{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:20:19Z","timestamp":1769840419545,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2247810"],"award-info":[{"award-number":["2247810"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016745","name":"Comcast","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016745","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,7]]},"DOI":"10.1145\/3607505.3607509","type":"proceedings-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T16:33:41Z","timestamp":1692635621000},"page":"41-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["BGPy: The BGP Python Security Simulator"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5459-6510","authenticated-orcid":false,"given":"Justin","family":"Furuness","sequence":"first","affiliation":[{"name":"University of Connecticut, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0383-4314","authenticated-orcid":false,"given":"Cameron","family":"Morris","sequence":"additional","affiliation":[{"name":"University of Connecticut, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0144-5090","authenticated-orcid":false,"given":"Reynaldo","family":"Morillo","sequence":"additional","affiliation":[{"name":"University of Connecticut, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5586-5261","authenticated-orcid":false,"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[{"name":"University of Connecticut, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7632-6512","authenticated-orcid":false,"given":"Bing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Connecticut, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of ACM IMC.","author":"Anwar Ruwaifa","year":"2015","unstructured":"Ruwaifa Anwar , Haseeb Niaz , David Choffnes , Italo Cunha , Phillipa Gill , and Ethan Katz-Bassett . 2015 . Investigating Interdomain Routing Policies in the Wild . In Proc. of ACM IMC. Ruwaifa Anwar, Haseeb Niaz, David Choffnes, Italo Cunha, Phillipa Gill, and Ethan Katz-Bassett. 2015. Investigating Interdomain Routing Policies in the Wild. In Proc. of ACM IMC."},{"key":"e_1_3_2_1_2_1","unstructured":"The NetworkX\u00a0Developers Aric\u00a0Hagberg. 2022. Graphviz. https:\/\/graphviz.org\/  The NetworkX\u00a0Developers Aric\u00a0Hagberg. 2022. Graphviz. https:\/\/graphviz.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2022. BGP AS_PATH Verification Based on Resource Public Key Infrastructure (RPKI) Autonomous System Provider Authorization (ASPA) Objects. Internet-Draft draft-ietf-sidrops-aspa-verification-09. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-verification\/09\/ Work in Progress.  Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2022. BGP AS_PATH Verification Based on Resource Public Key Infrastructure (RPKI) Autonomous System Provider Authorization (ASPA) Objects. Internet-Draft draft-ietf-sidrops-aspa-verification-09. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-verification\/09\/ Work in Progress."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of ACM SIGCOMM. 265\u2013276","author":"Ballani Hitesh","year":"2007","unstructured":"Hitesh Ballani , Paul Francis , and Xinyang Zhang . 2007 . A Study of Prefix Hijacking and Interception in the Internet . In Proc. of ACM SIGCOMM. 265\u2013276 . https:\/\/doi.org\/10.1145\/1282380.1282411 10.1145\/1282380.1282411 Hitesh Ballani, Paul Francis, and Xinyang Zhang. 2007. A Study of Prefix Hijacking and Interception in the Internet. In Proc. of ACM SIGCOMM. 265\u2013276. https:\/\/doi.org\/10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_5_1","unstructured":"Tony Bates Geoff Huston and Philip Smith. [n. d.]. CIDR REPORT for 15 May 23. https:\/\/www.cidr-report.org\/as2.0\/  Tony Bates Geoff Huston and Philip Smith. [n. d.]