{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:31Z","timestamp":1750307251603,"version":"3.41.0"},"reference-count":80,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2010,12]]},"abstract":"<jats:p>Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all of the nodes in the network. Many of the proposed systems were designed with the assumption that all of the nodes are altruistic. However, this assumption may be violated by compromised nodes acting maliciously to degrade the accuracy of the coordinate system. As numerous peer-to-peer applications come to rely on virtual coordinate systems to achieve good performance, it is critical to address the security of such systems.<\/jats:p>\n          <jats:p>In this work, we demonstrate the vulnerability of decentralized virtual coordinate systems to insider (or Byzantine) attacks. We propose techniques to make the coordinate assignment robust to malicious attackers without increasing the communication cost. We use both spatial and temporal correlations to perform context-sensitive outlier analysis to reject malicious updates and prevent unnecessary and erroneous adaptations. We demonstrate the attacks and mitigation techniques in the context of a well-known virtual coordinate system using simulations based on three representative, real-life Internet topologies of hosts and corresponding Round Trip Times (RTT). We show the effects of the attacks and the utility of the mitigation techniques on the virtual coordinate system as seen by higher-level applications, elucidating the utility of deploying robust virtual coordinate systems as network services.<\/jats:p>","DOI":"10.1145\/1880022.1880032","type":"journal-article","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T14:32:48Z","timestamp":1293633168000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust Decentralized Virtual Coordinate Systems in Adversarial Environments"],"prefix":"10.1145","volume":"13","author":[{"given":"David","family":"Zage","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2010,12]]},"reference":[{"volume-title":"Proceedings of the IEEE Conference on Mobile, Ad Hoc and Sensor Systems (MASS\u201905)","author":"Anjum F.","key":"e_1_2_1_1_1","unstructured":"Anjum , F. , Pandey , S. , and Agrawal , P . 2005. Secure localization in sensor networks using transmission range variation . In Proceedings of the IEEE Conference on Mobile, Ad Hoc and Sensor Systems (MASS\u201905) . Anjum, F., Pandey, S., and Agrawal, P. 2005. Secure localization in sensor networks using transmission range variation. In Proceedings of the IEEE Conference on Mobile, Ad Hoc and Sensor Systems (MASS\u201905)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.30"},{"key":"e_1_2_1_3_1","unstructured":"Barnett V. and Lewis T. 1994. Outliers in Statistical Data. John Wiley &amp; Sons New York. Barnett V. and Lewis T. 1994. Outliers in Statistical Data. John Wiley &amp; Sons New York."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"volume-title":"Proceedings of the International Conference on Information Technology Interfaces (ITI\u201906)","author":"Birant D.","key":"e_1_2_1_5_1","unstructured":"Birant , D. and Kut , A . 2006. Spatio-Temporal outlier detection in large databases . In Proceedings of the International Conference on Information Technology Interfaces (ITI\u201906) . Birant, D. and Kut, A. 2006. Spatio-Temporal outlier detection in large databases. In Proceedings of the International Conference on Information Technology Interfaces (ITI\u201906)."},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201905)","author":"Capkun S.","key":"e_1_2_1_6_1","unstructured":"Capkun , S. and Hubaux , J . -P. 2005. Secure positioning of wireless devices with application to sensor networks . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201905) . Capkun, S. and Hubaux, J.-P. 2005. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201905)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"volume-title":"Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm\u201909)","author":"Chan-Tin E.","key":"e_1_2_1_8_1","unstructured":"Chan-Tin , E. , Feldman , D. , Hopper , N. , and Kim , Y . 2009. The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems . In Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm\u201909) . Chan-Tin, E., Feldman, D., Hopper, N., and Kim, Y. 2009. The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems. In Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm\u201909)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.79"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"volume-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS\u201904)","author":"Costa M.","key":"e_1_2_1_11_1","unstructured":"Costa , M. , Castro , M. , Rowstron , R. , and Key , P . 2004. PIC: Practical Internet coordinates for distance estimation . In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS\u201904) . Costa, M., Castro, M., Rowstron, R., and Key, P. 2004. PIC: Practical Internet coordinates for distance estimation. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS\u201904)."},{"key":"e_1_2_1_12_1","unstructured":"Cspace. http:\/\/cspace.in\/. Cspace . http:\/\/cspace.in\/."