{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:41Z","timestamp":1773117101027,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["OAC-2131987"],"award-info":[{"award-number":["OAC-2131987"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561454","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"730-737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Stop, DROP, and ROA"],"prefix":"10.1145","author":[{"given":"Leo","family":"Oliver","sequence":"first","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Gautam","family":"Akiwate","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Matthew","family":"Luckie","sequence":"additional","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Ben","family":"Du","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"UC San Diego"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Melchior Aelmans Martijn Schmidt and Massimiliano Stucchi. 2019. Slurm file for unallocated and Unassigned RIPE NCC Address Space. https:\/\/www.ripe.net\/participate\/policies\/proposals\/2019-08  Melchior Aelmans Martijn Schmidt and Massimiliano Stucchi. 2019. Slurm file for unallocated and Unassigned RIPE NCC Address Space. https:\/\/www.ripe.net\/participate\/policies\/proposals\/2019-08"},{"key":"e_1_3_2_2_2_1","unstructured":"AFRINIC. 2020. Legacy resource holders. https:\/\/afrinic.net\/membership\/legacy-resource  AFRINIC. 2020. Legacy resource holders. https:\/\/afrinic.net\/membership\/legacy-resource"},{"key":"e_1_3_2_2_3_1","unstructured":"APNIC. 2020. Important notes on the APNIC AS0 ROA. https:\/\/www.apnic.net\/community\/security\/resource-certification\/apnic-limitations-of-liability-for-rpki-2\/.  APNIC. 2020. Important notes on the APNIC AS0 ROA. https:\/\/www.apnic.net\/community\/security\/resource-certification\/apnic-limitations-of-liability-for-rpki-2\/."},{"key":"e_1_3_2_2_4_1","unstructured":"APNIC. 2020. Prop-132: RPKI ROAs for Unallocated and Unassigned APNIC Address Space (Was: AS0 for Bogons). https:\/\/www.apnic.net\/community\/policy\/proposals\/prop-132.  APNIC. 2020. Prop-132: RPKI ROAs for Unallocated and Unassigned APNIC Address Space (Was: AS0 for Bogons). https:\/\/www.apnic.net\/community\/policy\/proposals\/prop-132."},{"key":"e_1_3_2_2_5_1","unstructured":"APNIC. 2022. RIR statistics exchange format. https:\/\/www.apnic.net\/about-apnic\/corporate-documents\/documents\/resource-guidelines\/rir-statistics-exchange-format\/.  APNIC. 2022. RIR statistics exchange format. https:\/\/www.apnic.net\/about-apnic\/corporate-documents\/documents\/resource-guidelines\/rir-statistics-exchange-format\/."},{"key":"e_1_3_2_2_6_1","unstructured":"ARIN. 2022. Services available to organizations holding Legacy Resources. https:\/\/www.arin.net\/resources\/guide\/legacy\/services\/  ARIN. 2022. Services available to organizations holding Legacy Resources. https:\/\/www.arin.net\/resources\/guide\/legacy\/services\/"},{"key":"e_1_3_2_2_7_1","unstructured":"Rob Austein Steven Bellovin Russ Housley Stephen Kent Warren Kumari Doug Montgomery Chris Morrow Sandy Murphy Keyur Patel John Scudder Samuel Weiler Matthew Lepinski and Kotikalapudi Sriram. 2017. BGPsec Protocol Specification. RFC 8205.  Rob Austein Steven Bellovin Russ Housley Stephen Kent Warren Kumari Doug Montgomery Chris Morrow Sandy Murphy Keyur Patel John Scudder Samuel Weiler Matthew Lepinski and Kotikalapudi Sriram. 2017. BGPsec Protocol Specification. RFC 8205."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Hitesh Ballani Paul Francis and Xinyang Zhang. 2007. A Study of Prefix Hijacking and Interception in the Internet. In SIGCOMM. 265--276.  Hitesh Ballani Paul Francis and Xinyang Zhang. 2007. A Study of Prefix Hijacking and Interception in the Internet. In SIGCOMM. 