{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:08:12Z","timestamp":1750136892770},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_8","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"88-103","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Are BGP Routers Open to Attack? An Experiment"],"prefix":"10.1007","author":[{"given":"Ludovico","family":"Cavedon","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Biondi, P.: Scapy (2009), http:\/\/www.secdev.org\/projects\/scapy\/"},{"key":"8_CR2","unstructured":"Bono, V.J.: 7007 Explanation and Apology (April 1997), http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html"},{"key":"8_CR3","unstructured":"Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. AT&T Labs Research (2008)"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/1151659.1159946","volume":"36","author":"H. Chan","year":"2006","unstructured":"Chan, H., Dash, D., Perrig, A., Zhang, H.: Modeling adoptability of secure BGP protocol. ACM SIGCOMM Computer Communication Review\u00a036(4), 290 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"8_CR5","unstructured":"Colitti, L.: Active BGP Probing (2009), http:\/\/www.dia.uniroma3.it\/~compunet\/bgp-probing\/"},{"key":"8_CR6","unstructured":"Convery, S., Franz, M.: BGP Vulnerability Testing: Separating Fact from FUD. In: Black Hat US 2003 \/ NANOG28 Meeting (2003)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Gill, V., Heasley, J., Meyer, D.: The Generalized TTL Security Mechanism (GTSM). RFC 3682 (Experimental) (February 2004), http:\/\/www.ietf.org\/rfc\/rfc3682.txt; obsoleted by RFC 5082","DOI":"10.17487\/rfc3682"},{"key":"8_CR8","unstructured":"Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P., Rubin, A.: Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In: Proc. NDSS, vol.\u00a03 (2003)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Heffernan, A.: Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385 (Proposed Standard) (August 1998), http:\/\/www.ietf.org\/rfc\/rfc2385.txt","DOI":"10.17487\/rfc2385"},{"key":"8_CR10","unstructured":"James, N.: Extensions to BGP to support secure origin BGP (sobgp). Network Working Group, Cisco Systems (2002)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Seo, K.: Design and analysis of the secure border gateway protocol (S-BGP). In: Proc. of DISCEX 2000 (2000)","DOI":"10.1109\/49.839934"},{"key":"8_CR12","unstructured":"Lyon, G.: Nmap \u2013 Free Security Scanner For Network Exploration & Security Audits (2009), http:\/\/www.nmap.org"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/633025.633027","volume-title":"Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"R. Mahajan","year":"2002","unstructured":"Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 3\u201316. ACM, New York (2002)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"McArthur, C., Guirguis, M.: Stealthy IP Prefix Hijacking: Dont Bite Off More Than You Can Chew. In: Proc. ACM SIGCOMM (2008)","DOI":"10.1109\/GLOCOM.2009.5425977"},{"issue":"2","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/997150.997152","volume":"34","author":"O. Nordstr\u00f6m","year":"2004","unstructured":"Nordstr\u00f6m, O., Dovrolis, C.: Beware of BGP attacks. ACM SIGCOMM Computer Communication Review\u00a034(2), 1\u20138 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"8_CR16","unstructured":"Oppermann, A., Jeker, C.: BGPDNS, Using BGP topology information for DNS RR sorting a scalable way of multi-homing. RIPE 41 Meeting (2002)"},{"key":"8_CR17","unstructured":"Pilosov, A., Kapela, T.: Stealing The Internet. DefCon 16 (2009)"},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/1151659.1159947","volume":"36","author":"A. Ramachandran","year":"2006","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. ACM SIGCOMM Computer Communication Review\u00a036(4), 302 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard) (January 2006), http:\/\/www.ietf.org\/rfc\/rfc4271.txt","DOI":"10.17487\/rfc4271"},{"key":"8_CR20","unstructured":"RIPE NCC: YouTube Hijacking: A RIPE NCC RIS case study (2008), http:\/\/www.ripe.net\/news\/study-youtube-hijacking.html"},{"issue":"10","key":"8_CR21","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/JSAC.2006.877218","volume":"24","author":"K. Sriram","year":"2006","unstructured":"Sriram, K., Montgomery, D., Borchert, O., Kim, O., Kuhn, D., et al.: Study of BGP Peering Session Attacks and Their Impacts on Routing Performance. IEEE Journal on Selected Areas in Communications\u00a024(10), 1901 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Villamizar, C., Chandra, R., Govindan, R.: BGP Route Flap Damping. RFC 2439 (Proposed Standard) (November 1998), http:\/\/www.ietf.org\/rfc\/rfc2439.txt","DOI":"10.17487\/rfc2439"},{"key":"8_CR23","unstructured":"Watson, P.: Slipping in the Window: TCP Reset attacks (2004)"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T19:56:44Z","timestamp":1637265404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}