. CIDR REPORT for 15 May 23. https:\/\/www.cidr-report.org\/as2.0\/"},{"key":"e_1_3_2_1_6_1","unstructured":"BGPStream. 2018. BGPMON\u2019s BGP Stream incident alert service. https:\/\/bgpstream.com.  BGPStream. 2018. BGPMON\u2019s BGP Stream incident alert service. https:\/\/bgpstream.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Jay Borkenhagen. 2019. AT&T\/as7018 now drops invalid prefixes from peers. Email. https:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-February\/099501.html NANOG Mailing List Archive.  Jay Borkenhagen. 2019. AT&T\/as7018 now drops invalid prefixes from peers. Email. https:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-February\/099501.html NANOG Mailing List Archive."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_1_9_1","unstructured":"CAIDA. [n. d.]. CAIDA BGPStream twitter. https:\/\/twitter.com\/bgpstream\/.  CAIDA. [n. d.]. CAIDA BGPStream twitter. https:\/\/twitter.com\/bgpstream\/."},{"key":"e_1_3_2_1_10_1","unstructured":"CAIDA. 2016. The CAIDA AS Relationships Dataset. http:\/\/www.caida.org\/data\/as-relationships\/.  CAIDA. 2016. The CAIDA AS Relationships Dataset. http:\/\/www.caida.org\/data\/as-relationships\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of SIGCOMM. ACM.","author":"Chan Haowen","year":"2006","unstructured":"Haowen Chan , Debabrata Dash , Adrian Perrig , and Hui Zhang . 2006 . Modeling Adoptability of Secure BGP Protocols . In Proc. of SIGCOMM. ACM. Haowen Chan, Debabrata Dash, Adrian Perrig, and Hui Zhang. 2006. Modeling Adoptability of Secure BGP Protocols. In Proc. of SIGCOMM. ACM."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2014 ACM SIGCOMM conference on computer and communications security. ACM, 103\u2013114","author":"Chen Zhiguo","year":"2014","unstructured":"Zhiguo Chen , Xin Wang , Rui Zhang , Vern Paxson , and Stefan Savage . 2014 . Characterizing and detecting malicious behavior in bgp routing . In Proceedings of the 2014 ACM SIGCOMM conference on computer and communications security. ACM, 103\u2013114 . Zhiguo Chen, Xin Wang, Rui Zhang, Vern Paxson, and Stefan Savage. 2014. Characterizing and detecting malicious behavior in bgp routing. In Proceedings of the 2014 ACM SIGCOMM conference on computer and communications security. ACM, 103\u2013114."},{"key":"e_1_3_2_1_13_1","volume-title":"Modeling and analyzing the convergence property of the BGP routing protocol in SPIN. Telecommunication Systems 58 (03","author":"Chen Zhe","year":"2015","unstructured":"Zhe Chen , Daqiang Zhang , and Yinxue Ma. 2015. Modeling and analyzing the convergence property of the BGP routing protocol in SPIN. Telecommunication Systems 58 (03 2015 ). https:\/\/doi.org\/10.1007\/s11235-014-9870-y 10.1007\/s11235-014-9870-y Zhe Chen, Daqiang Zhang, and Yinxue Ma. 2015. Modeling and analyzing the convergence property of the BGP routing protocol in SPIN. Telecommunication Systems 58 (03 2015). https:\/\/doi.org\/10.1007\/s11235-014-9870-y"},{"key":"e_1_3_2_1_14_1","unstructured":"Cloudflare. 2023. Is BGP Safe Yet?https:\/\/isbgpsafeyet.com\/  Cloudflare. 2023. Is BGP Safe Yet?https:\/\/isbgpsafeyet.com\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of ACM SIGCOMM. ACM, 342\u2013355","author":"Cohen Avichai","year":"2016","unstructured":"Avichai Cohen , Yossi Gilad , Amir Herzberg , and Michael Schapira . 2016 . Jumpstarting BGP security with path-end validation . In Proc. of ACM SIGCOMM. ACM, 342\u2013355 . Avichai Cohen, Yossi Gilad, Amir Herzberg, and Michael Schapira. 2016. Jumpstarting BGP security with path-end validation. In Proc. of ACM SIGCOMM. ACM, 342\u2013355."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"J.H. Cowie D.M. Nicol and A.T. Ogielski. 1999. Modeling the global Internet. Computing in Science & Engineering 1 1 (1999).  J.H. Cowie D.M. Nicol and A.T. Ogielski. 