265--276.","DOI":"10.1145\/1282427.1282411"},{"key":"e_1_3_2_2_9_1","unstructured":"Shinyoung Cho Romain Fontugne Kenjiro Cho Alberto Dainotti and Phillipa Gill. 2019. BGP Hijacking Classification. In TMA. 25--32.  Shinyoung Cho Romain Fontugne Kenjiro Cho Alberto Dainotti and Phillipa Gill. 2019. BGP Hijacking Classification. In TMA . 25--32."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Taejoong Chung Emile Aben Tim Bruijnzeels Balakrishnan Chandrasekaran David Choffnes Dave Levin Bruce M. Maggs Alan Mislove Roland van Rijswijk-Deij John Rula and Nick Sullivan. 2019. RPKI Is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In IMC. 406--419.  Taejoong Chung Emile Aben Tim Bruijnzeels Balakrishnan Chandrasekaran David Choffnes Dave Levin Bruce M. Maggs Alan Mislove Roland van Rijswijk-Deij John Rula and Nick Sullivan. 2019. RPKI Is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. In IMC. 406--419.","DOI":"10.1145\/3355369.3355596"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Avichai Cohen Yossi Gilad Amir Herzberg and Michael Schapira. 2016. Jump-starting BGP Security with Path-End Validation. In SIGCOMM. 342--355.  Avichai Cohen Yossi Gilad Amir Herzberg and Michael Schapira. 2016. Jump-starting BGP Security with Path-End Validation. In SIGCOMM. 342--355.","DOI":"10.1145\/2934872.2934883"},{"key":"e_1_3_2_2_12_1","unstructured":"Owen DeLong. 2019. prop-132-v002: AS0 for Bogons. https:\/\/mailman.apnic.net\/mailing-lists\/sig-policy\/archive\/2019\/08\/msg00064.html  Owen DeLong. 2019. prop-132-v002: AS0 for Bogons. https:\/\/mailman.apnic.net\/mailing-lists\/sig-policy\/archive\/2019\/08\/msg00064.html"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Ben Du Gautam Akiwate Thomas Krenc Cecilia Testart Alexander Marder Bradley Huffaker Alex C Snoeren and KC Claffy. 2022. IRR Hygiene in the RPKI Era. In PAM. 321--337.  Ben Du Gautam Akiwate Thomas Krenc Cecilia Testart Alexander Marder Bradley Huffaker Alex C Snoeren and KC Claffy. 2022. IRR Hygiene in the RPKI Era. In PAM. 321--337.","DOI":"10.1007\/978-3-030-98785-5_14"},{"key":"e_1_3_2_2_14_1","unstructured":"Y. Gilad S. Goldberg K. Sriram J. Snijders and B.Maddison. 2022. The Use of maxLength in the RPKI. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-rpkimaxlen-15.  Y. Gilad S. Goldberg K. Sriram J. Snijders and B.Maddison. 2022. The Use of maxLength in the RPKI. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-rpkimaxlen-15."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Yossi Gilad Omar Sagga and Sharon Goldberg. 2017. MaxLength Considered Harmful to the RPKI. In CoNEXT. 101--107.  Yossi Gilad Omar Sagga and Sharon Goldberg. 2017. MaxLength Considered Harmful to the RPKI. In CoNEXT. 101--107.","DOI":"10.1145\/3143361.3143363"},{"key":"e_1_3_2_2_16_1","volume-title":"Jordi Palet Martinez, and Haitham El Nakhal Hytham","author":"Habicht Frank","year":"2022","unstructured":"Frank Habicht , Mark Elkins , Jordi Palet Martinez, and Haitham El Nakhal Hytham . 2022 . RPKI ROAs for Unallocated and Unassigned AFRINIC Address Space (Draft 3). https:\/\/afrinic.net\/policy\/proposals\/2019-gen-006-d3 Frank Habicht, Mark Elkins, Jordi Palet Martinez, and Haitham El Nakhal Hytham. 2022. RPKI ROAs for Unallocated and Unassigned AFRINIC Address Space (Draft 3). https:\/\/afrinic.net\/policy\/proposals\/2019-gen-006-d3"},{"key":"e_1_3_2_2_17_1","volume-title":"Accurate Real-time Identification of IP Prefix Hijacking","author":"Hu Xin","unstructured":"Xin Hu and Z. Morley Mao . 2007. Accurate Real-time Identification of IP Prefix Hijacking . In IEEE S &P. 3--17. Xin Hu and Z. Morley Mao. 2007. Accurate Real-time Identification of IP Prefix Hijacking. In IEEE S&P. 3--17."