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"volume-title":"Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904)","author":"Dabek F.","key":"e_1_2_1_14_1","unstructured":"Dabek , F. , Li , J. , Sit , E. , Robertson , J. , Kaashoek , M. F. , and Morris , R . 2004b. Designing a dht for low latency and high throughput . In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904) . Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. F., and Morris, R. 2004b. Designing a dht for low latency and high throughput. In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1981.32"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2005.12.011"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.157"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.958323"},{"volume-title":"Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904)","author":"Freedman M. J.","key":"e_1_2_1_20_1","unstructured":"Freedman , M. J. , Freudenthal , E. , and Mazieres , D . 2004. Democratizing content publication with coral . In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904) . Freedman, M. J., Freudenthal, E., and Mazieres, D. 2004. Democratizing content publication with coral. In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863998"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.7"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015488"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Huang Y. and Lee W. 2004. Attack analysis and detection for ad hoc routing protocols. Lecture Notes in Computer Science. vol. 3224 Springer 125--145. Huang Y. and Lee W. 2004. Attack analysis and detection for ad hoc routing protocols. Lecture Notes in Computer Science. vol. 3224 Springer 125--145.","DOI":"10.1007\/978-3-540-30143-1_7"},{"volume-title":"Proceedings of the American Control Conference (ACC\u201904)","author":"Jiang G.","key":"e_1_2_1_27_1","unstructured":"Jiang , G. and Cybenko , G . 2004. Temporal and spatial distributed event correlation for network security . In Proceedings of the American Control Conference (ACC\u201904) . Jiang, G. and Cybenko, G. 2004. Temporal and spatial distributed event correlation for network security. In Proceedings of the American Control Conference (ACC\u201904)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282388"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162672"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368453"},{"volume-title":"Proceedings of the International Conference on Very Large Databases (VLDB\u201998)","author":"Knorr E. M.","key":"e_1_2_1_31_1","unstructured":"Knorr , E. M. and Ng , R. T . 1998. Algorithms for mining distance-based outliers in large datasets . In Proceedings of the International Conference on Very Large Databases (VLDB\u201998) . Knorr, E. M. and Ng, R. T. 1998. Algorithms for mining distance-based outliers in large datasets. In Proceedings of the International Conference on Very Large Databases (VLDB\u201998)."},{"key":"e_1_2_1_32_1","volume-title":"The Art of Computer Programming","author":"Knuth D. E.","unstructured":"Knuth , D. E. 1978. The Art of Computer Programming 2 nd Ed. Addison-Wesley . Knuth, D. E. 1978. The Art of Computer Programming 2nd Ed. Addison-Wesley.","edition":"2"},{"volume-title":"Proceedings of the USENIX Security Conference.","author":"Lad M.","key":"e_1_2_1_33_1","unstructured":"Lad , M. , Massey , D. , Pei , D. , Wu , Y. , Zhang , B. , and Zhang , L . 2006. A prefix hijack alert system . In Proceedings of the USENIX Security Conference. Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., and Zhang, L. 2006. A prefix hijack alert system. In Proceedings of the USENIX Security Conference."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077391.1077395"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861381"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147738"},{"volume-title":"Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201907)","author":"Ledlie J.","key":"e_1_2_1_37_1","unstructured":"Ledlie , J. , Gardner , P. , and Seltzer , M . 2007a. Network coordinates in the wild . In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201907) . Ledlie, J., Gardner, P., and Seltzer, M. 2007a. Network coordinates in the wild. In Proceedings of the ACM USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201907)."},{"volume-title":"Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201907)","author":"Ledlie J.","key":"e_1_2_1_38_1","unstructured":"Ledlie , J. , Pietzuch , P. , Mitzenmacher , M. , and Seltzer , M . 2007b. Wired geometric routing . In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201907) . Ledlie, J., Pietzuch, P., Mitzenmacher, M., and Seltzer, M. 2007b. Wired geometric routing. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201907)."},{"volume-title":"Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA\u201904)","author":"Lehman L.","key":"e_1_2_1_39_1","unstructured":"Lehman , L. and Lerman , S . 