{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:27:44Z","timestamp":1776090464290,"version":"3.50.1"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1017907"],"award-info":[{"award-number":["1017907"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,9,23]]},"abstract":"<jats:p>Routing security incidents can still slip past deployed security defenses.<\/jats:p>","DOI":"10.1145\/2659899","type":"journal-article","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T13:34:59Z","timestamp":1412170499000},"page":"56-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Why is it taking so long to secure internet routing?"],"prefix":"10.1145","volume":"57","author":[{"given":"Sharon","family":"Goldberg","sequence":"first","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2014,9,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_2_1_2_1","unstructured":"Brown M. Pakistan hijacks YouTube. Renesys blog; http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml.  Brown M. Pakistan hijacks YouTube. Renesys blog; http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159946"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535787"},{"key":"e_1_2_1_6_1","unstructured":"Cowie J. China's 18-minute mystery. Renesys blog 2010; http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml.  Cowie J. China's 18-minute mystery. Renesys blog 2010; http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml."},{"key":"e_1_2_1_7_1","unstructured":"FCC Communications Security Reliability and Interoperability Council III (CSRIC). Secure BGP deployment. Communications and Strategies; (2012); http:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRICIII_9-12-12_WG6-Final-Report.pdf.  FCC Communications Security Reliability and Interoperability Council III (CSRIC). Secure BGP deployment. Communications and Strategies ; (2012); http:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRICIII_9-12-12_WG6-Final-Report.pdf."},{"key":"e_1_2_1_8_1","unstructured":"FCC Communications Security Reliability and Interoperability Council Working Group 6. Secure BGP deployment final report 2013.  FCC Communications Security Reliability and Interoperability Council Working Group 6. Secure BGP deployment final report 2013."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567566"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851195"},{"key":"e_1_2_1_13_1","unstructured":"Goldman E. Sex.com--An update. Technology and Marketing Law blog 2010; http:\/\/blog.ericgoldman.org\/archives\/2006\/10\/sexcom_an_updat.htm.  Goldman E. Sex.com--An update. Technology and Marketing Law blog 2010; http:\/\/blog.ericgoldman.org\/archives\/2006\/10\/sexcom_an_updat.htm."},{"key":"e_1_2_1_14_1","unstructured":"Government Printing Office. H.R.3261 - Stop Online Piracy Act 2011.  Government Printing Office. H.R.3261 - Stop Online Piracy Act 2011."},{"key":"e_1_2_1_15_1","volume-title":"The Guardian (May 12, 2014","author":"Greenwald G.","year":"2014"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626293"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_23"},{"key":"e_1_2_1_18_1","volume-title":"Der Spiegel (Dec. 29","author":"Horchert J.","year":"2013"},{"key":"e_1_2_1_19_1","first-page":"1","article-title":"Interconnection, peering and settlements","volume":"2","author":"Huston G","year":"1999","journal-title":"Part I. Internet Protocol Journal"},{"key":"e_1_2_1_20_1","first-page":"2","article-title":"Interconnection, peering and settlements","volume":"2","author":"Huston G","year":"1999","journal-title":"Part II. Internet Protocol Journal"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"e_1_2_1_22_1","unstructured":"Internet Governance Project. M.L. Mueller. In important case RIPE-NCC seeks legal clarity on how it responds to foreign court orders; http:\/\/www.internetgovernance.org\/2011\/11\/23\/in-important-case-ripe-ncc-seeks-legal-clarity-on-how-it-responds-to-foreign-court-orders\/.  Internet Governance Project. M.L. Mueller. In important case RIPE-NCC seeks legal clarity on how it responds to foreign court orders; http:\/\/www.internetgovernance.org\/2011\/11\/23\/in-important-case-ripe-ncc-seeks-legal-clarity-on-how-it-responds-to-foreign-court-orders\/."},{"key":"e_1_2_1_23_1","unstructured":"Kent S. and Mandelberg D. Suspenders: a fail-safe mechanism for the RPKI. Internet Engineering Task Force 2014; http:\/\/tools.ietf.org\/html\/draft-kent-sidr-suspenders-01.  Kent S. and Mandelberg D. Suspenders: a fail-safe mechanism for the RPKI. Internet Engineering Task Force 2014; http:\/\/tools.ietf.org\/html\/draft-kent-sidr-suspenders-01."},{"key":"e_1_2_1_24_1","unstructured":"LACNIC Labs. RPKI looking glass; www.labs.lacnic.net\/rpkitools\/looking_glass\/.  LACNIC Labs. RPKI looking glass; www.labs.lacnic.net\/rpkitools\/looking_glass\/."},{"key":"e_1_2_1_25_1","unstructured":"Lepinski M. ed. BGPSEC protocol specification. IETF Network Working Group 2014; http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol-05.  