},{"key":"e_1_3_2_2_18_1","volume-title":"Michaelson","author":"Huston Geoff","year":"2012","unstructured":"Geoff Huston and George G . Michaelson . 2012 . Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC 6483. Geoff Huston and George G. Michaelson. 2012. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC 6483."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"e_1_3_2_2_20_1","unstructured":"IRR. 2022. Internet Routing Registry. https:\/\/www.irr.net\/.  IRR. 2022. Internet Routing Registry. https:\/\/www.irr.net\/."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Varun Khare Qing Ju and Beichuan Zhang. 2012. Concurrent Prefix Hijacks: Occurrence and Impacts. In IMC. 29--36.  Varun Khare Qing Ju and Beichuan Zhang. 2012. Concurrent Prefix Hijacks: Occurrence and Impacts. In IMC . 29--36.","DOI":"10.1145\/2398776.2398780"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Maria Konte Roberto Perdisci and Nick Feamster. 2015. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes. In SIGCOMM. 625--638.  Maria Konte Roberto Perdisci and Nick Feamster. 2015. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes. In SIGCOMM. 625--638.","DOI":"10.1145\/2829988.2787494"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Christopher Kruegel Darren Mutz William Robertson and Fredrik Valeur. 2003. Topology-Based Detection of Anomalous BGP Messages. In RAID. 17--35.  Christopher Kruegel Darren Mutz William Robertson and Fredrik Valeur. 2003. Topology-Based Detection of Anomalous BGP Messages. In RAID . 17--35.","DOI":"10.1007\/978-3-540-45248-5_2"},{"key":"e_1_3_2_2_24_1","unstructured":"LACNIC. 2022. LACNIC Legacy resources. https:\/\/www.lacnic.net\/660\/2\/lacnic\/legacy-resources  LACNIC. 2022. LACNIC Legacy resources. https:\/\/www.lacnic.net\/660\/2\/lacnic\/legacy-resources"},{"key":"e_1_3_2_2_25_1","unstructured":"LACNIC. 2022. LACNIC RPKI. https:\/\/www.lacnic.net\/640\/2\/lacnic\/resource-certification-system-rpki  LACNIC. 2022. LACNIC RPKI. https:\/\/www.lacnic.net\/640\/2\/lacnic\/resource-certification-system-rpki"},{"key":"e_1_3_2_2_26_1","volume-title":"PHAS: A Prefix Hijack Alert System. In USENIX Security.","author":"Lad Mohit","year":"2006","unstructured":"Mohit Lad , Dan Massey , Dan Pei , Yiguo Wu , Beichuan Zhang , and Lixia Zhang . 2006 . PHAS: A Prefix Hijack Alert System. In USENIX Security. Mohit Lad, Dan Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, and Lixia Zhang. 2006. PHAS: A Prefix Hijack Alert System. In USENIX Security."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Matt Lepinski and Stephen Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480.  Matt Lepinski and Stephen Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480.","DOI":"10.17487\/rfc6480"},{"key":"e_1_3_2_2_28_1","volume-title":"Clairvoyance: Inferring Blocklist Use on the Internet. In PAM. 57--75.","author":"Li Vector Guo","year":"2021","unstructured":"Vector Guo Li , Gautam Akiwate , Kirill Levchenko , Geoffrey M. Voelker , and Stefan Savage . 2021 . Clairvoyance: Inferring Blocklist Use on the Internet. In PAM. 57--75. Vector Guo Li, Gautam Akiwate, Kirill Levchenko, Geoffrey M. Voelker, and Stefan Savage. 2021. Clairvoyance: Inferring Blocklist Use on the Internet. In PAM. 57--75."},{"key":"e_1_3_2_2_29_1","unstructured":"Vector Guo Li Matthew Dunn Paul Pearce Damon McCoy Geoffrey M. Voelker Stefan Savage and Kirill Levchenko. 2019. Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence. In USENIX Security. 851--867.  Vector Guo Li Matthew Dunn Paul Pearce Damon McCoy Geoffrey M. Voelker Stefan Savage and Kirill Levchenko. 2019. Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence. In USENIX Security. 851--867."},{"key":"e_1_3_2_2_30_1","unstructured":"Marc Lindsey. 2010. Protect Your Pre-1997 IP Address. https:\/\/www.computerworld.com\/article\/2514777\/protect-your-pre-1997-ip-address.html.  