{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T20:40:34Z","timestamp":1655498434088},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,4,18]],"date-time":"2016-04-18T00:00:00Z","timestamp":1460937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11432-015-5490-8","type":"journal-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T08:12:49Z","timestamp":1460621569000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An accurate distributed scheme for detection of prefix interception"],"prefix":"10.1007","volume":"59","author":[{"given":"Song","family":"Li","sequence":"first","affiliation":[]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinjin","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,18]]},"reference":[{"key":"5490_CR1","volume-title":"RIPE NCC Technical Report","author":"D Karrenberg","year":"2008","unstructured":"Karrenberg D. Youtube Hijacking: a Ripe Ncc Ris Case Study. RIPE NCC Technical Report. 2008"},{"key":"5490_CR2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-36516-4_23","volume-title":"In: Proceedings of the 14th International Conference on Passive and Active Measurement, Hong Kong","author":"R Hiran","year":"2013","unstructured":"Hiran R, Carlsson N, Gill P. Characterizing large-scale routing anomalies: a case study of the China telecom incident. In: Proceedings of the 14th International Conference on Passive and Active Measurement, Hong Kong, 2013. 229\u2013238"},{"key":"5490_CR3","volume-title":"Dyn Research Technical Report","author":"J Cowie","year":"2013","unstructured":"Cowie J. The New Threat: Targeted Internet Traffic Misdirection. Dyn Research Technical Report. 2013"},{"key":"5490_CR4","volume-title":"Dyn Research Technical Report","author":"D Madory","year":"2015","unstructured":"Madory D. Uk Traffic Diverted Through Ukraine. Dyn Research Technical Report. 2015"},{"key":"5490_CR5","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/49.839934","volume":"18","author":"S Kent","year":"2000","unstructured":"Kent S, Lynn C, Seo K. Secure border gateway protocol (s-bgp). IEEE J Sel Area Commun, 2000; 18: 582\u2013592","journal-title":"IEEE J Sel Area Commun"},{"key":"5490_CR6","volume-title":"IETF Draft draft-ng-sobgp-bgp-extensions-02","author":"J NgZ","year":"2004","unstructured":"NgZ J. Extensions to BGP to support secure origin BGP (soBGP). IETF Draft draft-ng-sobgp-bgp-extensions-02. 2004"},{"key":"5490_CR7","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1266977.1266980","volume":"10","author":"P C van Oorschot","year":"2007","unstructured":"van Oorschot P C, Wan T, Kranakis E. On interdomain routing security and pretty secure bgp (psbgp). ACM Trans Inf Syst Secur, 2007, 10: 11","journal-title":"ACM Trans Inf Syst Secur"},{"key":"5490_CR8","volume-title":"IETF RFC 6480","author":"M Lepinski","year":"2012","unstructured":"Lepinski M, Kent S. An Infrastructure to Support Secure Internet Routing. IETF RFC 6480. 2012"},{"key":"5490_CR9","doi-asserted-by":"crossref","first-page":"2250","DOI":"10.1016\/j.comnet.2012.11.019","volume":"57","author":"Y Xiang","year":"2013","unstructured":"Xiang Y, Shi X, Wu J, et al. Sign what you really care about-secure bgp as-paths efficiently. Comput Netw, 2013; 57: 2250\u20132265","journal-title":"Comput Netw"},{"key":"5490_CR10","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/2534169.2486010","volume":"43","author":"R Lychev","year":"2013","unstructured":"Lychev R, Goldberg S, Schapira M. BGP security in partial deployment: is the juice worth the squeeze? ACM SIGCOMM Comput Commun Rev, 2013; 43: 171\u2013182","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR11","volume-title":"IETF Draft draft-ietfgrow- simple-leak-attack-bgpsec-no-help-04","author":"D McPherson","year":"2014","unstructured":"McPherson D, Osterweil E, Amante S, et al. Route-Leaks & MITM attacks against BGPSEC. IETF Draft draft-ietfgrow- simple-leak-attack-bgpsec-no-help-04. 2014"},{"key":"5490_CR12","volume-title":"In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies, San Diego","author":"Q Li","year":"2014","unstructured":"Li Q, Hu Y C, Zhang X. Even rockets cannot make pigs fly sustainably: can BGP be secured with BGPsec? In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies, San Diego, 2014"},{"key":"5490_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2007.7","volume-title":"In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland","author":"X Hu","year":"2007","unstructured":"Hu X, Mao Z M. Accurate real-time identification of IP prefix hijacking. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, 2007. 3\u201317"},{"key":"5490_CR14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/DSN.2002.1028887","volume-title":"In: Proceedings of the International Conference on Dependable Systems and Networks, Bethesda","author":"X Zhao","year":"2002","unstructured":"Zhao X, Pei D, Wang L, et al. Detection of invalid routing announcement in the Internet. In: Proceedings of the International Conference on Dependable Systems and Networks, Bethesda, 2002. 59\u201368"},{"key":"5490_CR15","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1145\/1402946.1402996","volume":"38","author":"Z Zhang","year":"2008","unstructured":"Zhang Z, Zhang Y, Hu Y C, et al. Ispy: detecting ip prefix hijacking on my own. ACM SIGCOMM Comput Commun Rev, 2008; 38: 327\u2013338","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR16","first-page":"43","volume-title":"In: Proceedings of the 19th IEEE International Conference on Network Protocols, Vancouver","author":"Y Xiang","year":"2011","unstructured":"Xiang Y, Wang Z, Yin X, et al. Argus: an accurate and agile system to detecting IP prefix hijacking. In: Proceedings of the 19th IEEE International Conference on Network Protocols, Vancouver, 2011. 