1999. Modeling the global Internet. Computing in Science & Engineering 1 1 (1999).","DOI":"10.1109\/5992.743621"},{"key":"e_1_3_2_1_18_1","first-page":"158","article-title":"SSFNet: A Scalable Simulation Framework for BGP","volume":"26","author":"Dimitropoulos Christos","year":"2008","unstructured":"Christos Dimitropoulos and Greg Riley . 2008 . SSFNet: A Scalable Simulation Framework for BGP . IEEE Journal on Selected Areas in Communications 26 , 1 (2008), 158 \u2013 167 . https:\/\/doi.org\/10.1109\/JSAC.2007.357111 10.1109\/JSAC.2007.357111 Christos Dimitropoulos and Greg Riley. 2008. SSFNet: A Scalable Simulation Framework for BGP. IEEE Journal on Selected Areas in Communications 26, 1 (2008), 158\u2013167. https:\/\/doi.org\/10.1109\/JSAC.2007.357111","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.033"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2004 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. ACM, 191\u2013202","author":"Feamster Nick","year":"2004","unstructured":"Nick Feamster , Jonathan Winick , and John Rexford . 2004 . A model of BGP routing for network engineering . In Proceedings of the 2004 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. ACM, 191\u2013202 . https:\/\/doi.org\/10.1145\/1012888.1005726 10.1145\/1012888.1005726 Nick Feamster, Jonathan Winick, and John Rexford. 2004. A model of BGP routing for network engineering. In Proceedings of the 2004 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. ACM, 191\u2013202. https:\/\/doi.org\/10.1145\/1012888.1005726"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.826367"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. Applied Telecommunications Symposium, ATS\u201904 (01","author":"Feng Tony","year":"2004","unstructured":"Tony Feng and Rob Ballantyne . 2004 . Implementation of bgp in a network simulator . Proc. Applied Telecommunications Symposium, ATS\u201904 (01 2004). Tony Feng and Rob Ballantyne. 2004. Implementation of bgp in a network simulator. Proc. Applied Telecommunications Symposium, ATS\u201904 (01 2004)."},{"key":"e_1_3_2_1_23_1","unstructured":"Python\u00a0Software Foundation. 2023. Python 3.11. https:\/\/www.python.org\/downloads\/release\/python-311\/  Python\u00a0Software Foundation. 2023. Python 3.11. https:\/\/www.python.org\/downloads\/release\/python-311\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/90.974523","article-title":"Stable Internet Routing without Global Coordination","volume":"9","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao and Jennifer Rexford . 2001 . Stable Internet Routing without Global Coordination . IEEE\/ACM Trans. Netw. 9 , 6 (dec 2001), 681\u2013692. https:\/\/doi.org\/10.1109\/90.974523 10.1109\/90.974523 Lixin Gao and Jennifer Rexford. 2001. Stable Internet Routing without Global Coordination. IEEE\/ACM Trans. Netw. 9, 6 (dec 2001), 681\u2013692. https:\/\/doi.org\/10.1109\/90.974523","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"e_1_3_2_1_25_1","volume-title":"Are We There Yet? On RPKI\u2019s Deployment and Security","author":"Gilad Yossi","unstructured":"Yossi Gilad , Avichai Cohen , Amir Herzberg , Michael Schapira , and Haya Shulman . 2017. Are We There Yet? On RPKI\u2019s Deployment and Security . In NDSS. The Internet Society . Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, and Haya Shulman. 2017. Are We There Yet? On RPKI\u2019s Deployment and Security. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_26_1","first-page":"107","article-title":"Modeling on Quicksand: Dealing with the Scarcity of Ground Truth in Interdomain Routing Data","volume":"42","author":"Gill Phillipa","year":"2012","unstructured":"Phillipa Gill and Nick Feamster . 