{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:47:17Z","timestamp":1764305237830},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/apnoms.2011.6077014","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:14:09Z","timestamp":1321546449000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["IP prefix hijacking detection using the collection of as characteristics"],"prefix":"10.1109","author":[{"given":"Seong-Cheol","family":"Hong","sequence":"first","affiliation":[]},{"given":"James Won-Ki","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hongtaek","family":"Ju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"ref11","article-title":"Generic Threats to Routing Protocols","author":"barbir","year":"2006","journal-title":"IETF Draft draft-ietf-rpsec-routing-threats-07"},{"key":"ref12","article-title":"BGP Security Requirements","author":"christian","year":"2006","journal-title":"IETF Draft draft-ietf-rpsec-bgpsecrec-04"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"key":"ref14","first-page":"3","article-title":"Accurate Real-time Identification of IP Prefix Hijacking","author":"hu","year":"2007","journal-title":"Proceedings of Security and Privacy"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"journal-title":"Oregon Route Views Project","article-title":"Route Views Project Page","year":"0","key":"ref16"},{"key":"ref17","article-title":"StrobeLight: Lightweight Availability Mapping and Anomaly Detection","author":"mickens","year":"2009","journal-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference USENIX"},{"key":"ref18","first-page":"75","article-title":"Working around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing","author":"goodell","year":"2003","journal-title":"Proc ISOC NDSS"},{"key":"ref19","article-title":"Representation of IP Routing Policies in a Routing Registry","author":"bates","year":"1995","journal-title":"RFC 1786"},{"key":"ref4","article-title":"Secure Origin BGP (soBGP) Certificates","author":"weis","year":"2004","journal-title":"IETF Draft draft-weis-sobgp-certificates-02 txt"},{"key":"ref3","article-title":"Secure BGP (S-BGP)","author":"lynn","year":"2003","journal-title":"IETF Draft draft-clynn-s-bgp-protocol-01 txt"},{"key":"ref6","first-page":"153","article-title":"PHAS: A Prefix Hijacking Alert System","author":"lad","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-540-45248-5_2","article-title":"Topology-based Detection of Anomalous BGP Messages","author":"kruegel","year":"2003","journal-title":"Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_40"},{"journal-title":"NANOG NANOG Mailing Lists","year":"0","key":"ref2"},{"journal-title":"BGP Routing Table Analysis Reports","article-title":"BGP Reports","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282412"},{"journal-title":"CIDR Report for 1 Feb 11","year":"2011","author":"bates","key":"ref20"},{"key":"ref21","article-title":"Listen and Whisper: Security Mechanisms for BGP","author":"lakshminarayanan","year":"2004","journal-title":"Proc Symp Networked Systems Design and Implementation (NSDI '04)"}],"event":{"name":"2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2011,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 13th Asia-Pacific Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6069626\/6076947\/06077014.pdf?arnumber=6077014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T05:55:23Z","timestamp":1497938123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6077014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2011.6077014","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}