{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:46:42Z","timestamp":1774716402233,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319171715","type":"print"},{"value":"9783319171722","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17172-2_12","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T03:04:26Z","timestamp":1429153466000},"page":"173-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks"],"prefix":"10.1007","author":[{"given":"Johann","family":"Schlamp","sequence":"first","affiliation":[]},{"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Korsten","sequence":"additional","affiliation":[]},{"given":"Quentin","family":"Jacquemart","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]},{"given":"Ernst W.","family":"Biersack","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the Internet. In: Proc. ACM SIGCOMM 2007, pp. 265\u2013276 (2007)","DOI":"10.1145\/1282380.1282411"},{"key":"12_CR2","unstructured":"Hepner, C., Zmijewski, E.: Defending against BGP man-in-the-middle attacks. Talk at BlackHat 2009 (2009)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Hu, X., Mao, Z.M.: Accurate real-time identification of IP prefix hijacking. In: Proc. IEEE Symposium on Security and Privacy, pp. 3\u201317 (2007)","DOI":"10.1109\/SP.2007.7"},{"key":"12_CR4","unstructured":"Huston, G., Bush, R.: Securing BGP and SIDR. IETF Journal 7(1) (2011)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (SBGP). IEEE Journal on Selected Areas in Communications 18(4), April 2000","DOI":"10.1109\/49.839934"},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/2500098.2500101","volume":"43","author":"A Khan","year":"2013","unstructured":"Khan, A., Kim, H.-C., Kwon, T., Choi, Y.: A comparative study on ip prefixes and their origin ases in bgp and the irr. SIGCOMM Comput. Commun. Rev. 43(3), 16\u201324 (2013)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"12_CR7","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: a prefix hijack alert system. In: Proc. 15th USENIX Security Symposium, vol. 15 (2006)"},{"key":"12_CR8","unstructured":"Pilosov, A., Kapela, T.: Stealing the Internet: An Internet-scale man in the middle attack. In: Talk at DEFCON 16 (2008)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Qiu, J., Gao, L.: Detecting bogus BGP route information: going beyond prefix hijacking. In: Proc. 3rd Int. Conf. on Security and Privacy in Communication Networks (SecureComm) (2007)","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: Proc. ACM SIGCOMM 2006 (2006)","DOI":"10.1145\/1159913.1159947"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2479957.2479959","volume":"43","author":"J Schlamp","year":"2013","unstructured":"Schlamp, J., Carle, G., Biersack, E.W.: A forensic case study on as hijacking: the attacker\u2019s perspective. ACM SIGCOMM CCR 43(2), 5\u201312 (2013)","journal-title":"ACM SIGCOMM CCR"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the Internet with argus. In: Proc. ACM SIGCOMM IMC (2012)","DOI":"10.1145\/2398776.2398779"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2377677.2377702","volume":"42","author":"M W\u00e4hlisch","year":"2012","unstructured":"W\u00e4hlisch, M., Maennel, O., Schmidt, T.C.: Towards Detecting BGP Route Hijacking Using the RPKI. ACM SIGCOMM CCR 42(4), 103\u2013104 (2012)","journal-title":"ACM SIGCOMM CCR"},{"issue":"6","key":"12_CR14","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TNET.2010.2066284","volume":"18","author":"Z Zhang","year":"2010","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: Detecting IP prefix hijacking on my own. IEEE\/ACM Trans. on Networking 18(6), 1815\u20131828 (2010)","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Zheng, C., Ji, L., Pei, D., Wang, J., Francis, P.: A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In: Proc. ACM SIGCOMM 2007 (2007)","DOI":"10.1145\/1282380.1282412"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17172-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:46:56Z","timestamp":1559152016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-17172-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319171715","9783319171722"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17172-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}