresses in traceroute traces with IP timestamp option. In Proc. PAM, 2013.
-
(2013)
Proc. PAM
-
-
Marchetta, P.1
Donato, W.D.2
Pescape, A.3
-
30
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
33
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. ACM SIGCOMM, 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
35
-
-
80053629786
-
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement
-
Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang. A framework to quantify the pitfalls of using traceroute in AS-level topology measurement. IEEE JSAC, pages 1822-1836, 2011.
-
(2011)
IEEE JSAC
, pp. 1822-1836
-
-
Zhang, Y.1
Oliveira, R.2
Wang, Y.3
Su, S.4
Zhang, B.5
Bi, J.6
Zhang, H.7
Zhang, L.8
-
36
-
-
65249154022
-
Ispy: Detecting IP prefix hijacking on my own
-
Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush. Ispy: detecting IP prefix hijacking on my own. ACM CCR, pages 327-338, 2008.
-
(2008)
ACM CCR
, pp. 327-338
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
Bush, R.5
-
37
-
-
36949036650
-
A light-weight distributed scheme for detecting IP prefix hijacks in real-time
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In Proc. ACM SIGCOMM, 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
38
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C. V. Zhou, C. Leckie, and S. Karunasekera. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security, 29:124-140, 2010.
-
(2010)
Computers and Security
, vol.29
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|