{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:01:06Z","timestamp":1725717666610},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_54","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T16:14:54Z","timestamp":1362413694000},"page":"485-489","source":"Crossref","is-referenced-by-count":0,"title":["Emulation on the Internet Prefix Hijacking Attack Impaction"],"prefix":"10.1007","author":[{"given":"Jinjing","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Lad, M., Oliveira, R., Zhang, B., Zhang, L.: Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 368\u2013377 (2007)","DOI":"10.1109\/DSN.2007.95"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Nordstrom, O., Dovrolis, C.: Beware of BGP attacks. SIGCOMM Comput. Commun. Rev.\u00a034(2) (2004)","DOI":"10.1145\/997150.997152"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Butler, K., McDaniel, P., Rexford, J.: A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE\u00a098(1) (January 2010)","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"54_CR4","unstructured":"Subramanian, L., Roth, V., Stoica, I., Shenker, S., Katz, R.H.: Listen and whisper: Security mechanisms for BGP. In: Proceedings of ACM NDSI 2004 (March 2004)"},{"key":"54_CR5","unstructured":"Ng, J.: Extensions to BGP to Support Secure Origin BGP (April 2004), ftp:\/\/ftp-eng.cisco.com\/sobgp\/drafts\/draft-ng-sobgpbgp-extensions-02.txt"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure border gateway protocol (S-BGP). IEEE JSAC Special Issue on Network Security (2000)","DOI":"10.1109\/49.839934"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, S.S.M., Nicol, D.: Aggregated path authentication for efficient bgp security. In: 12th ACM Conference on Computer and Communications Security (CCS) (November 2005)","DOI":"10.1145\/1102120.1102139"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Smith, B.R., Murphy, S., Garcia-Luna-Aceves, J.J.: Securing the border gateway routing protocol. In: Global Internet 1996 (November 1996)","DOI":"10.1109\/GLOCOM.1996.586129"},{"key":"54_CR9","unstructured":"RIPE. Routing information service: myASn System, http:\/\/www.ris.ripe.net\/myasn.html"},{"key":"54_CR10","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: A prefix hijack alert system. In: 15th USENIX Security Symposium (2006)"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Qiu, S., Monrose, F., Terzis, A., McDaniel, P.: Efficient techniques for detecting false origin advertisements in interdomain routing. In: Second workshop on Secure Network Protocols (NPSec) (2006)","DOI":"10.1109\/NPSEC.2006.320341"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Karlin, J., Forrest, S., Rexford, J.: Pretty good bgp: Protecting bgp by cautiously selecting routes. Technical Report TR-CS-2005-37, University of New Mexico (October 2005)","DOI":"10.1109\/ICNP.2006.320179"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Rexford, J.: MIRO: multi-path interdomain routing. In: SIGCOMM 2006, pp. 171\u2013182 (2006)","DOI":"10.1145\/1159913.1159934"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Hu, X., Mao, Z.M.: Accurate Real-time Identification of IP Prefix Hijacking. In: Proc. of IEEE Security and Privacy, Oakland (2007)","DOI":"10.1109\/SP.2007.7"},{"key":"54_CR15","doi-asserted-by":"crossref","unstructured":"Zheng, C., Ji, L., Pei, D., Wang, J., Francis, P.: A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Realtime. In: Proc. of ACM SIGCOMM (August 2007)","DOI":"10.1145\/1282380.1282412"},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"Govindan, R., Reddy, A.: An Analysis of Internet Inter-Domain Topology and Route Stability. In: Proc. IEEE INFOCOM 1997 (March 1997)","DOI":"10.1109\/INFCOM.1997.644557"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Ge, Z., Figueiredo, D., Jaiwal, S., et al.: On the hierarchical structure of the logical Internet graph. In: Proceedings of SPIE ITCOM, USA (August 2001)","DOI":"10.1117\/12.434397"},{"key":"54_CR18","first-page":"358","volume":"14","author":"P. Zhu","year":"2004","unstructured":"Zhu, P., Liu, X.: An efficient Algorithm on Internet Hierarchy Induction. High Technology Communication\u00a014, 358\u2013361 (2004)","journal-title":"High Technology Communication"},{"key":"54_CR19","unstructured":"The NANOG Mailing List, http:\/\/www.merit.edu\/mail.archives\/nanog\/"},{"key":"54_CR20","unstructured":"Christian, B., Tauber, T.: BGP Security Requirements. IETF Draft: draft-ietf-rpsec-bgpsecrec-04 (March 2006)"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"Goldberg, S., Schapira, M., Hummon, P., Rexford, J.: How Secure are Secure Interdomain Routing Protocols? In: Proc. of ACM SIGCOMM, New Delhi, India, August 30\u2013September 3 (2010)","DOI":"10.1145\/1851182.1851195"},{"key":"54_CR22","unstructured":"http:\/\/www.ssfnet.org\/Exchange\/gallery\/asgraph\/src.tar.gz"},{"key":"54_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, J.J., Yan, W., Xiang, L., et al.: The Relation on Prefix Hijacking and the Internet Hierarchy. In: The 6th International Conference on Innovative Mobile and Internet Services (IMIS 2012), Italy (July 2012)","DOI":"10.1109\/IMIS.2012.40"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T11:29:11Z","timestamp":1562758151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}