2012 . Modeling on Quicksand: Dealing with the Scarcity of Ground Truth in Interdomain Routing Data . ACM SIGCOMM Computer Communication Review 42 , 4 (2012), 107 \u2013 118 . https:\/\/people.cs.umass.edu\/\u00a0phillipa\/papers\/QuickSand.pdf Phillipa Gill and Nick Feamster. 2012. Modeling on Quicksand: Dealing with the Scarcity of Ground Truth in Interdomain Routing Data. ACM SIGCOMM Computer Communication Review 42, 4 (2012), 107\u2013118. https:\/\/people.cs.umass.edu\/\u00a0phillipa\/papers\/QuickSand.pdf","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018439"},{"key":"e_1_3_2_1_28_1","volume-title":"How secure are secure interdomain routing protocols?Computer Networks 70","author":"Goldberg Sharon","year":"2014","unstructured":"Sharon Goldberg , Michael Schapira , Pete Hummon , and Jennifer Rexford . 2014. How secure are secure interdomain routing protocols?Computer Networks 70 ( 2014 ), 260\u2013287. Sharon Goldberg, Michael Schapira, Pete Hummon, and Jennifer Rexford. 2014. How secure are secure interdomain routing protocols?Computer Networks 70 (2014), 260\u2013287."},{"key":"e_1_3_2_1_29_1","first-page":"28","article-title":"Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102)","volume":"5","author":"Herzberg Amir","year":"2015","unstructured":"Amir Herzberg , Matthias Hollick , and Adrian Perrig . 2015 . Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102) . Dagstuhl Reports 5 , 3 (2015), 28 \u2013 40 . https:\/\/doi.org\/10.4230\/DagRep.5.3.28 10.4230\/DagRep.5.3.28 Amir Herzberg, Matthias Hollick, and Adrian Perrig. 2015. Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Reports 5, 3 (2015), 28\u201340. https:\/\/doi.org\/10.4230\/DagRep.5.3.28","journal-title":"Dagstuhl Reports"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"e_1_3_2_1_31_1","volume-title":"Inet: Internet Topology Generator","author":"Jin Cheng","year":"2000","unstructured":"Cheng Jin , Qian Chen , and Sugih Jamin . 2000 . Inet: Internet Topology Generator . IEEE\/ACM Transactions on Networking 8 (11 2000), 753\u2013765. Issue 6. https:\/\/doi.org\/10.1109\/TNET.2000.880966 10.1109\/TNET.2000.880966 Cheng Jin, Qian Chen, and Sugih Jamin. 2000. Inet: Internet Topology Generator. IEEE\/ACM Transactions on Networking 8 (11 2000), 753\u2013765. Issue 6. https:\/\/doi.org\/10.1109\/TNET.2000.880966"},{"key":"e_1_3_2_1_32_1","volume-title":"Autonomous security for autonomous systems. Computer Networks 52 (10","author":"Karlin Josh","year":"2008","unstructured":"Josh Karlin , Stephanie Forrest , and Jennifer Rexford . 2008. Autonomous security for autonomous systems. Computer Networks 52 (10 2008 ), 2908\u20132923. https:\/\/doi.org\/10.1016\/j.comnet.2008.06.012 10.1016\/j.comnet.2008.06.012 Josh Karlin, Stephanie Forrest, and Jennifer Rexford. 2008. Autonomous security for autonomous systems. Computer Networks 52 (10 2008), 2908\u20132923. https:\/\/doi.org\/10.1016\/j.comnet.2008.06.012"},{"key":"e_1_3_2_1_33_1","unstructured":"S. Kent and K.seo. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480. The Internet society. http:\/\/tools.ietf.org\/html\/rfc6480  S. Kent and K.seo. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480. The Internet society. http:\/\/tools.ietf.org\/html\/rfc6480"},{"key":"e_1_3_2_1_34_1","volume-title":"and K","author":"Lepinski M.","year":"2017","unstructured":"M. Lepinski (Ed.) and K . Sriram (Ed.). 2017 . BGPsec Protocol Specification. RFC 8205 (Proposed Standard). https:\/\/doi.org\/10.17487\/RFC8205 Updated by RFC 8206. 10.17487\/RFC8205 M. Lepinski (Ed.) and K. Sriram (Ed.). 2017. BGPsec Protocol Specification. RFC 8205 (Proposed Standard). https:\/\/doi.org\/10.17487\/RFC8205 Updated by RFC 8206."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 2000 IEEE international conference on network protocols. IEEE, 191\u2013198","author":"London B","year":"2000","unstructured":"Thomas\u00a0 B London , Stephen\u00a0 R Hanna , and Kevin\u00a0 L Carter . 