메뉴 건너뛰기




Volumn , Issue , 2009, Pages 437-452

Netreview: Detecting when interdomain routing goes wrong

Author keywords

[No Author keywords available]

Indexed keywords

BORDER GATEWAY PROTOCOL; GATEWAYS (COMPUTER NETWORKS); INTERNET SERVICE PROVIDERS; ROUTING PROTOCOLS; SYSTEMS ANALYSIS;

EID: 85076898069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (51)

References (37)
  • 6
    • 0022020346 scopus 로고
    • Distributed snapshots: Determining global states of distributed systems
    • K. M. Chandy and L. Lamport. Distributed snapshots: Determining global states of distributed systems. ACM Trans. Comput. Syst., 3(1):63-75, 1985.
    • (1985) ACM Trans. Comput. Syst. , vol.3 , Issue.1 , pp. 63-75
    • Chandy, K.M.1    Lamport, L.2
  • 8
    • 84894553762 scopus 로고    scopus 로고
    • Detecting BGP configuration faults with static analysis
    • May
    • N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In Proceedings of NSDI'05, May 2005.
    • (2005) Proceedings of NSDI'05
    • Feamster, N.1    Balakrishnan, H.2
  • 11
    • 0035699394 scopus 로고    scopus 로고
    • Stable Internet routing without global coordination
    • Dec
    • L. Gao and J. Rexford. Stable Internet routing without global coordination. IEEE/ACM Transactions on Networking, 9(6):681-692, Dec 2001.
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.6 , pp. 681-692
    • Gao, L.1    Rexford, J.2
  • 12
    • 85076892353 scopus 로고    scopus 로고
    • GNU Zebra. http://www.zebra.org/.
  • 20
    • 26444521917 scopus 로고    scopus 로고
    • SPV: Secure path vector routing for securing BGP
    • Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In Proc. ACM SIGCOMM, 2004.
    • (2004) Proc. ACM SIGCOMM
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 22
    • 0033743163 scopus 로고    scopus 로고
    • Secure border gateway protocol (S-BGP)
    • Apr
    • S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE JSAC, 18(4):582-592, Apr 2000.
    • (2000) IEEE JSAC , vol.18 , Issue.4 , pp. 582-592
    • Kent, S.1    Lynn, C.2    Seo, K.3
  • 27
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Sep
    • A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM, Sep 2006.
    • (2006) Proc. ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 28
    • 0004092895 scopus 로고    scopus 로고
    • A border gateway protocol 4 (BGP-4)
    • Jan
    • Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (BGP-4). RFC 4271, Jan 2006.
    • (2006) RFC 4271
    • Rekhter, Y.1    Li, T.2    Hares, S.3
  • 29
    • 70449425424 scopus 로고    scopus 로고
    • Securing BGP using external security monitors
    • Cornell University, Computing and Information Science, Dec
    • P. Reynolds, O. Kennedy, E. G. Sirer, and F. B. Schneider. Securing BGP using external security monitors. Technical Report TR-2006-2065, Cornell University, Computing and Information Science, Dec 2006.
    • (2006) Technical Report TR-2006-2065
    • Reynolds, P.1    Kennedy, O.2    Sirer, E.G.3    Schneider, F.B.4
  • 34
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin BGP
    • R. White. Securing BGP through secure origin BGP. Internet Protocol Journal, 6(3), 2003.
    • (2003) Internet Protocol Journal , vol.6 , Issue.3
    • White, R.1
  • 35
    • 77952183219 scopus 로고    scopus 로고
    • Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network
    • May
    • J. Wu, Z. M. Mao, J. Rexford, and J. Wang. Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network. In Processings of NSDI'05, May 2005.
    • (2005) Processings of NSDI'05
    • Wu, J.1    Mao, Z.M.2    Rexford, J.3    Wang, J.4
  • 36
    • 36949036650 scopus 로고    scopus 로고
    • A light-weight distributed scheme for detecting IP prefix hijacks in real-time
    • Aug
    • C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In Proc. ACM SIGCOMM, Aug. 2007.
    • (2007) Proc. ACM SIGCOMM
    • Zheng, C.1    Ji, L.2    Pei, D.3    Wang, J.4    Francis, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.