43\u201348"},{"key":"5490_CR17","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/1282427.1282411","volume":"37","author":"H Ballani","year":"2007","unstructured":"Ballani H, Francis P, Zhang X. A study of prefix hijacking and interception in the Internet. ACM SIGCOMM Comput Commun Rev, 2007; 37: 265\u2013276","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR18","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/90.974527","volume":"9","author":"L Gao","year":"2001","unstructured":"Gao L. On inferring autonomous system relationships in the Internet. IEEE\/ACM Trans Netw (ToN), 2001; 9: 733\u2013745","journal-title":"IEEE\/ACM Trans Netw (ToN)"},{"key":"5490_CR19","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/2567561.2567566","volume":"44","author":"P Gill","year":"2013","unstructured":"Gill P, Schapira M, Goldberg S. A survey of interdomain routing policies. ACM SIGCOMM Comput Commun Rev, 2013; 44: 28\u201334","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR20","first-page":"667","volume-title":"In: Proceedings of the IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), Macau","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Pourzandi M. Studying impacts of prefix interception attack by exploring bgp as-path prepending. In: Proceedings of the IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, 2012. 667\u2013677"},{"key":"5490_CR21","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/505202.505207","volume-title":"In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, San Francisco","author":"X Zhao","year":"2001","unstructured":"Zhao X, Pei D, Wang L, et al. An analysis of BGP multiple origin AS (MOAS) conflicts. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, San Francisco, 2001. 31\u201335"},{"key":"5490_CR22","volume-title":"Defcon Technical Report","author":"A Pilosov","year":"2008","unstructured":"Pilosov A, Kapela T. Stealing the Internet: an Internet-Scale Man in the Middle Attack. Defcon Technical Report. 2008"},{"key":"5490_CR23","first-page":"367","volume-title":"In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle","author":"H V Madhyastha","year":"2006","unstructured":"Madhyastha H V, Isdal T, Piatek M, et al. iPlane: an information plane for distributed services. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, 2006. 367\u2013380"},{"key":"5490_CR24","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316194.316229","volume":"29","author":"M Faloutsos","year":"1999","unstructured":"Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the internet topology. ACM SIGCOMM Comput Commun Rev, 1999; 29: 251\u2013262","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR25","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/TNET.2003.815300","volume":"11","author":"G Siganos","year":"2003","unstructured":"Siganos G, Faloutsos M, Faloutsos P, et al. Power laws and the AS-level internet topology. IEEE\/ACM Trans Netw (TON), 2003; 11: 514\u2013524","journal-title":"IEEE\/ACM Trans Netw (TON)"},{"key":"5490_CR26","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1145\/2504730.2504735","volume-title":"In: Proceedings of the 2013 Conference on Internet Measurement, Barcelona","author":"M Luckie","year":"2013","unstructured":"Luckie M, Huffaker B, Dhamdhere A, et al. AS relationships, customer cones, and validation. In: Proceedings of the 2013 Conference on Internet Measurement, Barcelona, 2013. 243\u2013256"},{"key":"5490_CR27","first-page":"1373","volume-title":"In: Proceedings of the Global Telecommunications Conference, Dallas","author":"J Xia","year":"2004","unstructured":"Xia J, Gao L. On the evaluation of AS relationship inferences [Internet reachability\/traffic flow applications]. In: Proceedings of the Global Telecommunications Conference, Dallas, 2004. 1373\u20131377"},{"key":"5490_CR28","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/1177080.1177100","volume-title":"In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeriro","author":"B Augustin","year":"2006","unstructured":"Augustin B, Cuvellier X, Orgogozo B, et al. Avoiding traceroute anomalies with paris traceroute. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeriro, 2006. 153\u2013158"},{"key":"5490_CR29","first-page":"12","volume":"19","author":"B Quoitin","year":"2005","unstructured":"Quoitin B. Uhlig S. Modeling the routing of an autonomous system with C-BGP. IEEE Netw, 2005; 19: 12\u201319","journal-title":"Modeling the routing of an autonomous system with C-BGP. IEEE Netw"},{"key":"5490_CR30","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/2377677.2377702","volume":"42","author":"M W\u00e4hlisch","year":"2012","unstructured":"W\u00e4hlisch M, Maennel O, Schmidt T C. Towards detecting BGP route hijacking using the RPKI. ACM SIGCOMM Comput Commun Rev, 2012; 42: 103\u2013104","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR31","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/1282427.1282412","volume":"37","author":"C Zheng","year":"2007","unstructured":"Zheng C, Ji L, Pei D, et al. A light-weight distributed scheme for detecting IP prefix hijacks in real-time. ACM SIGCOMM Comput Commun Rev, 2007; 37: 277\u2013288","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"5490_CR32","first-page":"153","volume-title":"In: Proceedings of the 15th Conference on USENIX Security Symposium, Berkeley","author":"M Lad","year":"2006","unstructured":"Lad M, Massey D, Pei D, et al. Phas: a prefix hijack alert system. In: Proceedings of the 15th Conference on USENIX Security Symposium, Berkeley, 2006. 153\u2013166"},{"key":"5490_CR33","first-page":"290","volume-title":"In: Proceedings of the 14th IEEE International Conference on Network Protocols, Santa Barbara","author":"J Karlin","year":"2006","unstructured":"Karlin J, Forrest S, Rexford J. Pretty good BGP: improving BGP by cautiously adopting routes. In: Proceedings of the 14th IEEE International Conference on Network Protocols, Santa Barbara, 2006. 290\u2013299"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5490-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5490-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5490-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T20:00:43Z","timestamp":1655496043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5490-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,18]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["5490"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5490-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,18]]},"article-number":"052105"}}