2000 . Path poisoning in bgp . In Proceedings of the 2000 IEEE international conference on network protocols. IEEE, 191\u2013198 . Thomas\u00a0B London, Stephen\u00a0R Hanna, and Kevin\u00a0L Carter. 2000. Path poisoning in bgp. In Proceedings of the 2000 IEEE international conference on network protocols. IEEE, 191\u2013198."},{"key":"e_1_3_2_1_36_1","volume-title":"Nano: Path Prediction for Peer-to-Peer Applications. In Proce of NSDI.","author":"Madhyastha H.","year":"2009","unstructured":"H. Madhyastha , E. Katz-Bassett , T. Anderson , A. Krishnamurthy , and A. Venkataramani . 2009 . iPlane Nano: Path Prediction for Peer-to-Peer Applications. In Proce of NSDI. H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. 2009. iPlane Nano: Path Prediction for Peer-to-Peer Applications. In Proce of NSDI."},{"key":"e_1_3_2_1_37_1","first-page":"2028","article-title":"BGP anomalies: A survey of detection methods and their limitations","volume":"20","author":"Maleki Mohammadreza","year":"2018","unstructured":"Mohammadreza Maleki , Mohammad\u00a0Mahdi Hajian , and Mohammad\u00a0 R Sadeghi . 2018 . BGP anomalies: A survey of detection methods and their limitations . IEEE Communications Surveys & Tutorials 20 , 3 (2018), 2028 \u2013 2055 . Mohammadreza Maleki, Mohammad\u00a0Mahdi Hajian, and Mohammad\u00a0R Sadeghi. 2018. BGP anomalies: A survey of detection methods and their limitations. IEEE Communications Surveys & Tutorials 20, 3 (2018), 2028\u20132055.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_38_1","unstructured":"Niko Matsakis. 2023. PyO3: Bringing Python to Rust. https:\/\/github.com\/PyO3\/pyo3.  Niko Matsakis. 2023. PyO3: Bringing Python to Rust. https:\/\/github.com\/PyO3\/pyo3."},{"key":"e_1_3_2_1_39_1","unstructured":"Jared Mauch. [n. d.]. BGP Routing Leak Detection System. https:\/\/puck.nether.net\/bgp\/leakinfo.cgi\/leaks-majornet.txt.  Jared Mauch. [n. d.]. BGP Routing Leak Detection System. https:\/\/puck.nether.net\/bgp\/leakinfo.cgi\/leaks-majornet.txt."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of Passive and Active Measurement Conference (PAM).","author":"Mazloum R.","unstructured":"R. Mazloum , M. Buob , J. Auge , B. Baynat , D. Rossi , and T. Friedman . 2014. Violation of Interdomain Routing Assumptions . In Proc. of Passive and Active Measurement Conference (PAM). R. Mazloum, M. Buob, J. Auge, B. Baynat, D. Rossi, and T. Friedman. 2014. Violation of Interdomain Routing Assumptions. In Proc. of Passive and Active Measurement Conference (PAM)."},{"key":"e_1_3_2_1_41_1","volume-title":"MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. 346\u2013353","author":"Medina Alberto","year":"2001","unstructured":"Alberto Medina , Anukool Lakhina , Ibrahim Matta , and John Byers . 2001 . BRITE: an approach to universal topology generation . In MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. 346\u2013353 . https:\/\/doi.org\/10.1109\/MASCOT.2001.948886 10.1109\/MASCOT.2001.948886 Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. 2001. BRITE: an approach to universal topology generation. In MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. 346\u2013353. https:\/\/doi.org\/10.1109\/MASCOT.2001.948886"},{"key":"e_1_3_2_1_42_1","volume-title":"The state of affairs in BGP security: A survey of attacks and defenses. Computer Communications 124 (June","author":"Mitseva Asya","year":"2018","unstructured":"Asya Mitseva , Andriy Panchenko , and Thomas Engel . 2018. The state of affairs in BGP security: A survey of attacks and defenses. Computer Communications 124 (June 2018 ), 45\u201360. Asya Mitseva, Andriy Panchenko, and Thomas Engel. 2018. The state of affairs in BGP security: A survey of attacks and defenses. Computer Communications 124 (June 2018), 45\u201360."