{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:55Z","timestamp":1772163955025,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,17]],"date-time":"2008-08-17T00:00:00Z","timestamp":1218931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,17]]},"DOI":"10.1145\/1402958.1402989","type":"proceedings-article","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T08:38:39Z","timestamp":1219135119000},"page":"267-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Rationality and traffic attraction"],"prefix":"10.1145","author":[{"given":"Sharon","family":"Goldberg","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Shai","family":"Halevi","sequence":"additional","affiliation":[{"name":"IBM Research, Hawthorne, NY, USA"}]},{"given":"Aaron D.","family":"Jaggard","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Vijay","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"Colgate University, Hamilton, NY, USA"}]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375850"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. USENIX","author":"Avramopoulos I.","year":"2006","unstructured":"I. Avramopoulos and J. Rexford . Stealth Probing: Data-Plane Security for IP Routing . In Proc. USENIX , Jun. 2006 . I. Avramopoulos and J. Rexford. Stealth Probing: Data-Plane Security for IP Routing. In Proc. USENIX, Jun. 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76809-8_19"},{"key":"e_1_3_2_1_5_1","volume-title":"AT&T Labs-Research","author":"Butler K.","year":"2005","unstructured":"K. Butler , T. Farley , P. McDaniel , and J. Rexford . A Survey of BGP Security Issues and Solutions. Technical report , AT&T Labs-Research , 2005 . K. Butler, T. Farley, P. McDaniel, and J. Rexford. A Survey of BGP Security Issues and Solutions. Technical report, AT&T Labs-Research, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.65"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896531"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.02.020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0122-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134722"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0134-7"},{"key":"e_1_3_2_1_12_1","volume-title":"Cambridge UP","author":"Feigenbaum J.","year":"2007","unstructured":"J. Feigenbaum , M. Schapira , and S. Shenker . Distributed Algorithmic Mechanism Design. Chap. 14 (pp. 363--384) in Algorithmic Game Theory, N. Nisan, T. Roughgarden, \u00c9. Tardos, and V. Vazirani, eds . Cambridge UP , Sep. 2007 . J. Feigenbaum, M. Schapira, and S. Shenker. Distributed Algorithmic Mechanism Design. Chap. 14 (pp. 363--384) in Algorithmic Game Theory, N. Nisan, T. Roughgarden, \u00c9. Tardos, and V. Vazirani, eds. Cambridge UP, Sep. 2007."},{"key":"e_1_3_2_1_13_1","first-page":"22","volume-title":"Proc. IEEE INFOCOM","volume":"1","author":"Gao L.","year":"2001","unstructured":"L. Gao , T. G. Griffin , and J. Rexford . Inherently Safe Backup Routing with BGP . In Proc. IEEE INFOCOM , vol. 1 , pp. 22 -- 26 , Apr. 2001 . L. Gao, T. G. Griffin, and J. Rexford. Inherently Safe Backup Routing with BGP. In Proc. IEEE INFOCOM, vol. 1, pp. 22--26, Apr. 2001."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11422778_52"},{"key":"e_1_3_2_1_16_1","volume-title":"The Generalized TTL Security Mechanism (GTSM). RFC","author":"Gill V.","year":"2004","unstructured":"V. Gill , J. Heasley , and D. Meyer . The Generalized TTL Security Mechanism (GTSM). RFC 3682, Feb. 2004 . V. Gill, J. Heasley, and D. Meyer. The Generalized TTL Security Mechanism (GTSM). RFC 3682, Feb. 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"Rational ASes and Traffic Attraction: Incentives for Honestly Announcing Paths in BGP","author":"Goldberg S.","year":"2008","unstructured":"S. Goldberg and S. Halevi . Rational ASes and Traffic Attraction: Incentives for Honestly Announcing Paths in BGP . Technical Report TR-813-08, Princeton Univ . Dept . of Comp. Sci., Feb. 2008 . S. Goldberg and S. Halevi. Rational ASes and Traffic Attraction: Incentives for Honestly Announcing Paths in BGP. Technical Report TR-813-08, Princeton Univ. Dept. of Comp. Sci., Feb. 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP","author":"Goldberg S.","year":"2008","unstructured":"S. Goldberg , S. Halevi , A. D. Jaggard , V. Ramachandran , and R. N. Wright . Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP . Technical Report TR-823-08, Princeton Univ . Dept . of Comp. Sci., Jun. 2008 . S. Goldberg, S. Halevi, A. D. Jaggard, V. Ramachandran, and R. N. Wright. Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP. Technical Report TR-823-08, Princeton Univ. Dept. of Comp. Sci., Jun. 