{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:40:59Z","timestamp":1725835259285},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_6","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T10:10:45Z","timestamp":1445854245000},"page":"111-132","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Demystifying the IP Blackspace"],"prefix":"10.1007","author":[{"given":"Quentin","family":"Jacquemart","sequence":"first","affiliation":[]},{"given":"Pierre-Antoine","family":"Vervier","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Urvoy-Keller","sequence":"additional","affiliation":[]},{"given":"Ernst","family":"Biersack","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"6_CR1","unstructured":"APNIC: Understanding address management hierarchy. \n                      http:\/\/www.apnic.net\/services\/manage-resources\/address-management-objectives\/management-hierarchy"},{"key":"6_CR2","unstructured":"APNIC: Using Whois: Quick Beginners Guide. \n                      http:\/\/www.apnic.net\/apnic-info\/whois_search\/using-whois\/guide"},{"key":"6_CR3","unstructured":"ARIN: Extended Allocation and Assignment Report for RIRs. \n                      https:\/\/www.arin.net\/knowledge\/statistics\/nro_extended_stats_format.pdf"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bush, R., Hiebert, J., Maennel, O., Roughan, M., Uhlig, S.: Testing the reachability of (new) address space. In: Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, INM 2007, pp. 236\u2013241 (2007)","DOI":"10.1145\/1321753.1321756"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proceedings of the World Wide Web Conference (WWW) (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"6_CR6","unstructured":"Madory, D.: The Vast World of Fraudulent Routing, January 2015. \n                      http:\/\/research.dyn.com\/2015\/01\/vast-world-of-fraudulent-routing\/\n                      \n                    . Accessed 5 June 2015"},{"key":"6_CR7","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of the 22nd USENIX Security Symposium, August 2013"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1052812.1052826","volume":"35","author":"N Feamster","year":"2004","unstructured":"Feamster, N., Jung, J., Balakrishnan, H.: An empirical study of \u201cbogon\u201d route advertisements. Comput. Commun. Rev. 35(1), 63\u201370 (2004)","journal-title":"Comput. Commun. Rev."},{"key":"6_CR9","unstructured":"Huston, G.: AS names. \n                      http:\/\/bgp.potaroo.net\/cidr\/autnums.html"},{"key":"6_CR10","unstructured":"Huston, G.: RIR Resource Allocation Data Inconsistencies. \n                      http:\/\/www.cidr-report.org\/bogons\/rir-data.html"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/964725.633027","volume":"32","author":"R Mahajan","year":"2002","unstructured":"Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. SIGCOMM Comput. Commun. Rev. 32(4), 3\u201316 (2002)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Mitchell, J.: Autonomous System (AS) Reservation for Private Use. RFC 6996, July 2013","DOI":"10.17487\/rfc6996"},{"key":"6_CR13","unstructured":"Passive Spam Block List. \n                      http:\/\/psbl.org\/"},{"key":"6_CR14","unstructured":"RIPE NCC: FAQ: Becoming a member. \n                      https:\/\/www.ripe.net\/lir-services\/member-support\/info\/faqs\/faq-joining"},{"key":"6_CR15","unstructured":"RIPE NCC: Routing Information Service. \n                      http:\/\/www.ripe.net\/ris\/"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the internet with argus. In: Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, IMC 2012, pp. 15\u201328 (2012)","DOI":"10.1145\/2398776.2398779"},{"key":"6_CR17","unstructured":"Spamhaus. \n                      http:\/\/www.spamhaus.org\/"},{"key":"6_CR18","unstructured":"Team Cymru: The Bogon Reference. \n                      http:\/\/www.team-cymru.org\/bogon-reference.html"},{"key":"6_CR19","unstructured":"Thomas, R.: 60 Days of Basic Naughtiness: Probes and Attacks Endured by an Active Web Site. \n                      http:\/\/www.team-cymru.org\/documents\/60Days.ppt\n                      \n                    , March 2001"},{"key":"6_CR20","unstructured":"Toonk, A.: Recent BGP routing incidents - malicious or not. Presentation at NANOG 63, February 2015"},{"key":"6_CR21","unstructured":"Uceprotect. \n                      http:\/\/www.uceprotect.net\/"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Vervier, P.A., Thonnard, O., Dacier, M.: Mind your blocks: on the stealthiness of malicious BGP hijacks. In: NDSS 2015, Network and Distributed System Security Symposium, February 2015","DOI":"10.14722\/ndss.2015.23035"},{"key":"6_CR23","unstructured":"VirusTotal. \n                      https:\/\/www.virustotal.com\/"},{"key":"6_CR24","unstructured":"Weighted Private Block List. \n                      http:\/\/www.wpbl.info\/"},{"key":"6_CR25","unstructured":"Wepawet. \n                      http:\/\/wepawet.cs.ucsb.edu"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:23:40Z","timestamp":1559280220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}