Lepinski M. ed. BGPSEC protocol specification. IETF Network Working Group 2014; http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol-05."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Lepinski M. and Kent S. RFC 6480: an infrastructure to support secure Internet routing. Internet Engineering Task Force 2012; http:\/\/tools.ietf.org\/html\/rfc6480.  Lepinski M. and Kent S. RFC 6480: an infrastructure to support secure Internet routing. Internet Engineering Task Force 2012; http:\/\/tools.ietf.org\/html\/rfc6480.","DOI":"10.17487\/rfc6480"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_2_1_28_1","unstructured":"McPherson D. Amante S. Osterweil E. and Mitchell D. eds. Draft. Route leaks and MITM attacks against BGPSEC. IETF Network Working Group 2013; http:\/\/tools.ietf.org\/html\/draft-ietf-grow-simple-leak-attack-bgpsec-no-help-03.  McPherson D. Amante S. Osterweil E. and Mitchell D. eds. Draft. Route leaks and MITM attacks against BGPSEC. IETF Network Working Group 2013; http:\/\/tools.ietf.org\/html\/draft-ietf-grow-simple-leak-attack-bgpsec-no-help-03."},{"key":"e_1_2_1_29_1","unstructured":"Miller R. Court ruling: Israeli and US terrorism victims now \"own\" Iran's Internet. Joshuapundit blog (June 25 2014); http:\/\/joshuapundit.blogspot.com\/2014\/06\/court-ruling-israeli-and-us-terrorism.html.  Miller R. Court ruling: Israeli and US terrorism victims now \"own\" Iran's Internet. Joshuapundit blog (June 25 2014); http:\/\/joshuapundit.blogspot.com\/2014\/06\/court-ruling-israeli-and-us-terrorism.html."},{"key":"e_1_2_1_30_1","first-page":"125","article-title":"Negotiating a new governance hierarchy: an analysis of the conflicting incentives to secure Internet routing","volume":"81","author":"Mueller M.","year":"2011","journal-title":"Communications and Strategies"},{"key":"e_1_2_1_31_1","unstructured":"National Institute of Standards and Technology. RPKI deployment monitor; http:\/\/www-x.antd.nist.gov\/rpki-monitor\/.  National Institute of Standards and Technology. RPKI deployment monitor; http:\/\/www-x.antd.nist.gov\/rpki-monitor\/."},{"key":"e_1_2_1_32_1","unstructured":"Paseka T. Why Google went offline today and a bit about how the Internet works. Cloudflare blog (Nov. 6 2012); http:\/\/blog.cloudflare.com\/why-google-went-offline-today-and-a-bit-about.  Paseka T. Why Google went offline today and a bit about how the Internet works. Cloudflare blog (Nov. 6 2012); http:\/\/blog.cloudflare.com\/why-google-went-offline-today-and-a-bit-about."},{"key":"e_1_2_1_33_1","unstructured":"PeeringDB. 2014; https:\/\/www.peeringdb.com\/.  PeeringDB. 2014; https:\/\/www.peeringdb.com\/."},{"key":"e_1_2_1_34_1","volume-title":"Washington Post (Nov. 20","author":"Peterson A.","year":"2013"},{"key":"e_1_2_1_35_1","unstructured":"Piscitello D. Guidance for preparing domain name orders seizures and takedowns. Thought paper. ICANN (Mar. 2012).  Piscitello D. Guidance for preparing domain name orders seizures and takedowns. Thought paper. ICANN (Mar. 2012)."},{"key":"e_1_2_1_36_1","unstructured":"RIPE Network Coordination Centre. RPKI validator; http:\/\/localcert.ripe.net:8088\/trust-anchors.  RIPE Network Coordination Centre. RPKI validator; http:\/\/localcert.ripe.net:8088\/trust-anchors."},{"key":"e_1_2_1_37_1","unstructured":"RIPE Network Coordination Centre. YouTube hijacking: A RIPE NCC RIS case study. RIPE NCC Blog 2008; http:\/\/www.ripe.net\/internet-coordination\/news\/industry-developments\/youtube-hijacking-a-ripe-ncc-ris-case-study.  RIPE Network Coordination Centre. YouTube hijacking: A RIPE NCC RIS case study. RIPE NCC Blog 2008; http:\/\/www.ripe.net\/internet-coordination\/news\/industry-developments\/youtube-hijacking-a-ripe-ncc-ris-case-study."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Schuchard M.","year":"2012"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.48"},{"key":"e_1_2_1_40_1","unstructured":"Storm D. 17 exploits the NSA uses to hack PCs routers and servers for surveillance. ComputerWorld (Jan. 3 2014); http:\/\/blogs.computerworld.com\/cybercrime-and-hacking\/23347\/17-exploits-nsa-uses-hack-pcs-routers-and-servers-surveillance.  Storm D. 17 exploits the NSA uses to hack PCs routers and servers for surveillance. ComputerWorld (Jan. 3 2014); http:\/\/blogs.computerworld.com\/cybercrime-and-hacking\/23347\/17-exploits-nsa-uses-hack-pcs-routers-and-servers-surveillance."},{"key":"e_1_2_1_41_1","unstructured":"Wang L. Park J. Oliveira R. and Zhang B. Internet AS-level topology archive; http:\/\/irl.cs.ucla.edu\/topology\/.  Wang L. Park J. Oliveira R. and Zhang B. Internet AS-level topology archive; http:\/\/irl.cs.ucla.edu\/topology\/."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:47Z","timestamp":1750231187000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,23]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,9,23]]}},"alternative-id":["10.1145\/2659899"],"URL":"https:\/\/doi.org\/10.1145\/2659899","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,23]]},"assertion":[{"value":"2014-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}