{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:29Z","timestamp":1763468249043,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319171715"},{"type":"electronic","value":"9783319171722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17172-2_13","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T03:04:26Z","timestamp":1429153466000},"page":"188-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire"],"prefix":"10.1007","author":[{"given":"Johann","family":"Schlamp","sequence":"first","affiliation":[]},{"given":"Josef","family":"Gustafsson","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. In: Proc. ACM SIGCOMM 2007, pp. 265\u2013276 (2007)","DOI":"10.1145\/1282380.1282411"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Cooper, D., Heilman, E., Brogle, K., Reyzin, L., Goldberg, S.: On the risk of misbehaving RPKI authorities. In: Proc. of HotNets-XII. ACM, New York (2013)","DOI":"10.1145\/2535771.2535787"},{"key":"13_CR3","unstructured":"Felegyhazi, M., Kreibich, C., Paxson, V.: On the potential of proactive domain blacklisting. In: Proc. of the 3rd USENIX LEET Conference. USENIX Association, Berkeley (2010)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-642-04492-2_40","volume-title":"Management Enabling the Future Internet for Changing Business and New Computing Services","author":"S-C Hong","year":"2009","unstructured":"Hong, S.-C., Ju, H.-T., Hong, J.W.: IP prefix hijacking detection using idle scan. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, C.-S. (eds.) APNOMS 2009. LNCS, vol. 5787, pp. 395\u2013404. Springer, Heidelberg (2009)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Hu, X., Mao, Z.M.: Accurate real-time identification of IP prefix hijacking. In: Proc. IEEE Symposium on Security and Privacy, pp. 3\u201317 (2007)","DOI":"10.1109\/SP.2007.7"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-54999-1_11","volume-title":"Traffic Monitoring and Analysis","author":"Q Jacquemart","year":"2014","unstructured":"Jacquemart, Q., Urvoy-Keller, G., Biersack, E.: A longitudinal study of BGP MOAS prefixes. In: Dainotti, A., Mahanti, A., Uhlig, S. (eds.) TMA 2014. LNCS, vol. 8406, pp. 127\u2013138. Springer, Heidelberg (2014)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Kalafut, A.J., Gupta, M., Cole, C.A., Chen, L., Myers, N.E.: An empirical study of orphan DNS servers in the internet. In: Proc. of the 10th ACM SIGCOMM IMC, pp. 308\u2013314. ACM, New York (2010)","DOI":"10.1145\/1879141.1879182"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (SBGP). IEEE Journal on Selected Areas in Communications 18(4), April 2000","DOI":"10.1109\/49.839934"},{"key":"13_CR9","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: A prefix hijack alert system. In: Proc. 15th USENIX Security Symposium, vol. 15 (2006)"},{"key":"13_CR10","unstructured":"Lepinski, M.: BGPSEC Protocol Specification. Internet-Draft - work in progress 00, IETF, March 2011"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Kent, S.: An Infrastructure to Support Secure Internet Routing. RFC 6480, IETF, February 2012","DOI":"10.17487\/rfc6480"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Lychev, R., Goldberg, S., Schapira, M.: Bgp security in partial deployment: Is the juice worth the squeeze?. In: Proc. of ACM SIGCOMM, pp. 171\u2013182. ACM, New York (2013)","DOI":"10.1145\/2534169.2486010"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Mohapatra, P., Scudder, J., Ward, D., Bush, R., Austein, R.: BGP Prefix Origin Validation. RFC 6811, IETF, January 2013","DOI":"10.17487\/rfc6811"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Qiu, J., Gao, L.: Detecting bogus BGP route information: going beyond prefix hijacking. In: Proc. 3rd Int. Conf. on Security and Privacy in Communication Networks (SecureComm) (2007)","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: Proc. ACM SIGCOMM 2006 (2006)","DOI":"10.1145\/1159913.1159947"},{"key":"13_CR16","unstructured":"RIPE NCC. RIPE Database Update Reference Manual. \n                      http:\/\/www.ripe.net\/data-tools\/support\/documentation\/RIPEDatabaseUpdateManual20140425_edit.pdf"},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2479957.2479959","volume":"43","author":"J Schlamp","year":"2013","unstructured":"Schlamp, J., Carle, G., Biersack, E.W.: A forensic case study on as hijacking: the attacker\u2019s perspective. ACM SIGCOMM CCR 43(2), 5\u201312 (2013)","journal-title":"ACM SIGCOMM CCR"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the Internet with argus. In: Proc. ACM SIGCOMM Internet Measurement Conference (IMC) (2012)","DOI":"10.1145\/2398776.2398779"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Vervier, P.-A., Thonnard, O.: SpamTracer: How stealthy are spammers? In: 5th Int. Workshop on Traffic Monitoring and Analysis (TMA 2013) (2013)","DOI":"10.1109\/INFCOM.2013.6567184"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Vervier, P.-A., Jacquemart, Q., Schlamp, J., Thonnard, O., Carle, G., Urvoy-Keller, G., Biersack, E.W., Dacier, M.: Malicious BGP hijacks: appearances can be deceiving. In: IEEE ICC Communications and Information Systems Security Symposium (ICC CISS 2014) (2014)","DOI":"10.1109\/ICC.2014.6883431"},{"issue":"4","key":"13_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2377677.2377702","volume":"42","author":"M W\u00e4hlisch","year":"2012","unstructured":"W\u00e4hlisch, M., Maennel, O., Schmidt, T.C.: Towards Detecting BGP Route Hijacking Using the RPKI. ACM SIGCOMM CCR 42(4), 103\u2013104 (2012)","journal-title":"ACM SIGCOMM CCR"},{"issue":"6","key":"13_CR22","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TNET.2010.2066284","volume":"18","author":"Z Zhang","year":"2010","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: Detecting IP prefix hijacking on my own. IEEE\/ACM Trans. on Networking 18(6), 1815\u20131828 (2010)","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Zheng, C., Ji, L., Pei, D., Wang, J., Francis, P.: A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In: Proc. ACM SIGCOMM 2007, pp. 277\u2013288 (2007)","DOI":"10.1145\/1282380.1282412"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17172-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:40:31Z","timestamp":1558309231000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-17172-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319171715","9783319171722"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17172-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}