2004. Pcoord: Network position estimation using peer-to-peer measurements . In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA\u201904) . Lehman, L. and Lerman, S. 2004. Pcoord: Network position estimation using peer-to-peer measurements. In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA\u201904)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128011.1128189"},{"volume-title":"Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN\u201905)","author":"Li Z.","key":"e_1_2_1_41_1","unstructured":"Li , Z. , Trappe , W. , Zhang , Y. , and Nath , B . 2005. Robust statistical methods for securing wireless localization in sensor networks . In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN\u201905) . Li, Z., Trappe, W., Zhang, Y., and Nath, B. 2005. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN\u201905)."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948222"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021821300400182X"},{"volume-title":"Proceedings of the Internet Measurement Conference (IMC\u201905)","author":"Lua E.","key":"e_1_2_1_44_1","unstructured":"Lua , E. , Griffin , T. , Pias , M. , Zheng , H. , and Crowcroft , J . 2005. On the accuracy of embeddings for internet coordinate systems . In Proceedings of the Internet Measurement Conference (IMC\u201905) . Lua, E., Griffin, T., Pias, M., Zheng, H., and Crowcroft, J. 2005. On the accuracy of embeddings for internet coordinate systems. In Proceedings of the Internet Measurement Conference (IMC\u201905)."},{"volume-title":"Proceedings of the Internet Measurement Conference (IMC\u201906)","author":"Lumezanu C.","key":"e_1_2_1_45_1","unstructured":"Lumezanu , C. and Spring , N . 2006. Playing Vivaldi in hyperbolic space . In Proceedings of the Internet Measurement Conference (IMC\u201906) . Lumezanu, C. and Spring, N. 2006. Playing Vivaldi in hyperbolic space. In Proceedings of the Internet Measurement Conference (IMC\u201906)."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.236"},{"volume-title":"Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201902)","author":"Maymounkov P.","key":"e_1_2_1_48_1","unstructured":"Maymounkov , P. and Mazieres , D . 2002. A peer-to-peer information system based on the XOR metric . In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201902) . Maymounkov, P. and Mazieres, D. 2002. A peer-to-peer information system based on the XOR metric. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201902)."},{"volume-title":"Proceedings of the Consumer Communications and Networking Conference (CCNC\u201907)","author":"Narayanan S.","key":"e_1_2_1_49_1","unstructured":"Narayanan , S. and Shim , E . 2007. Performance improvement of a distributed internet coordi- nates system . In Proceedings of the Consumer Communications and Networking Conference (CCNC\u201907) . Narayanan, S. and Shim, E. 2007. Performance improvement of a distributed internet coordi- nates system. In Proceedings of the Consumer Communications and Networking Conference (CCNC\u201907)."},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201902)","author":"Ng E.","key":"e_1_2_1_50_1","unstructured":"Ng , E. and Zhang , H . 2002. Predicting internet network distance with coordinates-based ap- proaches . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201902) . Ng, E. and Zhang, H. 2002. Predicting internet network distance with coordinates-based ap- proaches. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201902)."},{"volume-title":"Proceedings of the USENIX Conference.","author":"Ng T.","key":"e_1_2_1_51_1","unstructured":"Ng , T. and Zhang , H . 2004. A network positioning system for the internet . In Proceedings of the USENIX Conference. Ng, T. and Zhang, H. 2004. A network positioning system for the internet. In Proceedings of the USENIX Conference."},{"key":"e_1_2_1_52_1","unstructured":"Nlanr active measurement project. 2010. Nlanr active measurement project homepage. http:\/\/amp.nlanr.net\/. Nlanr active measurement project. 2010. Nlanr active measurement project homepage. http:\/\/amp.nlanr.net\/."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266980"},{"key":"e_1_2_1_54_1","unstructured":"p2psim. 2010. P2psim: A simulator for peer-to-peer protocols. http:\/\/pdos.csail.mit.edu\/p2psim\/.  p2psim. 2010. P2psim: A simulator for peer-to-peer protocols. http:\/\/pdos.csail.mit.edu\/p2psim\/."},{"volume-title":"Proceedings of the International Conference on Web Information Systems Engineering (WISE\u201903)","author":"Papadimitratos P.","key":"e_1_2_1_55_1","unstructured":"Papadimitratos , P. and Haas , Z. J . 2003. Secure data transmission in mobile ad hoc networks . In Proceedings of the International Conference on Web Information Systems Engineering (WISE\u201903) . Papadimitratos, P. and Haas, Z. J. 2003. Secure data transmission in mobile ad hoc networks. In Proceedings of the International Conference on Web Information Systems Engineering (WISE\u201903)."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.38"},{"volume-title":"Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201903)","author":"Pias M.","key":"e_1_2_1_57_1","unstructured":"Pias , M. , Crowcroft , J. , Wilbur , S. , Bhatti , S. , and Harris , T . 2003. Lighthouses for scalable distributed location . In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201903) . Pias, M., Crowcroft, J., Wilbur, S., Bhatti, S., and Harris, T. 2003. Lighthouses for scalable distributed location. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS\u201903)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.76"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938996"},{"key":"e_1_2_1_60_1","unstructured":"Ribeiro M. I. 2004. Gaussian probability density functions: Properties and error characterization. Tech. rep. 1049-001 Instituto Superior Tcnico Lisboa Portugal. Ribeiro M. I. 2004. Gaussian probability density functions: Properties and error characterization. Tech. rep. 1049-001 Instituto Superior Tcnico Lisboa Portugal."},{"key":"e_1_2_1_61_1","series-title":"Lecture Notes in Computer Science","volume-title":"Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems","author":"Rowstron A.","year":"2001","unstructured":"Rowstron , A. and Druschel , P . 2001 . Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems . Lecture Notes in Computer Science , vol. 2218 , Springer , 329--350. Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Lecture Notes in Computer Science, vol. 2218, Springer, 329--350."},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the Annual International Conference on Network Protocols (ICNP\u201998)","author":"Sargor C.","year":"1998","unstructured":"Sargor , C. 1998 . Sargor, C. 1998. Statistical anomaly detection for link-state routing protocols . In Proceedings of the Annual International Conference on Network Protocols (ICNP\u201998) . Sargor, C. 1998. Sargor, C. 1998. Statistical anomaly detection for link-state routing protocols. In Proceedings of the Annual International Conference on Network Protocols (ICNP\u201998)."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779813.1779827"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838597"},{"volume-title":"Proceedings of the International Workshop on Peer-to-Peer systems (IPTPS\u201908)","author":"Sherr M.","key":"e_1_2_1_65_1","unstructured":"Sherr , M. , Loo , B. , and Blaze , M . 2008. A fully decentralized service for securing network coordinate systems . In Proceedings of the International Workshop on Peer-to-Peer systems (IPTPS\u201908) . Sherr, M., Loo, B., and Blaze, M. 2008. A fully decentralized service for securing network coordinate systems. In Proceedings of the International Workshop on Peer-to-Peer systems (IPTPS\u201908)."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/027836498600500404"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.28"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"e_1_2_1_69_1","unstructured":"Tan P.-N. Steinbach M. and Kumar V. 2006. Introduction to Data Mining. Addison Wesley. Tan P.-N. Steinbach M. and Kumar V. 2006. Introduction to Data Mining. Addison Wesley."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948223"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320199"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.912394"},{"volume-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID\u201904)","author":"Wang K.","key":"e_1_2_1_73_1","unstructured":"Wang , K. and Stolfo , S. J . 2004. Anomalous payload-based network intrusion detection . In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID\u201904) . Wang, K. and Stolfo, S. J. 2004. Anomalous payload-based network intrusion detection. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID\u201904)."},{"key":"e_1_2_1_74_1","first-page":"47","article-title":"Securing BGP through secure origin BGP (soBGP)","volume":"33","author":"White R.","year":"2003","unstructured":"White , R. 2003 . Securing BGP through secure origin BGP (soBGP) . Bus. Comm. Rev. 33 , 47 -- 53 . White, R. 2003. Securing BGP through secure origin BGP (soBGP). Bus. Comm. Rev. 33, 47--53.","journal-title":"Bus. Comm. Rev."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080103"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.7"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201906)","author":"Zhang R.","key":"e_1_2_1_77_1","unstructured":"Zhang , R. , Tang , C. , Hu , Y. , Fahmy , S. , and Lin , X . 2006b. Impact of the inaccuracy of distance prediction algorithms on internet applications - An analytical and comparative study . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201906) . Zhang, R., Tang, C., Hu, Y., Fahmy, S., and Lin, X. 2006b. Impact of the inaccuracy of distance prediction algorithms on internet applications - An analytical and comparative study. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom\u201906)."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282412"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_19"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880022.1880032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1880022.1880032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:15Z","timestamp":1750243935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880022.1880032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":80,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["10.1145\/1880022.1880032"],"URL":"https:\/\/doi.org\/10.1145\/1880022.1880032","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2010,12]]},"assertion":[{"value":"2008-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}