{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:32:09Z","timestamp":1773117129575,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1282380.1282411","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T11:35:23Z","timestamp":1349955323000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":86,"title":["A study of prefix hijacking and interception in the internet"],"prefix":"10.1145","author":[{"given":"Hitesh","family":"Ballani","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY"}]},{"given":"Paul","family":"Francis","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]},{"given":"Xinyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"Nanog Mailing List \" http:\/\/www.nanog.org\/mailinglist.html.  \"Nanog Mailing List \" http:\/\/www.nanog.org\/mailinglist.html."},{"key":"e_1_3_2_1_2_1","unstructured":"\"7007 Explanation and Apology \"Apr 1997 http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html.  \"7007 Explanation and Apology \"Apr 1997 http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html."},{"key":"e_1_3_2_1_3_1","volume-title":"PHAS: A prefix hijack alert system,\" in Proc. of USENIX Security symposium","author":"Lad M.","year":"2006","unstructured":"M. Lad , D. Massey , D. Pei , Y. Wu , B. Zhang , and L. Zhang , \" PHAS: A prefix hijack alert system,\" in Proc. of USENIX Security symposium , 2006 . M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang, \"PHAS: A prefix hijack alert system,\" in Proc. of USENIX Security symposium, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"key":"e_1_3_2_1_5_1","volume-title":"of Security in Systems and Networks","author":"Wan T.","year":"2006","unstructured":"T. Wan and P. C. van Oorschot , \" Analysis of BGP Prefix Origins During Google's May 2005 Outage ,\" in Proc. of Security in Systems and Networks , 2006 . T. Wan and P. C. van Oorschot, \"Analysis of BGP Prefix Origins During Google's May 2005 Outage,\" in Proc. of Security in Systems and Networks, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"Short-Lived Prefix Hijacking on the Internet,\" NANOG 36 meeting","author":"Boothe P.","year":"2006","unstructured":"P. Boothe , J. Hiebert , and R. Bush , \" Short-Lived Prefix Hijacking on the Internet,\" NANOG 36 meeting , 2006 , http:\/\/www.nanog.org\/mtg-0602\/pdf\/boothe.pdf. P. Boothe, J. Hiebert, and R. Bush, \"Short-Lived Prefix Hijacking on the Internet,\" NANOG 36 meeting, 2006, http:\/\/www.nanog.org\/mtg-0602\/pdf\/boothe.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_9_1","volume-title":"Listen and whisper: Security mechanisms for BGP,\" in Proc. of USENIX\/ACM NSDI","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. Katz , \" Listen and whisper: Security mechanisms for BGP,\" in Proc. of USENIX\/ACM NSDI , 2004 . L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz, \"Listen and whisper: Security mechanisms for BGP,\" in Proc. of USENIX\/ACM NSDI, 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of NDSS","author":"Wan T.","year":"2005","unstructured":"T. Wan , E. Kranakis , and P. van Oorschot , \" Pretty Secure BGP , psBGP,\" in Proc. of NDSS , 2005 . T. Wan, E. Kranakis, and P. van Oorschot, \"Pretty Secure BGP, psBGP,\" in Proc. of NDSS, 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"R. White \"Architecture and Deployment Considerations for Secure OriginBGP (soBGP) \" draft-white-sobgp-architecture-01 Nov 2005.  R. White \"Architecture and Deployment Considerations for Secure OriginBGP (soBGP) \" draft-white-sobgp-architecture-01 Nov 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"e_1_3_2_1_13_1","volume-title":"of Global Internet","author":"Smith B.","year":"1996","unstructured":"B. Smith and J. Garcia-Luna-Aceves , \" Securing the Border Gateway Routing Protocol ,\" in Proc. of Global Internet , 1996 . B. Smith and J. Garcia-Luna-Aceves, \"Securing the Border Gateway Routing Protocol,\" in Proc. of Global Internet, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing,\" in Proc. of NDSS","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin , \" Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing,\" in Proc. of NDSS , 2003 . G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin, \"Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing,\" in Proc. of NDSS, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Topology-based Detection of Anomalous BGP Messages,\" LNCS","author":"Kruegel C.","year":"2003","unstructured":"C. Kruegel , D. Mutz , W. Robertson , and F. Valeur , \" Topology-based Detection of Anomalous BGP Messages,\" LNCS , 2003 . C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, \"Topology-based