{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T04:09:08Z","timestamp":1685419748312},"reference-count":0,"publisher":"National Library of Serbia","issue":"2","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2013]]},"abstract":"<jats:p>The inter-domain routing system based on the BGP protocol is a kernel\n   establishment in the Internet. There have been many incidents of IP prefix\n   hijacking by BGP protocol in the Internet. Attacks may hijack victim's\n   address space to disrupt network services or perpetrate malicious activities\n   such as spamming and DoS attacks without disclosing identity. The relation\n   between prefix hijacking and the Internet hierarchy is presented in this\n   paper. The Internet is classified into three tiers based on the power-law\n   and commercial relations of autonomous systems. The relation between network\n   topology and prefix hijacking influence is presented for all sorts of\n   hijacking events in different layers. The results assert that the\n   hierarchical nature of network influences the prefix hijacking greatly.<\/jats:p>","DOI":"10.2298\/csis121108023z","type":"journal-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T09:16:28Z","timestamp":1366103788000},"page":"611-631","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation on the influence of internet prefix hijacking events"],"prefix":"10.2298","volume":"10","author":[{"given":"Jinjing","family":"Zhao","sequence":"first","affiliation":[{"name":"Beijing Institute of System Engineering, Beijing, China"}]},{"given":"Yan","family":"Wen","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]}],"member":"1078","container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:30:57Z","timestamp":1685349057000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02141300023Z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013]]}},"URL":"https:\/\/doi.org\/10.2298\/csis121108023z","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"value":"1820-0214","type":"print"},{"value":"2406-1018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}