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium. https:\/\/doi.org\/10","author":"Morillo Reynaldo","year":"2020","unstructured":"Reynaldo Morillo , Justin Furuness , Amir Herzberg , Cameron Morris , James Breslin , and Bing Wang . 2020 . ROV++: Improved Deployable Defense against BGP Hijacking . In Proceedings of the Network and Distributed System Security Symposium. https:\/\/doi.org\/10 .14722\/ndss.2021.24438 10.14722\/ndss.2021.24438 Reynaldo Morillo, Justin Furuness, Amir Herzberg, Cameron Morris, James Breslin, and Bing Wang. 2020. ROV++: Improved Deployable Defense against BGP Hijacking. In Proceedings of the Network and Distributed System Security Symposium. https:\/\/doi.org\/10.14722\/ndss.2021.24438"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of SIGCOMM.","author":"M\u00fchlbauer W.","unstructured":"W. M\u00fchlbauer , A. Feldmann , O. Maennel , M. Roughan , and S. Uhlig . 2006. Building an AS-topology model that captures route diversity . In Proc. of SIGCOMM. W. M\u00fchlbauer, A. Feldmann, O. Maennel, M. Roughan, and S. Uhlig. 2006. Building an AS-topology model that captures route diversity. In Proc. of SIGCOMM."},{"key":"#cr-split#-e_1_3_2_1_45_1.1","doi-asserted-by":"crossref","unstructured":"C. Perkins P. Calhoun and J. Bharatia. 2007. Mobile IPv4 Challenge\/Response Extensions (Revised). RFC 4721 (Proposed Standard). https:\/\/doi.org\/10.17487\/RFC4721 10.17487\/RFC4721","DOI":"10.17487\/rfc4721"},{"key":"#cr-split#-e_1_3_2_1_45_1.2","doi-asserted-by":"crossref","unstructured":"C. Perkins P. Calhoun and J. Bharatia. 2007. Mobile IPv4 Challenge\/Response Extensions (Revised). RFC 4721 (Proposed Standard). https:\/\/doi.org\/10.17487\/RFC4721","DOI":"10.17487\/rfc4721"},{"key":"e_1_3_2_1_46_1","volume-title":"An Analysis of Convergence Properties of the Border Gateway Protocol Using Discrete Event Simulation. Ph.\u00a0D. Dissertation","author":"Premore J.","unstructured":"Brian\u00a0 J. Premore . 2003. An Analysis of Convergence Properties of the Border Gateway Protocol Using Discrete Event Simulation. Ph.\u00a0D. Dissertation . Dartmouth College . Brian\u00a0J. Premore. 2003. An Analysis of Convergence Properties of the Border Gateway Protocol Using Discrete Event Simulation. Ph.\u00a0D. Dissertation. Dartmouth College."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_1_48_1","volume-title":"Li (Ed.), and S","author":"Ed Y. Rekhter","year":"2006","unstructured":"Y. Rekhter ( Ed .), T. Li (Ed.), and S . Hares (Ed.). 2006 . A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). https:\/\/doi.org\/10.17487\/RFC4271 Updated by RFCs 6286, 6608, 6793, 7606, 7607, 7705, 8212, 8654, 9072. 10.17487\/RFC4271 Y. Rekhter (Ed.), T. Li (Ed.), and S. Hares (Ed.). 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271 (Draft Standard). https:\/\/doi.org\/10.17487\/RFC4271 Updated by RFCs 6286, 6608, 6793, 7606, 7607, 7705, 8212, 8654, 9072."},{"key":"e_1_3_2_1_49_1","unstructured":"Renesys. [n. d.]. The New Threat: Targeted Internet Traffic Misdirection. http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking\/.  Renesys. [n. d.]. The New Threat: Targeted Internet Traffic Misdirection. http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211856"},{"key":"e_1_3_2_1_51_1","volume-title":"Revisiting RPKI Route Origin Validation on the Data Plane. In 5th Network Traffic Measurement and Analysis Conference, TMA 2021","author":"Rodday Nils","year":"2021","unstructured":"Nils Rodday , \u00cdtalo S.\u00a0 Cunha , Randy Bush , Ethan Katz-Bassett , Gabi\u00a0Dreo Rodosek , Thomas\u00a0 C. Schmidt , and Matthias W\u00e4hlisch . 2021 . Revisiting RPKI Route Origin Validation on the Data Plane. In 5th Network Traffic Measurement and Analysis Conference, TMA 2021 , Virtual Event , September 14-15, 2021, Vaibhav Bajpai, Hamed Haddadi, and Oliver Hohlfeld (Eds.). IFIP. http:\/\/dl.ifip.org\/db\/conf\/tma\/tma2021\/tma2021-paper11.pdf Nils Rodday, \u00cdtalo S.