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375480"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. NDSS","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin . Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing . In Proc. NDSS , Feb. 2003 . G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proc. NDSS, Feb. 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"e_1_3_2_1_22_1","volume-title":"Protection of BGP Sessions via the TCP MD5 Signature Option. RFC","author":"Heffernan A.","year":"1998","unstructured":"A. Heffernan . Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, Aug. 1998 . A. Heffernan. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, Aug. 1998."},{"key":"e_1_3_2_1_24_1","volume-title":"Settlements. In Proc. Internet Glob. Summit (INET)","author":"Huston G.","year":"1999","unstructured":"G. Huston . Interconnection, Peering, and Settlements. In Proc. Internet Glob. Summit (INET) , Jun. 1999 . G. Huston. Interconnection, Peering, and Settlements. In Proc. Internet Glob. Summit (INET), Jun. 1999."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374388"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. USENIX Wkshp. Steps to Reducing Unwanted Traffic on the Internet (SRUTI)","author":"Liu X.","year":"2006","unstructured":"X. Liu , X. Yang , D. Wetherall , and T. Anderson . Efficient and Secure Source Authentication with Packet Passports . In Proc. USENIX Wkshp. Steps to Reducing Unwanted Traffic on the Internet (SRUTI) , Jul. 2006 . X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In Proc. USENIX Wkshp. Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Jul. 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1999.0790"},{"key":"e_1_3_2_1_32_1","first-page":"77","volume-title":"Proc. HotNets-I","author":"Padmanabhan V.","year":"2002","unstructured":"V. Padmanabhan and D. Simon . Secure Traceroute to Detect Faulty or Malicious Routing . Proc. HotNets-I , pp. 77 -- 82 , Oct. 2002 . V. Padmanabhan and D. Simon. Secure Traceroute to Detect Faulty or Malicious Routing. Proc. HotNets-I, pp. 77--82, Oct. 2002."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011781"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4271","volume-title":"A Border Gateway Protocol 4 (BGP-4). RFC","author":"Rekhter Y.","year":"2006","unstructured":"Y. Rekhter , T. Li , and S. Hares . A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006 . Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4). RFC 4271, Jan. 2006."},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. USENIX NSDI","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. H. Katz . Listen and Whisper: Security mechanisms for BGP . In Proc. USENIX NSDI , Mar. 2004 . L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security mechanisms for BGP. In Proc. USENIX NSDI, Mar. 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. ACM SIGCOMM Asia Workshop","author":"Wang H.","year":"2005","unstructured":"H. Wang , R. K. Chang , D.-M. Chiu , and J. C. Lui . Characterizing the Performance and Stability Issues of the AS Path Prepending Method . In Proc. ACM SIGCOMM Asia Workshop , Apr. 2005 . H. Wang, R. K. Chang, D.-M. Chiu, and J. C. Lui. Characterizing the Performance and Stability Issues of the AS Path Prepending Method. In Proc. ACM SIGCOMM Asia Workshop, Apr. 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.28"},{"key":"e_1_3_2_1_40_1","volume-title":"Jun.","author":"White R.","year":"2003","unstructured":"R. White . Deployment Considerations for Secure Origin BGP (soBGP). Internet Draft (expired), draft-white-sobgp-bgp-deployment-01.txt , Jun. 2003 . R. White. Deployment Considerations for Secure Origin BGP (soBGP). Internet Draft (expired), draft-white-sobgp-bgp-deployment-01.txt, Jun. 2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281123"}],"event":{"name":"SIGCOMM '08: ACM SIGCOMM 2008 Conference","location":"Seattle WA USA","acronym":"SIGCOMM '08","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the ACM SIGCOMM 2008 conference on Data communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402989","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1402958.1402989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:47:19Z","timestamp":1750243639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402989"}},"subtitle":["incentives for honest path announcements in bgp"],"short-title":[],"issued":{"date-parts":[[2008,8,17]]},"references-count":38,"alternative-id":["10.1145\/1402958.1402989","10.1145\/1402958"],"URL":"https:\/\/doi.org\/10.1145\/1402958.1402989","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1402946.1402989","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,8,17]]},"assertion":[{"value":"2008-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}