{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T20:36:10Z","timestamp":1723062970885},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icnp.2010.5762762","type":"proceedings-article","created":{"date-parts":[[2011,5,9]],"date-time":"2011-05-09T16:43:00Z","timestamp":1304959380000},"source":"Crossref","is-referenced-by-count":9,"title":["TowerDefense: Deployment strategies for battling against IP prefix hijacking"],"prefix":"10.1109","author":[{"given":"Tongqing","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Lusheng","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"PlanetLab","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"ref30","article-title":"TowerDefense: Deployment Strategies for Battling against IP Prefix Hijacking. (Available from TPC chair)","year":"2010","journal-title":"Tech Rep"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298336"},{"key":"ref10","article-title":"Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes","author":"karlin","year":"2006","journal-title":"Proc IEEE ICNP"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2006.320341"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364658"},{"key":"ref13","article-title":"Topology-based Detection of Anomalous BGP Messages","author":"kruegel","year":"2003","journal-title":"Proc RAID"},{"key":"ref14","article-title":"RIPE myASn System","year":"0"},{"key":"ref15","article-title":"PHAS: A Prefix Hijack Alert System","author":"lad","year":"2006","journal-title":"Proc Usenix Security Symposium"},{"key":"ref16","article-title":"Accurate Real-time Identification of IP Prefix Hijacking","author":"hu","year":"2007","journal-title":"Proc IEEE Security and Privacy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.151"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"ref19","article-title":"Locating Prefix Hijackers using LOCK","author":"qiu","year":"2009","journal-title":"Proc Usenix Security Symposium"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.95"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"ref27","article-title":"On Inferring Autonomous System Relationships in the Inter-net","author":"gao","year":"2001","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180442"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203481"},{"key":"ref7","article-title":"Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing","author":"goodell","year":"2003","journal-title":"Proc NDSS"},{"key":"ref2","article-title":"Listen and Whisper: Security Mechanisms for BGP","author":"subramanian","year":"2004","journal-title":"Proc USENIX NSDI"},{"key":"ref1","article-title":"Border Gateway Protocol 4","author":"rekhter","year":"2006","journal-title":"Internet Engineering Task Force"},{"key":"ref9","article-title":"Dection of Invalid Routing Announcement in the Internet","author":"zhao","year":"2002","journal-title":"Proc IEEE DSN"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"ref22","article-title":"Tower defense","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270359"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916678"},{"key":"ref23","article-title":"Redirection algorithms for load sharing in distributed web-server systems","author":"cardellini","year":"1999","journal-title":"Proc IEEE ICDCS"},{"key":"ref26","article-title":"RIPE RIS Raw Data","year":"0"},{"key":"ref25","article-title":"University of Oregon Route Views Archive Project","year":"0"}],"event":{"name":"2010 18th IEEE International Conference on Network Protocols (ICNP)","location":"Kyoto, Japan","start":{"date-parts":[[2010,10,5]]},"end":{"date-parts":[[2010,10,8]]}},"container-title":["The 18th IEEE International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5759760\/5762744\/05762762.pdf?arnumber=5762762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:14:53Z","timestamp":1490080493000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5762762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icnp.2010.5762762","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}