Marc Lindsey. 2010. Protect Your Pre-1997 IP Address. https:\/\/www.computerworld.com\/article\/2514777\/protect-your-pre-1997-ip-address.html."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Ratul Mahajan David Wetherall and Tom Anderson. 2002. Understanding BGP Misconfiguration. In SIGCOMM. 3--16.  Ratul Mahajan David Wetherall and Tom Anderson. 2002. Understanding BGP Misconfiguration. In SIGCOMM. 3--16.","DOI":"10.1145\/964725.633027"},{"key":"e_1_3_2_2_32_1","unstructured":"Augusto Luciano Mathurin. 2020. What's the AS0 ROA Policy and What Should I Know as a Network Operator? https:\/\/www.manrs.org\/2020\/12\/whats-the-as0-roa-policy-and-what-should-i-know-as-a-network-operator\/.  Augusto Luciano Mathurin. 2020. What's the AS0 ROA Policy and What Should I Know as a Network Operator? https:\/\/www.manrs.org\/2020\/12\/whats-the-as0-roa-policy-and-what-should-i-know-as-a-network-operator\/."},{"key":"e_1_3_2_2_33_1","unstructured":"Merit Network. 2021. The Internet Routing Registry - RADb. https:\/\/www.radb.net\/  Merit Network. 2021. The Internet Routing Registry - RADb. https:\/\/www.radb.net\/"},{"key":"e_1_3_2_2_34_1","unstructured":"George Michaelson. 2020. Demystifying AS0. https:\/\/conference.apnic.net\/52\/assets\/files\/APBS588\/demystifying-as0.pdf.  George Michaelson. 2020. Demystifying AS0. https:\/\/conference.apnic.net\/52\/assets\/files\/APBS588\/demystifying-as0.pdf."},{"key":"e_1_3_2_2_35_1","unstructured":"George Michaelson. 2020. The two types of AS0. https:\/\/blog.apnic.net\/2020\/11\/23\/the-two-types-of-as0\/.  George Michaelson. 2020. The two types of AS0. https:\/\/blog.apnic.net\/2020\/11\/23\/the-two-types-of-as0\/."},{"key":"e_1_3_2_2_36_1","unstructured":"NIST. 2022. RPKI Monitor. https:\/\/rpki-monitor.antd.nist.gov\/.  NIST. 2022. RPKI Monitor. https:\/\/rpki-monitor.antd.nist.gov\/."},{"key":"e_1_3_2_2_37_1","volume-title":"cleanup efforts needed","author":"Efremov Ostap","unstructured":"Ostap Efremov . 2021. 196.52.0.0\/14 revoked , cleanup efforts needed . RIPE NCC Anti-Abuse Working Group . https:\/\/www.ripe.net\/participate\/mail\/forum\/anti-abuse-wg\/PENBT0dHenF6bUcwd1VOYnNZbz1oamQ9K1JjTmFvc09XR0xOMGpxV0JnVEpteFBocFItQUBtYWlsLmdtYWlsLmNvbT4= Ostap Efremov. 2021. 196.52.0.0\/14 revoked, cleanup efforts needed. RIPE NCC Anti-Abuse Working Group. https:\/\/www.ripe.net\/participate\/mail\/forum\/anti-abuse-wg\/PENBT0dHenF6bUcwd1VOYnNZbz1oamQ9K1JjTmFvc09XR0xOMGpxV0JnVEpteFBocFItQUBtYWlsLmdtYWlsLmNvbT4="},{"key":"e_1_3_2_2_38_1","unstructured":"Ricardo Patara and Aftab Sidiqui. 2020. RPKI ASN 0 ROA Policy. https:\/\/politicas.lacnic.net\/politicas\/detail\/id\/LAC-2019-12\/language\/en  Ricardo Patara and Aftab Sidiqui. 2020. RPKI ASN 0 ROA Policy. https:\/\/politicas.lacnic.net\/politicas\/detail\/id\/LAC-2019-12\/language\/en"},{"key":"e_1_3_2_2_39_1","unstructured":"Amresh Phokeer. 2019. AS0 Support in AFRINIC RPKI. https:\/\/afrinic.net\/blog\/457-aso-support-in-afrinic-rpki.  Amresh Phokeer. 2019. AS0 Support in AFRINIC RPKI. https:\/\/afrinic.net\/blog\/457-aso-support-in-afrinic-rpki."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Jian Qiu Lixin Gao Supranamaya Ranjan and Antonio Nucci. 2007. Detecting Bogus BGP Route Information: Going beyond Prefix Hijacking. In SecureComm. 381--390.  Jian Qiu Lixin Gao Supranamaya Ranjan and Antonio Nucci. 2007. Detecting Bogus BGP Route Information: Going beyond Prefix Hijacking. In SecureComm. 381--390.","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"e_1_3_2_2_41_1","unstructured":"RADb. 2022. RADb Archive. ftp:\/\/ftp.radb.net.  RADb. 2022. RADb Archive. ftp:\/\/ftp.radb.net."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Anirudh Ramachandran and Nick Feamster. 