{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T02:46:53Z","timestamp":1778122013156,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642365157","type":"print"},{"value":"9783642365164","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_23","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T09:11:01Z","timestamp":1363165861000},"page":"229-238","source":"Crossref","is-referenced-by-count":21,"title":["Characterizing Large-Scale Routing Anomalies: A Case Study of the China Telecom Incident"],"prefix":"10.1007","author":[{"given":"Rahul","family":"Hiran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ager, B., Chatzis, N., Feldmann, A., Sarrar, N., Uhlig, S., Willinger, W.: Anatomy of a large European IXP. In: Proc. of ACM SIGCOMM (2012)","DOI":"10.1145\/2342356.2342393"},{"key":"23_CR2","unstructured":"ATLAS - Arbor Networks (2012), \n                    \n                      http:\/\/atlas.arbor.net"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the Internet. In: Proc. of ACM SIGCOMM (2007)","DOI":"10.1145\/1282380.1282411"},{"key":"23_CR4","unstructured":"BGPMon. China telecom hijack (2010), \n                    \n                      http:\/\/bgpmon.net\/blog\/?p=282"},{"key":"23_CR5","unstructured":"Blumenthal, D., Brookes, P., Cleveland, R., Fiedler, J., Mulloy, P., Reinsch, W., Shea, D., Videnieks, P., Wessel, M., Wortzel, L.: Report to Congress of the US-China Economic and Security Review Commission (2010), \n                    \n                      http:\/\/www.uscc.gov\/annual_report\/2010\/annual_report_full_10.pdf"},{"key":"23_CR6","unstructured":"Brown, M.: Renesys blog: Pakistan hijacks YouTube, \n                    \n                      http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Chi, Y., Oliveira, R., Zhang, L.: Cyclops: The Internet AS-level observatory. ACM SIGCOMM Computer Communication Review (2008)","DOI":"10.1145\/1452335.1452337"},{"key":"23_CR8","unstructured":"Cowie, J.: Renesys blog: China\u2019s 18-minute mystery, \n                    \n                      http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Gao, L., Rexford, J.: Stable Internet routing without global coordination. Transactions on Networking (2001)","DOI":"10.1145\/339331.339426"},{"key":"23_CR10","series-title":"SIGCOMM Computer Communication Review","volume-title":"Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data","author":"P. Gill","year":"2012","unstructured":"Gill, P., Schapira, M., Goldberg, S.: Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM Computer Communication Review (2012)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Gregori, E., Improta, A., Lenzini, L., Rossi, L., Sani, L.: On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement. In: ACM Internet Measurement Conference (2012)","DOI":"10.1145\/2398776.2398803"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Hiran, R., Carlsson, N., Gill, P.: Characterizing large-scale routing anomalies: A case study of the China Telecom incident (2012), \n                    \n                      http:\/\/www.ida.liu.se\/~nikca\/papers\/pam13.html","DOI":"10.1007\/978-3-642-36516-4_23"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Khare, V., Ju, Q., Zhang, B.: Concurrent prefix hijacks: Occurrence and impacts. In: ACM Internet Measurement Conference (2012)","DOI":"10.1145\/2398776.2398780"},{"key":"23_CR14","unstructured":"Labovitz, C.: China hijacks 15% of Internet traffic (2010), \n                    \n                      http:\/\/ddos.arbornetworks.com\/2010\/11\/china-hijacks-15-of-internet-traffic\/"},{"key":"23_CR15","unstructured":"Madhyastha, H., Isdal, T., Piatek, M., Dixon, C., Anderson, T., Krishnamurthy, A., Venkataramani, A.: iPlane: An information plane for distributed services. In: Proc. of OSDI (2006)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Mao, Z., Rexford, J., Wang, J., Katz, R.H.: Towards an accurate AS-level traceroute tool. In: Proc. of ACM SIGCOMM (2003)","DOI":"10.1145\/863993.863996"},{"key":"23_CR17","unstructured":"McMillan, R.: A Chinese ISP momentarily hijacks the Internet (2010), \n                    \n                      http:\/\/www.nytimes.com\/external\/idg\/2010\/04\/08\/08idg-a-chinese-isp-momentarily-hijacks-the-internet-33717.html"},{"key":"23_CR18","unstructured":"Misel, S.: Wow, AS7007! Merit NANOG Archive (1997), \n                    \n                      http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340.html"},{"key":"23_CR19","unstructured":"U.\u00a0of\u00a0Oregon. Route views project, \n                    \n                      http:\/\/www.routeviews.org\/"},{"key":"23_CR20","unstructured":"Oliveira, R., Pei, D., Willinger, W., Zhang, B., Zhang, L.: Quantifying the completeness of the observed internet AS-level structure. UCLA Computer Science Department - Techical Report TR-080026-2008 (September 2008)"},{"key":"23_CR21","unstructured":"Pilosov, A., Kapela, T.: Stealing the Internet: An Internet-scale man in the middle attack. Presentation at DefCon 16 (2008), \n                    \n                      http:\/\/www.defcon.org\/images\/defcon-16\/dc16-presentations\/defcon-16-pilosov-kapela.pdf"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T15:28:44Z","timestamp":1557588524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}