{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:10:03Z","timestamp":1746357003663,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44885-4_1","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T09:10:25Z","timestamp":1409130625000},"page":"3-18","source":"Crossref","is-referenced-by-count":1,"title":["Malicious MPLS Policy Engine Reconnaissance"],"prefix":"10.1007","author":[{"given":"Abdulrahman","family":"Al-Mutairi","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"McClure, S., Scambray, J., Kurtz, G.: Hacking exposed: network security secrets and solutions. McGraw-Hill (2009)"},{"key":"1_CR2","unstructured":"Machiraju, S., Katz, R.H.: Leveraging BGP Dynamics to Reverse-Engineer Routing Policies. Technical report (May 2006)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Siganos, G., Faloutsos, M.: Analyzing BGP Policies: Methodology and Tool. In: Proceedings of the Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), pp. 1640\u20131651 (March 2004)","DOI":"10.1109\/INFCOM.2004.1354576"},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TNET.2007.892878","volume":"15","author":"G.D. Battista","year":"2007","unstructured":"Battista, G.D., Erlebach, T., Hall, A., Patrignani, M.: Computing the Types of the Relationships Between Autonomous Systems. IEEE\/ACM Transactions on Networking\u00a015(2), 267\u2013280 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"8","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1109\/TNET.2011.2106798","volume":"19","author":"L. Cittadini","year":"2011","unstructured":"Cittadini, L., Battista, G.D., Rimondini, M., Vissicchio, S.: Wheel + Ring = Reel: The Impact of Route Filtering on the Stability of Policy Routing. IEEE\/ACM Transactions on Networking\u00a019(8), 1085\u20131096 (2011)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-16806-2_9","volume-title":"Critical Infrastructure Protection IV","author":"D. Guernsey","year":"2010","unstructured":"Guernsey, D., Engel, A., Butts, J., Shenoi, S.: Security Analysis of the MPLS Label Distribution Protocol. In: Moore, T., Shenoi, S. (eds.) Critical Infrastructure Protection IV. IFIP AICT, vol.\u00a0342, pp. 127\u2013139. Springer, Heidelberg (2010)"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijcip.2009.08.002","volume":"2","author":"D. Grayson","year":"2009","unstructured":"Grayson, D., Guernsey, D., Butts, J., Spainhower, M., Shenoi, S.: Analysis of Security Threats to MPLS Virtual Private Networks. International Journal of Critical Infrastructure Protection\u00a02(4), 146\u2013153 (2009)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"1_CR8","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-10625-5_16","volume-title":"Quality of Service in Heterogeneous Networks","author":"T. Bilski","year":"2009","unstructured":"Bilski, T.: Fluctuations and Lasting Trends of QoS on Intercontinental Links. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds.) QShine 2009. LNICST, vol.\u00a022, pp. 251\u2013264. Springer, Heidelberg (2009)"},{"key":"1_CR9","unstructured":"Alkahtani, A.M., Woodward, M.E., Al-Begain, E.: An Overview of Quality of Service (QoS) and QoS Routing in Communication Networks. In: 4th PGNET 2003 Symposium, pp. 236\u2013242 (2003)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Braden, B., Clark, D., Shenker, S.: Integrated service in the internet architecture: an overview. Program on Internet and Telecoms Convergence (1994)","DOI":"10.17487\/rfc1633"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.ijcip.2008.08.005","volume":"1","author":"M. Spainhower","year":"2008","unstructured":"Spainhower, M., Butts, J., Guernsey, D., Shenoi, S.: Security Analysis of RSVP-TE Signaling in MPLS Networks. International Journal of Critical Infrastructure Protection\u00a01(1), 68\u201374 (2008)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Llorens, C., Serhrouchni, A.: Security Verification of a Virtual Private Network over MPLS. In: Network Control and Engineering for QoS, Security, and Mobility IV, pp. 339\u2013353 (November 2007)","DOI":"10.1007\/978-0-387-49690-0_27"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Wang, F., Gao, L.: On inferring and characterizing internet routing policies. In: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 15\u201326. ACM (October 2003)","DOI":"10.1145\/948206.948208"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Liang, W., Bi, J., Xia, Y., Hu, C.: RPIM: Inferring BGP Routing Policies in ISP Networks. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20136 (December 2011)","DOI":"10.1109\/GLOCOM.2011.6133970"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Ming, S., Wu, S., Zhao, X., Zhang, K.: On reverse engineering the management actions from observed BGP data. In: INFOCOM Workshops 2008, pp. 1\u20136 (April 2008)","DOI":"10.1109\/INFOCOM.2008.4544599"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MNET.2005.1541715","volume":"19","author":"M. Caesar","year":"2005","unstructured":"Caesar, M., Rexford, J.: BGP routing policies in ISP networks. IEEE Network\u00a019(6), 5\u201311 (2005)","journal-title":"IEEE Network"},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/964725.633027","volume":"32","author":"R. Mahajan","year":"2002","unstructured":"Mahajan, R., Anderson, T.: Understanding BGP misconfiguration. ACM SIGCOMM Computer Communication Review\u00a032(4), 3\u201316 (2002)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S1389-1286(02)00269-4","volume":"40","author":"D.O. Awduchea","year":"2002","unstructured":"Awduchea, D.O., Jabbarib, B.: Internet traffic engineering using multi-protocol label switching (MPLS). Computer Networks\u00a040(1), 111\u2013129 (2002)","journal-title":"Computer Networks"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol label switching architecture. IETF, RFC 3031 (January 2001)","DOI":"10.17487\/rfc3031"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Andersson, L., Doolan, P., Feldman, N., Fredette, A., Thomas, B.: LDP specification (October 2007)","DOI":"10.17487\/rfc5036"},{"key":"1_CR21","unstructured":"Isi.edu: The Network Simulator - ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/ (accessed June 17, 2014)"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/11557654_60","volume-title":"High Performance Computing and Communications","author":"F. Palmieri","year":"2005","unstructured":"Palmieri, F., Fiore, U.: Securing the MPLS control plane. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J. (eds.) HPCC 2005. LNCS, vol.\u00a03726, pp. 511\u2013523. Springer, Heidelberg (2005)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Al-Mutairi, A.A., Wolthusen, S.D.: A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. In: Information Security in Diverse Computing Environments. IGI Global (2014) (Print)","DOI":"10.4018\/978-1-4666-6158-5.ch008"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44885-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:47:56Z","timestamp":1746355676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44885-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44885-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}