2006. Understanding the Network-Level Behavior of Spammers. In SIGCOMM. 291--302.  Anirudh Ramachandran and Nick Feamster. 2006. Understanding the Network-Level Behavior of Spammers. In SIGCOMM. 291--302.","DOI":"10.1145\/1151659.1159947"},{"key":"e_1_3_2_2_43_1","unstructured":"RIPE. 2021. Resource Certification (RPKI) for Provider Independent End Users and Legacy End Users. https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/rpki\/resource-certification-rpki-for-provider-independent-end-users  RIPE. 2021. Resource Certification (RPKI) for Provider Independent End Users and Legacy End Users. https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/rpki\/resource-certification-rpki-for-provider-independent-end-users"},{"key":"e_1_3_2_2_44_1","unstructured":"RIPE. 2022. RIPE RPKI Archive. https:\/\/ftp.ripe.net\/ripe\/rpki\/.  RIPE. 2022. RIPE RPKI Archive. https:\/\/ftp.ripe.net\/ripe\/rpki\/."},{"key":"e_1_3_2_2_45_1","unstructured":"Ronald F. Guilmette. 2019. Cogent & FDCServers: Knowingly aiding and abetting fraud and theft? https:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-September\/102963.html  Ronald F. Guilmette. 2019. Cogent & FDCServers: Knowingly aiding and abetting fraud and theft? https:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-September\/102963.html"},{"key":"e_1_3_2_2_46_1","unstructured":"Sanjaya. 2021. RPKI services now available to APNIC historical resource holders. https:\/\/blog.apnic.net\/2021\/03\/26\/rpki-services-now-available-to-apnic-historical-resource-holders\/  Sanjaya. 2021. RPKI services now available to APNIC historical resource holders. https:\/\/blog.apnic.net\/2021\/03\/26\/rpki-services-now-available-to-apnic-historical-resource-holders\/"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869798"},{"key":"e_1_3_2_2_48_1","unstructured":"Spamhaus. 2022. DROP - Don't Route or Peer. https:\/\/www.spamhaus.org\/drop\/.  Spamhaus. 2022. DROP - Don't Route or Peer. https:\/\/www.spamhaus.org\/drop\/."},{"key":"e_1_3_2_2_49_1","unstructured":"Spamhaus. 2022. DROP (FAQ). https:\/\/www.spamhaus.org\/faq\/.  Spamhaus. 2022. DROP (FAQ). https:\/\/www.spamhaus.org\/faq\/."},{"key":"e_1_3_2_2_50_1","unstructured":"Spamhaus. 2022. SBL - Spamhaus Blocklist. https:\/\/www.spamhaus.org\/sbl\/.  Spamhaus. 2022. SBL - Spamhaus Blocklist. https:\/\/www.spamhaus.org\/sbl\/."},{"key":"e_1_3_2_2_51_1","volume-title":"Big-foot: A Geo-Based Visualization Methodology for Detecting BGP Threats. In IEEE Symposium on Visualization for Cyber Security (VizSec). 1--8.","author":"Syamkumar Meenakshi","year":"2016","unstructured":"Meenakshi Syamkumar , Ramakrishnan Durairajan , and Paul Barford . 2016 . Big-foot: A Geo-Based Visualization Methodology for Detecting BGP Threats. In IEEE Symposium on Visualization for Cyber Security (VizSec). 1--8. Meenakshi Syamkumar, Ramakrishnan Durairajan, and Paul Barford. 2016. Big-foot: A Geo-Based Visualization Methodology for Detecting BGP Threats. In IEEE Symposium on Visualization for Cyber Security (VizSec). 1--8."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Cecilia Testart Philipp Richter Alistair King Alberto Dainotti and David Clark. 2019. Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. In IMC. 420--434.  Cecilia Testart Philipp Richter Alistair King Alberto Dainotti and David Clark. 2019. Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. In IMC. 420--434.","DOI":"10.1145\/3355369.3355581"},{"key":"e_1_3_2_2_53_1","unstructured":"Andree Toonk. 2013. Looking at the spamhaus DDOS from a BGP perspective. https:\/\/www.bgpmon.net\/looking-at-the-spamhouse-ddos-from-a-bgp-perspective\/  Andree Toonk. 