{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:15Z","timestamp":1750306575854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Center for Industrial Information Technology (CENIIT)"},{"name":"Swedish National Graduate School in Computer Science (CUGS)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2663876.2663879","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PrefiSec"],"prefix":"10.1145","author":[{"given":"Rahul","family":"Hiran","sequence":"first","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nahid","family":"Shahmehri","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"e_1_3_2_1_2_1","volume-title":"Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard)","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , D. Massey , and S. Rose . Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard) , 2005 . R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard), 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993083.1993085"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644934"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.19"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560075"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535787"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2005.80"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016709"},{"key":"e_1_3_2_1_14_1","volume-title":"IETF","author":"Fernando R.","year":"2012","unstructured":"R. Fernando and S. Stuart . BGP Monitoring Protocol . IETF , 2012 . R. Fernando and S. Stuart. BGP Monitoring Protocol. IETF, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11407386_10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614187"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. NSDI","author":"Gupta A.","year":"2004","unstructured":"A. Gupta , B. Liskov , and R. Rodrigues . Efficient routing for peer-to-peer overlays . In Proc. NSDI , San Francisco, CA , 2004 . A. Gupta, B. Liskov, and R. Rodrigues. Efficient routing for peer-to-peer overlays. In Proc. NSDI, San Francisco, CA, 2004."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. NSDI","author":"Haeberlen A.","year":"2009","unstructured":"A. Haeberlen , I. Avramopoulos , J. Rexford , and P. Druschel . NetReview: Detecting when interdomain routing goes wrong . In Proc. NSDI , 2009 . A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proc. NSDI, 2009."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571861"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251120"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. USENIX Security Symp.","author":"Lad M.","year":"2006","unstructured":"M. Lad , D. Massey , D. Pei , Y. Wu , B. Zhang , and L. Zhang . PHAS: a prefix hijack alert system . In Proc. USENIX Security Symp. , 2006 . M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. PHAS: a prefix hijack alert system. In Proc. USENIX Security Symp., 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"IETF","author":"Lepinski M.","year":"2013","unstructured":"M. Lepinski . BGPSEC protocol specification . IETF , 2013 . M. Lepinski. BGPSEC protocol specification. IETF, 2013."},{"key":"e_1_3_2_1_25_1","volume-title":"An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational)","author":"Lepinski M.","year":"2012","unstructured":"M. Lepinski and S. Kent . An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational) , 2012 . M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational), 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. OSDI","author":"Madhyastha H.","year":"2006","unstructured":"H. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane: An information plane for distributed services . In Proc. OSDI , 2006 . H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An information plane for distributed services. In Proc. OSDI, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_31_1","volume-title":"Evaluating the potential of collaborative anomaly detection. Technical report","author":"Ringberg H.","year":"2008","unstructured":"H. Ringberg , A. Soule , and M. Caesar . Evaluating the potential of collaborative anomaly detection. Technical report , 2008 . H. Ringberg, A. Soule, and M. Caesar. Evaluating the potential of collaborative anomaly detection. Technical report, 2008."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. ConTEL","author":"Shavitt Y.","year":"2009","unstructured":"Y. Shavitt , E. Shir , and U. Weinsberg . Near-deterministic inference of AS relationships . In Proc. ConTEL , 2009 . Y. Shavitt, E. Shir, and U. Weinsberg. Near-deterministic inference of AS relationships. In Proc. ConTEL, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"volume-title":"2013 Internet Security Threat Report","year":"2013","key":"e_1_3_2_1_34_1","unstructured":"Symantec. 2013 Internet Security Threat Report , 2013 . Symantec. 2013 Internet Security Threat Report, 2013."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111007"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402996"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282412"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM Workshop on Information Sharing &amp; Collaborative Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663876.2663879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663876.2663879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:34Z","timestamp":1750227214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663876.2663879"}},"subtitle":["A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":38,"alternative-id":["10.1145\/2663876.2663879","10.1145\/2663876"],"URL":"https:\/\/doi.org\/10.1145\/2663876.2663879","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}