Detection of Anomalous BGP Messages,\" LNCS, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Protecting BGP Routes to Top Level DNS Servers,\" in Proc. of ICDCS","author":"Wang L.","year":"2003","unstructured":"L. Wang , X. Zhao , D. Pei , R. Bush , D. Massey , A. Mankin , S. F. Wu , and L. Zhang , \" Protecting BGP Routes to Top Level DNS Servers,\" in Proc. of ICDCS , 2003 . L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, \"Protecting BGP Routes to Top Level DNS Servers,\" in Proc. of ICDCS, 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Detection of Invalid Routing Announcement in the Internet,\" in Proc. of DSN","author":"Zhao X.","year":"2002","unstructured":"X. Zhao , D. Pei , L. Wang , D. Massey , A. Mankin , S. F. Wu , and L. Zhang , \" Detection of Invalid Routing Announcement in the Internet,\" in Proc. of DSN , 2002 . X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, \"Detection of Invalid Routing Announcement in the Internet,\" in Proc. of DSN, 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029215"},{"key":"e_1_3_2_1_19_1","unstructured":"\"RIPE MyASN service \" http:\/\/www.ris.ripe.net\/myasn.html.  \"RIPE MyASN service \" http:\/\/www.ris.ripe.net\/myasn.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_24_1","volume-title":"A BGP Attack Against Traffic Engineering,\" in Proc. of WSC","author":"Kim J.","year":"2004","unstructured":"J. Kim , S. Y. Ko , D. M. Nicol , X. A. Dimitropoulos , and G. F. Riley , \" A BGP Attack Against Traffic Engineering,\" in Proc. of WSC , 2004 . J. Kim, S. Y. Ko, D. M. Nicol, X. A. Dimitropoulos, and G. F. Riley, \"A BGP Attack Against Traffic Engineering,\" in Proc. of WSC, 2004."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Route Views Project Page \" May 2006 www.route-views.org.  \"Route Views Project Page \" May 2006 www.route-views.org."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505207"},{"key":"e_1_3_2_1_27_1","volume-title":"The Impact of Internet Policy and Topology on Delayed Routing Convergence,\" in Proc. of IEEE INFOCOM","author":"Labovitz C.","year":"2001","unstructured":"C. Labovitz , A. Ahuja , R. Wattenhofer , and V. Srinivasan , \" The Impact of Internet Policy and Topology on Delayed Routing Convergence,\" in Proc. of IEEE INFOCOM , 2001 . C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, \"The Impact of Internet Policy and Topology on Delayed Routing Convergence,\" in Proc. of IEEE INFOCOM, 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"key":"e_1_3_2_1_29_1","unstructured":"\"BGP Best Path Selection Algorithm \" July 2006 http:\/\/www.cisco.com\/warp\/public\/459\/25.shtml.  \"BGP Best Path Selection Algorithm \" July 2006 http:\/\/www.cisco.com\/warp\/public\/459\/25.shtml."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_31_1","unstructured":"B. Huffaker \"CAIDA AS Ranking Project \" July 2006 http:\/\/www.caida.org\/analysis\/topology\/rank_as\/.  B. Huffaker \"CAIDA AS Ranking Project \" July 2006 http:\/\/www.caida.org\/analysis\/topology\/rank_as\/."},{"key":"e_1_3_2_1_32_1","unstructured":"\"Tier 1 network - Wikipedia entry \" July 2006 http:\/\/en.wikipedia.org\/wiki\/Tier_1_network.  \"Tier 1 network - Wikipedia entry \" July 2006 http:\/\/en.wikipedia.org\/wiki\/Tier_1_network."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637232"},{"key":"e_1_3_2_1_34_1","unstructured":"\"Alexa Top Sites \" http:\/\/www.alexa.com\/site\/ds\/top_sites?ts_mode=global.  \"Alexa Top Sites \" http:\/\/www.alexa.com\/site\/ds\/top_sites?ts_mode=global."},{"key":"e_1_3_2_1_35_1","unstructured":"A. Ma \"CAIDA AS Relationships \" July 2006 http:\/\/www.caida.org\/data\/active\/as-relationships\/.  A. Ma \"CAIDA AS Relationships \" July 2006 http:\/\/www.caida.org\/data\/active\/as-relationships\/."},{"key":"e_1_3_2_1_36_1","unstructured":"\"Quagga Routing Suite \" Apr 2006 http:\/\/www.quagga.net\/.  \"Quagga Routing Suite \" Apr 2006 http:\/\/www.quagga.net\/."},{"key":"e_1_3_2_1_37_1","volume-title":"RIPE 50 meeting","author":"Huston G.","year":"2005","unstructured":"G. Huston , \" Auto-Detecting Hijacked Prefixes?\" RIPE 50 meeting , 2005 , http:\/\/www.ripe.net\/ripe\/meetings\/ripe-50\/presentations\/index.html. G. Huston, \"Auto-Detecting Hijacked Prefixes?\" RIPE 50 meeting, 2005, http:\/\/www.ripe.net\/ripe\/meetings\/ripe-50\/presentations\/index.html."},{"key":"e_1_3_2_1_38_1","volume-title":"iPlane: An Information Plane for Distributed Services,\" in Proc. of OSDI","author":"Madhyastha H.","year":"2006","unstructured":"H. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani ., \" iPlane: An Information Plane for Distributed Services,\" in Proc. of OSDI , 2006 . H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani., \"iPlane: An Information Plane for Distributed Services,\" in Proc. of OSDI, 2006."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_40_1","volume-title":"policy atoms,\" in Proc. of network-related data management (NRDM) workshop","author":"Broido A.","year":"2001","unstructured":"A. Broido and kc claffy, \" Analysis of RouteViews BGP data : policy atoms,\" in Proc. of network-related data management (NRDM) workshop , 2001 . A. Broido and kc claffy, \"Analysis of RouteViews BGP data: policy atoms,\" in Proc. of network-related data management (NRDM) workshop, 2001."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_3_2_1_42_1","unstructured":"\"SprintLink's BGP Policy \" May 2006 http:\/\/www.sprintlink.net\/policy\/bgp.html.  \"SprintLink's BGP Policy \" May 2006 http:\/\/www.sprintlink.net\/policy\/bgp.html."},{"key":"e_1_3_2_1_43_1","volume-title":"Secure Data Delivery,\" in Proc. of workshop on Hot Topics in Networks","author":"Wendlandt D.","year":"2006","unstructured":"D. Wendlandt , I. Avramopoulos , D. G. Andersen , and J. Rexford , \" Don't Secure Routing Protocols , Secure Data Delivery,\" in Proc. of workshop on Hot Topics in Networks , 2006 . D. Wendlandt, I. Avramopoulos, D. G. Andersen, and J. Rexford, \"Don't Secure Routing Protocols, Secure Data Delivery,\" in Proc. of workshop on Hot Topics in Networks, 2006."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.95"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159937"},{"key":"e_1_3_2_1_46_1","volume-title":"July","author":"Convery S.","year":"2001","unstructured":"S. Convery , D. Cook , and M. Franz , \" An Attack Tree for the Border Gateway Protocol,\" draft-convery-bgpattack-01 , July 2001 . S. Convery, D. Cook, and M. Franz, \"An Attack Tree for the Border Gateway Protocol,\" draft-convery-bgpattack-01, July 2001."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052826"},{"key":"e_1_3_2_1_49_1","volume-title":"Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI)","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan , \" Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI) , 2005 . N. Feamster and H. Balakrishnan, \"Detecting BGP Configuration Faults with Static Analysis,\" in Proc. of Symp. on Networked Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_3_2_1_50_1","volume-title":"RFC 3924 - Cisco Architecture for Lawful Intercept in IP Networks","author":"Baker F.","year":"2004","unstructured":"F. Baker , B. Foster , and C. Sharp , \" RFC 3924 - Cisco Architecture for Lawful Intercept in IP Networks ,\" Oct 2004 . F. Baker, B. Foster, and C. Sharp, \"RFC 3924 - Cisco Architecture for Lawful Intercept in IP Networks,\" Oct 2004."},{"key":"e_1_3_2_1_51_1","unstructured":"\"Content Verification - Man in the Middle Attack \" Jan 2007 http:\/\/www.contentverification.com\/man-in-the-middle\/index.html.  \"Content Verification - Man in the Middle Attack \" Jan 2007 http:\/\/www.contentverification.com\/man-in-the-middle\/index.html."},{"key":"e_1_3_2_1_52_1","volume-title":"An Example of a Man-in-the-middle Attack Against Server Authenticated SSL-sessions","author":"Eriksson Mattias","year":"2007","unstructured":"\" Mattias Eriksson , An Example of a Man-in-the-middle Attack Against Server Authenticated SSL-sessions ,\" Jan 2007 , http:\/\/www.cs.umu.se\/education\/examina\/Rapporter\/MattiasEriksson.pdf. \"Mattias Eriksson, An Example of a Man-in-the-middle Attack Against Server Authenticated SSL-sessions,\" Jan 2007, http:\/\/www.cs.umu.se\/education\/examina\/Rapporter\/MattiasEriksson.pdf."},{"key":"e_1_3_2_1_53_1","unstructured":"K. Fujiwara \"DNS Process-in-the-middle Attack \" ICANN Presentation 2005 http:\/\/www.icann.org\/presentations\/dns-attack-MdP-05apr05.pdf.  K. Fujiwara \"DNS Process-in-the-middle Attack \" ICANN Presentation 2005 http:\/\/www.icann.org\/presentations\/dns-attack-MdP-05apr05.pdf."}],"event":{"name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","location":"Kyoto Japan","acronym":"SIGCOMM07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1282380.1282411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:13:51Z","timestamp":1750245231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1282380.1282411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":53,"alternative-id":["10.1145\/1282380.1282411","10.1145\/1282380"],"URL":"https:\/\/doi.org\/10.1145\/1282380.1282411","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1282427.1282411","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}