{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:46:43Z","timestamp":1764305203072},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408789"},{"type":"electronic","value":"9783540452485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45248-5_2","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:40:20Z","timestamp":1277700020000},"page":"17-35","source":"Crossref","is-referenced-by-count":44,"title":["Topology-Based Detection of Anomalous BGP Messages"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Kruegel","sequence":"first","affiliation":[]},{"given":"Darren","family":"Mutz","sequence":"additional","affiliation":[]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"Fredrik","family":"Valeur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Asia Pacific Network Information Centre, http:\/\/www.apnic.net"},{"key":"2_CR2","unstructured":"American Registry for Internet Numbers, http:\/\/www.arin.net"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chandra, R., Traina, P., Li, T.: BGP Communities Attribute. IETF-RFC 1997 (August 1996)","DOI":"10.17487\/rfc1997"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: 13th Annual Computer Security Applications Conference (December 1997)","DOI":"10.1109\/CSAC.1997.646178"},{"key":"2_CR5","unstructured":"Convey, S., Cook, D., Franz, M.: An Attack Tree for the Border Gateway Protocol. In: IETF Internet Draft (October 2002)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On Power-Law Relationships of the Internet Topology. In: Proceedings of ACM SIGCOMM 1999 (1999)","DOI":"10.1145\/316188.316229"},{"key":"2_CR7","unstructured":"Farrar, J.: Cable and Wireless Routing Instability, http:\/\/www.merit.edu\/mail.archives\/nanog\/2001-04\/msg00209.html"},{"key":"2_CR8","unstructured":"Gao, L.: On Inferring Autonomous System Relationships in the Internet. In: Proceedings of IEEE Global Internet (November 2000)"},{"key":"2_CR9","unstructured":"Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., Mc-Daniel, P., Rubin, A.: Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In: Network and Distributed Systems Security (2003)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Govindan, R., Reddy, A.: An Analysis of Internet Inter-Domain Topology and Route Stability. In: IEEE InfoCom(1997)","DOI":"10.1109\/INFCOM.1997.644557"},{"key":"2_CR11","unstructured":"Huffaker, B., Broido, A., claffy, k., Fomenkov, M., Keys, K., Lagache, E., Moore, D.: Skitter AS Internet Graph. In: CAIDA (October 2000)"},{"key":"2_CR12","unstructured":"Jou, Y.F., Gong, F., Sargor, C., Wu, X., Wu, F., Chang, H.C., Wang, F.: Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure. In: DARPA Information Survivability Conference and Exposition (January 2000)"},{"key":"2_CR13","unstructured":"Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure Border Gateway Protocol (Secure-BGP) - Real World Performance and Deployment Issues. In: Proceedings of the Symposium on Network and Distributed System Security (February 2000)"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/49.839934","volume":"18","author":"S. Kent","year":"2000","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (Secure-BGP). IEEE Journal on Selected Areas in Communications\u00a018(4), 582\u2013592 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2_CR15","unstructured":"Labovitz, C., Ahuja, A., Jahanian, F.: Experimental Study of Internet Stability and Wide-Area Network Failures. In: Fault-Tolerant Computing Symposium (June 1999)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Labovitz, C., Malan, G.R., Jahanian, F.: Origins of Internet Routing Instability. In: IEEE INFOCOM (March 1998)","DOI":"10.1109\/90.731185"},{"key":"2_CR17","unstructured":"The Latin American and Caribbean Internet Addresses Registry, http:\/\/www.lacnic.net"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP Misconfiguration. In: Proceedings of ACM SIGCOMM (August 2002)","DOI":"10.1145\/633025.633027"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Malkin, G.: RIP Version 2. IETF-RFC 2453 (November 1998)","DOI":"10.17487\/rfc2453"},{"key":"2_CR20","unstructured":"McCreary, S., Woodcook, B.: PCH RouteViews archive, http:\/\/www.pch.net\/resources\/data\/routing-tables"},{"key":"2_CR21","volume-title":"Proceedings of the ACM Conference on Computer and Communication Security (CCS 2002)","author":"V. Mittal","year":"2002","unstructured":"Mittal, V., Vigna, G.: Sensor-Based Intrusion Detection for Intra-Domain Distance-Vector Routing. In: Proceedings of the ACM Conference on Computer and Communication Security (CCS 2002), Washington, DC, November 2002, ACM Press, New York (2002)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Moy, J.: OSPF Version 2. IETF-RFC 2328 (April 1998)","DOI":"10.17487\/rfc2328"},{"key":"2_CR23","unstructured":"Murphy, S.: Border Gateway Protocol Security Analysis. In: IETF Internet Draft (November 2001)"},{"key":"2_CR24","unstructured":"Murphy, S.L., Badger, M.R.: Digital Signature Protection of the OSPF Routing Protocol. In: Proceedings of the Symposium on Network and Distributed System Security (February 1996)"},{"key":"2_CR25","unstructured":"The North American Network Operators\u2019 Group, http:\/\/www.nanog.org"},{"key":"2_CR26","unstructured":"Qu, D., Vetter, B.M., Wang, F., Narayan, R., Wu, F., Jou, F., Gong, F., Sargor, C.: Statistical Anomaly Detection for Link-State Routing Protocols. In: Proceedings of the 1998 International Conference on Network Protocols (October 1998)"},{"key":"2_CR27","unstructured":"Przygienda, A., Hauser, R., Tsudik, G.: Reducing the cost of security in link state routing. In: ISOC Symposium on Network and Distributed System Security (February 1997)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4). IETF-RFC 1654 (March 1995)","DOI":"10.17487\/rfc1771"},{"key":"2_CR29","unstructured":"Routing Arbiter Project, http:\/\/www.ra.net"},{"key":"2_CR30","unstructured":"Smith, B.R., Murthy, S., Garcia-Luna-Aceves, J.J.: Securing Distance-Vector Routing Protocols. In: Proceedings of the Symposium on Network and Distributed System Security (February 1997)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Subramanian, L., Agarwal, S., Rexford, J., Katz, R.H.: Characterizing the Internet Hierarchy From Multiple Vantage Points. In: IEEE INFOCOM (2002)","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"2_CR32","unstructured":"University of Oregon - Looking Glass, http:\/\/antc.uoregon.edu\/route-views"},{"issue":"6","key":"2_CR33","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/90.650138","volume":"5","author":"E. Zegura","year":"1997","unstructured":"Zegura, E., Calvert, K., Donahoo, M.: A quantitative comparison of graph-based models for internetworks. IEEE\/ACM Transactions on Networking\u00a05(6), 770\u2013783 (1997)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Zhao, X., Pei, D., Wang, L., Massey, D., Mankin, A., Wu, S.F., Zhang, L.: An Analysis of BGP Multiple Origin AS (MOAS) Conflict. In: ACM SIGCOMM Internet Measurement Workshop, San Francisco, USA (November 2001)","DOI":"10.1145\/505203.505207"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, X., Pei, D., Wang, L., Zhang, L., Massey, D., Mankin, A., Wu, S.F.: Detection of Invalid Route Announcement in the Internet. In: International Conference on Dependable Systems and Networks (2002)","DOI":"10.1109\/DSN.2002.1028887"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45248-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T13:40:20Z","timestamp":1559223620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45248-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408789","9783540452485"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45248-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}