{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:01:14Z","timestamp":1725537674237},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044915"},{"type":"electronic","value":"9783642044922"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04492-2_40","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T00:01:51Z","timestamp":1252972911000},"page":"395-404","source":"Crossref","is-referenced-by-count":4,"title":["IP Prefix Hijacking Detection Using Idle Scan"],"prefix":"10.1007","author":[{"given":"Seong-Cheol","family":"Hong","sequence":"first","affiliation":[]},{"given":"Hong-Taek","family":"Ju","sequence":"additional","affiliation":[]},{"given":"James W.","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"North America Network Operator\u2019s Group, NANOG: NANOG Mailing Lists, \n                    \n                      http:\/\/www.nanog.org\/mailinglist\/"},{"key":"#cr-split#-40_CR2.1","unstructured":"Lynn, C., Mikkelson, J., Seo, K.: Secure BGP (S-BGP) (June 2003);"},{"key":"#cr-split#-40_CR2.2","unstructured":"IETF Draft: draft-clynn-s-bgp-protocol-01.txt"},{"key":"#cr-split#-40_CR3.1","unstructured":"Weis, B.: Secure Origin BGP (soBGP) Certificates (July 2004);"},{"key":"#cr-split#-40_CR3.2","unstructured":"IETF Draft: draft-weis-sobgp-certificates-02.txt"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-45248-5_2","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kruegel","year":"2003","unstructured":"Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Topology-based Detection of Anomalous BGP Messages. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 17\u201335. Springer, Heidelberg (2003)"},{"key":"40_CR5","unstructured":"Lad, M., Massey, D., Pei, D.: PHAS: A Prefix Hijacking Alert System. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C., Canada, August 2006, pp. 153\u2013166 (2006)"},{"key":"#cr-split#-40_CR6.1","unstructured":"Barbir, A., Murphy, S., Yang, Y.: Generic Threats to Routing Protocols (October 2004);"},{"key":"#cr-split#-40_CR6.2","unstructured":"IETF Draft: draft-ietf-rpsec-routing-threats-07"},{"key":"#cr-split#-40_CR7.1","unstructured":"Christian, B., Tauber, T.: BGP Security Requirements (March 2006);"},{"key":"#cr-split#-40_CR7.2","unstructured":"IETF Draft: draft-ietf-rpsec-bgpsecrec-04"},{"key":"40_CR8","unstructured":"BGP Routing Table Analysis Reports, BGP Reports, \n                    \n                      http:\/\/bgp.potaroo.net\/"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, X., Pei, D., Wang, L., Massey, D., Mankin, A., Wu, S.F., Zhang, L.: An Analysis of BGP Multiple Origin AS (MOAS) Conflicts. In: Proceedings of the 1st ACM SIGCOMM workshop on Internet Measurement, San Francisco, USA, November 2001, pp. 31\u201335 (2001)","DOI":"10.1145\/505202.505207"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Karlin, J., Forrest, S., Rexford, J.: Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. In: Proceedings of the 14th IEEE International Conference on Network Protocols, Santa Barbara, California, USA, November 2006, pp. 290\u2013299 (2006)","DOI":"10.1109\/ICNP.2006.320179"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P., Zhang, X.: A Study of Prefix Hijacking and Interception in the Internet. ACM SIGCOMM Computer Communication Review\u00a037(4) (October 2007)","DOI":"10.1145\/1282427.1282411"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Hu, X., Mao, Z.M.: Accurate Real-time Identification of IP Prefix Hijacking. In: Proceedings of the IEEE Security and Privacy, Oakland, California, USA, May 2007, pp. 3\u201317 (2007)","DOI":"10.1109\/SP.2007.7"},{"key":"40_CR13","unstructured":"Insecure.Org., TCP Idle Scan (-sI), \n                    \n                      http:\/\/nmap.org\/book\/idlescan.html"},{"key":"40_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-88623-5_40","volume-title":"Challenges for Next Generation Network Operations and Service Management","author":"M. Tahara","year":"2008","unstructured":"Tahara, M., Tateishi, N., Oimatsu, T., Majima, S.: A Method to Detect Prefix Hijacking by Using Ping Tests. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.\u00a05297, pp. 390\u2013398. Springer, Heidelberg (2008)"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Mao, Z.M., Rexford, J., Wang, J., Katz, R.H.: Towards an Accurate AS-level Traceroute Tool. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, August 2003, pp. 365\u2013378 (2003)","DOI":"10.1145\/863955.863996"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Zheng, C., Ji, L., Pei, D., Wang, J., Francis, P.: A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-time. ACM SIGCOMM Computer Communication Review\u00a037(4) (October 2007)","DOI":"10.1145\/1282427.1282412"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: Detecting IP Prefix Hijacking on My Own. In: Proceedings of the ACM SIGCOMM 2008 conference on Data Communication, Seattle, USA, pp. 327\u2013338 (2008)","DOI":"10.1145\/1402958.1402996"}],"container-title":["Lecture Notes in Computer Science","Management Enabling the Future Internet for Changing Business and New Computing Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04492-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T14:56:33Z","timestamp":1552143393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04492-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044915","9783642044922"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04492-2_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}