2013. Looking at the spamhaus DDOS from a BGP perspective. https:\/\/www.bgpmon.net\/looking-at-the-spamhouse-ddos-from-a-bgp-perspective\/"},{"key":"e_1_3_2_2_54_1","unstructured":"Andree Toonk. 2014. Using BGP data to find Spammers. https:\/\/bgpmon.net\/using-bgp-data-to-find-spammers\/.  Andree Toonk. 2014. Using BGP data to find Spammers. https:\/\/bgpmon.net\/using-bgp-data-to-find-spammers\/."},{"key":"e_1_3_2_2_55_1","unstructured":"Costa Tsaousis. 2022. FireHOL IP Lists | IP Blacklists | IP Reputation Feeds. http:\/\/iplists.firehol.org\/.  Costa Tsaousis. 2022. FireHOL IP Lists | IP Blacklists | IP Reputation Feeds. http:\/\/iplists.firehol.org\/."},{"key":"e_1_3_2_2_56_1","unstructured":"Jan Vermeulen. 2019. The Big South African IP Address Heist - How Millions Are Made on the \"Grey\" Market. https:\/\/mybroadband.co.za\/news\/internet\/318205-the-big-south-african-ip-address-heist-how-millions-are-made-on-the-grey-market.html.  Jan Vermeulen. 2019. The Big South African IP Address Heist - How Millions Are Made on the \"Grey\" Market. https:\/\/mybroadband.co.za\/news\/internet\/318205-the-big-south-african-ip-address-heist-how-millions-are-made-on-the-grey-market.html."},{"key":"e_1_3_2_2_57_1","unstructured":"Jan Vermeulen. 2019. How Internet Resources Worth R800 Million Were Stolen and Sold on the Black Market. https:\/\/mybroadband.co.za\/news\/internet\/330379-how-internet-resources-worth-r800-million-were-stolen-and-sold-on-the-black-market.html.  Jan Vermeulen. 2019. How Internet Resources Worth R800 Million Were Stolen and Sold on the Black Market. https:\/\/mybroadband.co.za\/news\/internet\/330379-how-internet-resources-worth-r800-million-were-stolen-and-sold-on-the-black-market.html."},{"key":"e_1_3_2_2_58_1","unstructured":"Jan Vermeulen. 2021. Afrinic Bank Accounts Frozen after R740 Million Damages Claim. https:\/\/mybroadband.co.za\/news\/internet\/407770-afrinic-bank-accounts-frozen-after-r740-million-damages-claim.html.  Jan Vermeulen. 2021. Afrinic Bank Accounts Frozen after R740 Million Damages Claim. https:\/\/mybroadband.co.za\/news\/internet\/407770-afrinic-bank-accounts-frozen-after-r740-million-damages-claim.html."},{"key":"e_1_3_2_2_59_1","unstructured":"Jan Vermeulen. 2021. Internet Addresses Worth R1.8 Billion Seized. https:\/\/mybroadband.co.za\/news\/internet\/405640-internet-addresses-worth-r1-8-billion-seized.html.  Jan Vermeulen. 2021. Internet Addresses Worth R1.8 Billion Seized. https:\/\/mybroadband.co.za\/news\/internet\/405640-internet-addresses-worth-r1-8-billion-seized.html."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"Pierre-Antoine Vervier Olivier Thonnard and Marc Dacier. 2015. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS.  Pierre-Antoine Vervier Olivier Thonnard and Marc Dacier. 2015. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS.","DOI":"10.14722\/ndss.2015.23035"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377702"},{"key":"e_1_3_2_2_62_1","volume-title":"Wishnick","author":"Yoo Christopher S.","year":"2019","unstructured":"Christopher S. Yoo and David A . Wishnick . 2019 . Lowering Legal Barriers to RPKI Adoption. U of Penn Law School, Public Law Research Paper No . 19-02, https:\/\/ssrn.com\/abstract=3308619. Christopher S. Yoo and David A. Wishnick. 2019. Lowering Legal Barriers to RPKI Adoption. U of Penn Law School, Public Law Research Paper No. 19-02, https:\/\/ssrn.com\/abstract=3308619."}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561454","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561454"}},"subtitle":["effectiveness of defenses through the lens of DROP"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":62,"alternative-id":["10.1145\/3517745.3561454","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561454","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}