\u00a0Cunha, Randy Bush, Ethan Katz-Bassett, Gabi\u00a0Dreo Rodosek, Thomas\u00a0C. Schmidt, and Matthias W\u00e4hlisch. 2021. Revisiting RPKI Route Origin Validation on the Data Plane. In 5th Network Traffic Measurement and Analysis Conference, TMA 2021, Virtual Event, September 14-15, 2021, Vaibhav Bajpai, Hamed Haddadi, and Oliver Hohlfeld (Eds.). IFIP. http:\/\/dl.ifip.org\/db\/conf\/tma\/tma2021\/tma2021-paper11.pdf"},{"key":"e_1_3_2_1_52_1","volume-title":"A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing. Computer Networks 80 (April","author":"Siddiqui S.","year":"2015","unstructured":"Muhammad\u00a0 S. Siddiqui , Diego Montero , Rene Serral-Gracia , Xavi Masip-Bruin , and Marcelo Yannuzzi . 2015. A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing. Computer Networks 80 (April 2015 ), 1\u201326. Muhammad\u00a0S. Siddiqui, Diego Montero, Rene Serral-Gracia, Xavi Masip-Bruin, and Marcelo Yannuzzi. 2015. A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing. Computer Networks 80 (April 2015), 1\u201326."},{"key":"#cr-split#-e_1_3_2_1_53_1.1","doi-asserted-by":"crossref","unstructured":"K. Sriram D. Montgomery D. McPherson E. Osterweil and B. Dickson. 2016. Problem Definition and Classification of BGP Route Leaks. RFC 7908 (Informational). https:\/\/doi.org\/10.17487\/RFC7908 10.17487\/RFC7908","DOI":"10.17487\/RFC7908"},{"key":"#cr-split#-e_1_3_2_1_53_1.2","doi-asserted-by":"crossref","unstructured":"K. Sriram D. Montgomery D. McPherson E. Osterweil and B. Dickson. 2016. Problem Definition and Classification of BGP Route Leaks. RFC 7908 (Informational). https:\/\/doi.org\/10.17487\/RFC7908","DOI":"10.17487\/RFC7908"},{"key":"e_1_3_2_1_54_1","unstructured":"Cisco Systems. 2023. Cisco WAN Automation Engine (WAE). https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/wan-automation-engine\/index.html  Cisco Systems. 2023. Cisco WAN Automation Engine (WAE). https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/wan-automation-engine\/index.html"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. 61\u2013 68","author":"Szymanski Boleslaw","year":"2003","unstructured":"Boleslaw Szymanski , Yu Liu , and Rashim Gupta . 2003 . Parallel network simulation under distributed Genesis . In Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. 61\u2013 68 . https:\/\/doi.org\/10.1145\/824475.825869 10.1145\/824475.825869 Boleslaw Szymanski, Yu Liu, and Rashim Gupta. 2003. Parallel network simulation under distributed Genesis. In Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. 61\u2013 68. https:\/\/doi.org\/10.1145\/824475.825869"},{"key":"e_1_3_2_1_56_1","unstructured":"PyPy Team. 2023. PyPy. https:\/\/pypy.org\/  PyPy Team. 2023. PyPy. https:\/\/pypy.org\/"},{"key":"e_1_3_2_1_57_1","unstructured":"Andree Toonk. 2011. Indosat a Quick Report. http:\/\/www.bgpmon.net\/hijack-by-as4761-indosat-a-quick-report\/.  Andree Toonk. 2011. Indosat a Quick Report. http:\/\/www.bgpmon.net\/hijack-by-as4761-indosat-a-quick-report\/."},{"key":"e_1_3_2_1_58_1","unstructured":"Andree Toonk. 2014. Turkey Hijacking IP Addresses for Popular Global DNS Providers. BGPMon.  Andree Toonk. 2014. Turkey Hijacking IP Addresses for Popular Global DNS Providers. BGPMon."},{"key":"e_1_3_2_1_59_1","first-page":"372","article-title":"Multihoming in the internet: A survey","volume":"10","author":"van Steen C","year":"2008","unstructured":"Maarten\u00a0 C van Steen , Arno\u00a0 P Akkermans , and Henk\u00a0 J Sips . 2008 . Multihoming in the internet: A survey . IEEE Communications Surveys & Tutorials 10 , 2 (2008), 372 \u2013 392 . Maarten\u00a0C van Steen, Arno\u00a0P Akkermans, and Henk\u00a0J Sips. 2008. Multihoming in the internet: A survey. IEEE Communications Surveys & Tutorials 10, 2 (2008), 372\u2013392.