{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:42:44Z","timestamp":1725882164229},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_76","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"767-775","source":"Crossref","is-referenced-by-count":5,"title":["B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths"],"prefix":"10.1007","author":[{"given":"A. U.","family":"Prem Sankar","sequence":"first","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]},{"given":"Aravind","family":"Ashok","sequence":"additional","affiliation":[]},{"given":"R. K.","family":"Manu","sequence":"additional","affiliation":[]},{"given":"P.","family":"Hrudya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"76_CR1","doi-asserted-by":"crossref","unstructured":"Faloutsos, Michalis, Petros Faloutsos, and Christos Faloutsos. \u201cOn power-law relationships of the internet topology.\u201d ACM SIGCOMM computer communication review. Vol. 29. No. 4. ACM, 1999.","DOI":"10.1145\/316188.316229"},{"key":"76_CR2","doi-asserted-by":"crossref","unstructured":"Fuller, V., and T. Li. \u201cIETF RFC 4632-Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan. Online document. Updated in August 2006. Cited on 7.8. 2010.\u201d","DOI":"10.17487\/rfc4632"},{"key":"76_CR3","doi-asserted-by":"crossref","unstructured":"Butler, Kevin RB, et al. \u201cA Survey of BGP Security Issues and Solutions. \u201dProceedings of the IEEE 98.1 (2010): 100\u2013122.","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"76_CR4","unstructured":"Bates, Tony, Philip Smith, and Geoff Huston. \u201cCIDR Report.\u201d CIDR Report. Web. 30 Apr. 2016. < http:\/\/www.cidr-report.org\/as2.0\/ >."},{"key":"76_CR5","unstructured":"Pilosov, Alex, and Tony Kapela. \u201cStealing the Internet: An Internet-scale man in the middle attack.\u201d NANOG-44, Los Angeles, October (2008): 12\u201315."},{"key":"76_CR6","doi-asserted-by":"crossref","unstructured":"Turk, D. \u201cConfiguring BGP to block Denial-of-Service attacks.\u201d (2004).","DOI":"10.17487\/rfc3882"},{"key":"76_CR7","unstructured":"Toonk, Andree. \u201cBGP Routing Incidents in 2014, Malicious or Not?\u201d BGPmon. 17 Feb. 2015. Web. 30 Apr. 2016. < http:\/\/www.bgpmon.net\/bgp-routing-incidents-in-2014-malicious-or-not\/ >."},{"key":"76_CR8","unstructured":"Cowie, Jim. \u201cThe New Threat: Targeted Internet Traffic Misdirection - Dyn Research.\u201d Dyn Research. 19 Nov. 2013. Web. 30 Apr. 2016. < http:\/\/research.dyn.com\/2013\/11\/mitm-internet-hijacking\/ >."},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, Changxi, et al. \u201cA light-weight distributed scheme for detecting IP prefix hijacks in real-time.\u201d ACM SIGCOMM Computer Communication Review. Vol. 37. No. 4. ACM, 2007.","DOI":"10.1145\/1282380.1282412"},{"key":"76_CR10","unstructured":"Jian Chang, Krishna K. Venkatasubramanian, Andrew G.West, Sampath Kannan, Insup Lee, Boon Thau Loo and Oleg Sokolsky, \u201cAS-CRED: Reputation and Alert Service for Interdomain Routing\u201d."},{"key":"76_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Jian, Jennifer Rexford, and Joan Feigenbaum. \u201cLearning-based anomaly detection in BGP updates.\u201d Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data. ACM, 2005.","DOI":"10.1145\/1080173.1080189"},{"key":"76_CR12","unstructured":"Gersch, Joseph E. ROVER: A DNS-based method to detect and prevent IP hijacks. Diss. Colorado State University, 2013."},{"key":"76_CR13","doi-asserted-by":"crossref","unstructured":"Shue, Craig A., Andrew J. Kalafut, and Minaxi Gupta. \u201cAbnormally malicious autonomous systems and their internet connectivity.\u201d IEEE\/ACM Transactions on Networking (TON) 20.1 (2012): 220\u2013230.","DOI":"10.1109\/TNET.2011.2157699"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Deshpande, Shivani, et al. \u201cAn online mechanism for BGP instability detection and analysis.\u201d Computers, IEEE Transactions on 58.11 (2009): 1470\u20131484.","DOI":"10.1109\/TC.2009.91"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T16:31:47Z","timestamp":1568910707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_76","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}