{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:13Z","timestamp":1772164033442,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T00:00:00Z","timestamp":1377561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,27]]},"DOI":"10.1145\/2486001.2486010","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T08:31:21Z","timestamp":1376382681000},"page":"171-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["BGP security in partial deployment"],"prefix":"10.1145","author":[{"given":"Robert","family":"Lychev","sequence":"first","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Sharon","family":"Goldberg","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Michael","family":"Schapira","sequence":"additional","affiliation":[{"name":"Hebrew University of Jerusalem, Jerusalem, Israel"}]}],"member":"320","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/sourceforge.net\/projects\/irrpt\/","author":"IRR","year":"2011","unstructured":"IRR power tools. http:\/\/sourceforge.net\/projects\/irrpt\/ , 2011 . IRR power tools. http:\/\/sourceforge.net\/projects\/irrpt\/, 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"FCC CSRIC http:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRICIII_9-12-12_WG6-Final-Report.pdf","author":"Deployment Report BGP","year":"2012","unstructured":"Working group 6 Secure BGP Deployment Report . Technical report , FCC CSRIC http:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRICIII_9-12-12_WG6-Final-Report.pdf , 2012 . Working group 6 Secure BGP Deployment Report. Technical report, FCC CSRIC http:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRICIII_9-12-12_WG6-Final-Report.pdf, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342393"},{"key":"e_1_3_2_1_4_1","unstructured":"Alexa. The top 500 sites on the web. http:\/\/www.alexa.com\/topsites October 1 2012.  Alexa. The top 500 sites on the web. http:\/\/www.alexa.com\/topsites October 1 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644934"},{"key":"e_1_3_2_1_6_1","volume-title":"How small groups can secure interdomain routing. Technical report","author":"Avramopoulos I.","year":"2007","unstructured":"I. Avramopoulos , M. Suchara , and J. Rexford . How small groups can secure interdomain routing. Technical report , Princeton University Comp . Sci., 2007 . I. Avramopoulos, M. Suchara, and J. Rexford. How small groups can secure interdomain routing. Technical report, Princeton University Comp. Sci., 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382254"},{"key":"e_1_3_2_1_9_1","unstructured":"M. A. Brown. Rensys Blog: Pakistan hijacks YouTube. http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml.  M. A. Brown. Rensys Blog: Pakistan hijacks YouTube. http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140334"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452337"},{"key":"e_1_3_2_1_13_1","volume-title":"BGP best path selection algorithm: How the best path algorithm works. Document ID","year":"2012","unstructured":"Cisco. BGP best path selection algorithm: How the best path algorithm works. Document ID : 13753, May 2012 . http:\/\/www.cisco.com\/en\/US\/tech\/tk365\/technologies_tech_note09186a0080094431.shtml#bestpath. Cisco. BGP best path selection algorithm: How the best path algorithm works. Document ID: 13753, May 2012. http:\/\/www.cisco.com\/en\/US\/tech\/tk365\/technologies_tech_note09186a0080094431.shtml#bestpath."},{"key":"e_1_3_2_1_14_1","unstructured":"J. Cowie. Rensys blog: China's 18-minute mystery. http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml.  J. Cowie. Rensys blog: China's 18-minute mystery. http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2119327"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE INFOCOM","author":"Gao L.","year":"2001","unstructured":"L. Gao , T. Griffin , and J. Rexford . Inherently safe backup routing with BGP . IEEE INFOCOM , 2001 . L. Gao, T. Griffin, and J. Rexford. Inherently safe backup routing with BGP. IEEE INFOCOM, 2001."