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Pierre-Antoine Vervier Olivier Thonnard and Marc Dacier. 2015. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS.  Pierre-Antoine Vervier Olivier Thonnard and Marc Dacier. 2015. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS.","DOI":"10.14722\/ndss.2015.23035"},{"key":"e_1_3_2_1_61_1","unstructured":"Jacob Vlijm. 2022. yamlable. https:\/\/github.com\/jacobvlijm\/yamlable  Jacob Vlijm. 2022. yamlable. https:\/\/github.com\/jacobvlijm\/yamlable"},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. of ACM SIGCOMM. 103\u2013104","author":"W\u00e4hlisch Matthias","year":"2012","unstructured":"Matthias W\u00e4hlisch , Olaf Maennel , and Thomas\u00a0 C. Schmidt . 2012 . Towards detecting BGP route hijacking using the RPKI . In Proc. of ACM SIGCOMM. 103\u2013104 . https:\/\/doi.org\/10.1145\/2342356.2342381 10.1145\/2342356.2342381 Matthias W\u00e4hlisch, Olaf Maennel, and Thomas\u00a0C. Schmidt. 2012. Towards detecting BGP route hijacking using the RPKI. In Proc. of ACM SIGCOMM. 103\u2013104. https:\/\/doi.org\/10.1145\/2342356.2342381"},{"key":"e_1_3_2_1_63_1","volume-title":"Border gateway protocol modeling and simulation. Master\u2019s thesis","author":"Wojciechowski M.","unstructured":"M. Wojciechowski . 2008. Border gateway protocol modeling and simulation. Master\u2019s thesis . University of Warsaw. M. Wojciechowski. 2008. Border gateway protocol modeling and simulation. Master\u2019s thesis. University of Warsaw."},{"key":"e_1_3_2_1_64_1","volume-title":"Proc. of CoNEXT.","author":"Wu J.","unstructured":"J. Wu , Y. Zhang , Z.\u00a0 M. Mao , and K. Shin . 2007. Internet routing resilience to failures: Analysis and implications . In Proc. of CoNEXT. J. Wu, Y. Zhang, Z.\u00a0M. Mao, and K. Shin. 2007. Internet routing resilience to failures: Analysis and implications. In Proc. of CoNEXT."},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the IEEE conference on computer communications (INFOCOM), Vol.\u00a02. IEEE, 594\u2013602","author":"Zegura W","year":"1996","unstructured":"Ellen\u00a0 W Zegura , Kenneth\u00a0 L Calvert , and Samrat Bhattacharjee . 1996 . How to model an internetwork . In Proceedings of the IEEE conference on computer communications (INFOCOM), Vol.\u00a02. IEEE, 594\u2013602 . Ellen\u00a0W Zegura, Kenneth\u00a0L Calvert, and Samrat Bhattacharjee. 1996. How to model an internetwork. In Proceedings of the IEEE conference on computer communications (INFOCOM), Vol.\u00a02. IEEE, 594\u2013602."},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1591\u20131602","author":"Zhang Rui","year":"2015","unstructured":"Rui Zhang , Zhiguo Chen , Xin Wang , Vern Paxson , and Stefan Savage . 2015 . BGPMon: A system for monitoring and detecting malicious behavior in bgp . In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1591\u20131602 . Rui Zhang, Zhiguo Chen, Xin Wang, Vern Paxson, and Stefan Savage. 2015. BGPMon: A system for monitoring and detecting malicious behavior in bgp. In Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1591\u20131602."}],"event":{"name":"CSET 2023: 2023 Cyber Security Experimentation and Test Workshop","location":"Marina del Rey CA USA","acronym":"CSET 2023"},"container-title":["2023 Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607505.3607509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:28Z","timestamp":1750178188000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,7]]},"references-count":67,"alternative-id":["10.1145\/3607505.3607509","10.1145\/3607505"],"URL":"https:\/\/doi.org\/10.1145\/3607505.3607509","relation":{},"subject":[],"published":{"date-parts":[[2023,8,7]]},"assertion":[{"value":"2023-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}