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_1_18_1","volume-title":"NANOG'56","author":"Gill P.","year":"2012","unstructured":"P. Gill , S. Goldberg , and M. Schapira . A survey of interdomain routing policies . NANOG'56 , October 2012 . P. Gill, S. Goldberg, and M. Schapira. A survey of interdomain routing policies. NANOG'56, October 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402989"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851195"},{"key":"e_1_3_2_1_22_1","first-page":"4264","article-title":"BGP wedgies","author":"Griffin T.","year":"2005","unstructured":"T. Griffin and G. Huston . BGP wedgies . RFC 4264 , 2005 . T. Griffin and G. Huston. BGP wedgies. RFC 4264, 2005.","journal-title":"RFC"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"issue":"1","key":"e_1_3_2_1_24_1","article-title":"Peering and settlements - Part I","volume":"2","author":"Huston G.","year":"1999","unstructured":"G. Huston . Peering and settlements - Part I . The Internet Protocol Journal (Cisco) , 2 ( 1 ), March 1999 . G. Huston. Peering and settlements - Part I. The Internet Protocol Journal (Cisco), 2(1), March 1999.","journal-title":"The Internet Protocol Journal (Cisco)"},{"issue":"2","key":"e_1_3_2_1_25_1","article-title":"Peering and settlements - Part II","volume":"2","author":"Huston G.","year":"1999","unstructured":"G. Huston . Peering and settlements - Part II . The Internet Protocol Journal (Cisco) , 2 ( 2 ), June 1999 . G. Huston. Peering and settlements - Part II. The Internet Protocol Journal (Cisco), 2(2), June 1999.","journal-title":"The Internet Protocol Journal (Cisco)"},{"key":"e_1_3_2_1_26_1","volume-title":"Threat model for BGP path security. Internet draft: draft-ietf-sidr-bgpsec-threats-04","author":"Kent S.","year":"2013","unstructured":"S. Kent and A. Chi . Threat model for BGP path security. Internet draft: draft-ietf-sidr-bgpsec-threats-04 , 2013 . S. Kent and A. Chi. Threat model for BGP path security. Internet draft: draft-ietf-sidr-bgpsec-threats-04, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_28_1","unstructured":"C. Labovitz. Arbor blog: Battle of the hyper giants. http:\/\/asert.arbornetworks.com\/2010\/04\/ the-battle-of-the-hyper-giants-part-i-2\/.  C. Labovitz. Arbor blog: Battle of the hyper giants. http:\/\/asert.arbornetworks.com\/2010\/04\/ the-battle-of-the-hyper-giants-part-i-2\/."},{"key":"e_1_3_2_1_29_1","volume-title":"CA.","author":"Labovitz C.","year":"2011","unstructured":"C. Labovitz . Internet traffic 2007 - 2011. Global Peering Forum. Santi Monica , CA. , April 2011 . C. Labovitz. Internet traffic 2007 - 2011. Global Peering Forum. Santi Monica, CA., April 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851194"},{"key":"e_1_3_2_1_31_1","volume-title":"Internet-Draft","author":"Lepinski M.","year":"2012","unstructured":"M. Lepinski . Bgpsec protocol specification: draft-ietf-sidr-bgpsec-protocol-06 . Internet-Draft , 2012 . M. Lepinski. Bgpsec protocol specification: draft-ietf-sidr-bgpsec-protocol-06. Internet-Draft, 2012."},{"key":"e_1_3_2_1_32_1","unstructured":"M. Lepinski and S. Kent. RFC 6480: An Infrastructure to Support Secure Internet Routing.  M. Lepinski and S. Kent. RFC 6480: An Infrastructure to Support Secure Internet Routing."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332495"},{"key":"e_1_3_2_1_34_1","volume-title":"Arxiv","author":"Lychev R.","year":"2013","unstructured":"R. Lychev , S. Goldberg , and M. Schapira . Is the juice worth the squeeze? BGP security in partial deployment. Technical report , Arxiv , 2013 . R. Lychev, S. Goldberg, and M. Schapira. Is the juice worth the squeeze? BGP security in partial deployment. Technical report, Arxiv, 2013."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.11.007"},{"key":"e_1_3_2_1_36_1","volume-title":"April","author":"Misel S.","year":"1997","unstructured":"S. Misel . \"Wow, AS7007!\". Merit NANOG Archive , April 1997 . http:\/\/www.merit.edu\/mail.archives\/nanog\/ 1997-04\/msg00340.html. S. Misel. \"Wow, AS7007!\". Merit NANOG Archive, April 1997. http:\/\/www.merit.edu\/mail.archives\/nanog\/ 1997-04\/msg00340.html."},{"key":"e_1_3_2_1_37_1","volume-title":"BGP Prefix Origin Validation","author":"Mohapatra P.","year":"2012","unstructured":"P. Mohapatra , J. Scudder , D. Ward , R. Bush , and R. Austein . BGP Prefix Origin Validation . Internet Engineering Task Force Network Working Group , 2012 . http:\/\/tools.ietf.org\/html\/ draft-ietf-sidr-pfx-validate-09. P. Mohapatra, J. Scudder, D. Ward, R. Bush, and R. Austein. BGP Prefix Origin Validation. Internet Engineering Task Force Network Working Group, 2012. http:\/\/tools.ietf.org\/html\/ draft-ietf-sidr-pfx-validate-09."},{"key":"e_1_3_2_1_38_1","volume-title":"RIPE Labs","author":"Palse P.","year":"2010","unstructured":"P. Palse . Serving ROAs as RPSL route{6} Objects from the RIPE Database . RIPE Labs , June 2010 . https:\/\/labs.ripe.net\/Members\/Paul_P_\/content-serving-roas-rpsl-route-objects. P. Palse. Serving ROAs as RPSL route{6} Objects from the RIPE Database. RIPE Labs, June 2010. https:\/\/labs.ripe.net\/Members\/Paul_P_\/content-serving-roas-rpsl-route-objects."},{"key":"e_1_3_2_1_39_1","volume-title":"November","author":"Paseka T.","year":"2012","unstructured":"T. Paseka . Cloudflare blog: Why google went offline today ., November 2012 . http:\/\/blog.cloudflare.com\/why-google-went-offline-today-and-a-bit-about. T. Paseka. Cloudflare blog: Why google went offline today., November 2012. http:\/\/blog.cloudflare.com\/why-google-went-offline-today-and-a-bit-about."},{"key":"e_1_3_2_1_40_1","volume-title":"DEFCON'16","author":"Pilosov A.","unstructured":"A. Pilosov and T. Kapela . Stealing the Internet: An Internet-scale man in the middle attack, 2008 . DEFCON'16 . A. Pilosov and T. Kapela. Stealing the Internet: An Internet-scale man in the middle attack, 2008. DEFCON'16."},{"key":"e_1_3_2_1_41_1","volume-title":"March 22","year":"2012","unstructured":"Reuters. Internet providers pledge anti-botnet effort , March 22 2012 . Reuters. Internet providers pledge anti-botnet effort, March 22 2012."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061961"},{"key":"e_1_3_2_1_44_1","unstructured":"Sandvine. Fall 2012 global internet phenomena 2012.  Sandvine. Fall 2012 global internet phenomena 2012."},{"key":"e_1_3_2_1_45_1","volume-title":"January","author":"Sriram K.","year":"2013","unstructured":"K. Sriram . BGPSEC design choices and summary of supporting discussions. Internet-Draft: draft-sriram-bgpsec-design-choices-03 , January 2013 . K. Sriram. BGPSEC design choices and summary of supporting discussions. Internet-Draft: draft-sriram-bgpsec-design-choices-03, January 2013."},{"key":"e_1_3_2_1_46_1","volume-title":"June","author":"White R.","year":"2003","unstructured":"R. White . Deployment considerations for secure origin BGP (soBGP). draft-white-sobgp-bgp-deployment-01.txt , June 2003 , expired. R. White. Deployment considerations for secure origin BGP (soBGP). draft-white-sobgp-bgp-deployment-01.txt, June 2003, expired."}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2486010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2486001.2486010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:48:40Z","timestamp":1750222120000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2486001.2486010"}},"subtitle":["is the juice worth the squeeze?"],"short-title":[],"issued":{"date-parts":[[2013,8,27]]},"references-count":46,"alternative-id":["10.1145\/2486001.2486010","10.1145\/2486001"],"URL":"https:\/\/doi.org\/10.1145\/2486001.2486010","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2534169.2486010","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,8,27]]},"assertion":[{"value":"2013-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}