{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:47:38Z","timestamp":1774716458399,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10559067","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics"],"prefix":"10.23919","author":[{"given":"Ebrima","family":"Jaw","sequence":"first","affiliation":[{"name":"University of Twente,Enschede,The Netherlands"}]},{"given":"Moritz","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"University of Twente,Enschede,The Netherlands"}]},{"given":"Cristian","family":"Hesselman","sequence":"additional","affiliation":[{"name":"University of Twente,Enschede,The Netherlands"}]},{"given":"Lambert","family":"Nieuwenhuis","sequence":"additional","affiliation":[{"name":"University of Twente,Enschede,The Netherlands"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","article-title":"BGP Anomaly Detection Techniques: A Survey","volume":"19","author":"Al-Musawi","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"ref3","first-page":"1","article-title":"Practical defenses against BGP prefix hijacking","volume-title":"Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT 07","author":"Zhang"},{"key":"ref4","volume-title":"Russian telco rostelecom hijacks traffic for IT giants, including google","author":"Paganini","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_23"},{"issue":"6","key":"ref6","doi-asserted-by":"crossref","first-page":"2471","DOI":"10.1109\/TNET.2018.2869798","article-title":"ARTEMIS: Neutralizing BGP Hijacking Within a Minute","volume":"26","author":"Sermpezis","year":"2018","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"ref8","volume-title":"KlaySwap - another BGP hijack targeting crypto wallets","author":"Siddiqui","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355581"},{"issue":"6","key":"ref10","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/JSAC.2016.2558978","article-title":"HEAP: Reliable Assessment of BGP Hijacking Attacks","volume":"34","author":"Schlamp","year":"2016","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624806"},{"key":"ref13","volume-title":"A profile for autonomous system provider authorization","author":"Azimov","year":"2021"},{"issue":"4","key":"ref14","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/MNET.2018.1800171","article-title":"BGP with BGPsec: Attacks and Countermeasures","volume":"33","author":"Li","year":"2019","journal-title":"IEEE Network"},{"key":"ref15","volume-title":"Network operator participants","year":"2024"},{"key":"ref16","volume-title":"BGPView","year":"2023"},{"key":"ref17","volume-title":"RIR Statistics","year":"2023"},{"key":"ref18","volume-title":"DROP - dont route or peer lists - the spamhaus project","year":"2024"},{"key":"ref19","volume-title":"Blacklist policy level 2. UCEPROTECT\u00ae-Network","year":"2024"},{"key":"ref20","volume-title":"Route collection at the RIPE NCC - where are we and where should we go?","author":"Aben","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628202"},{"key":"ref22","volume-title":"Routing information service (RIS)","year":"2016"},{"key":"ref23","volume-title":"Routeviews project","year":"2023"},{"key":"ref24","volume-title":"Iran leaks censorship via BGP hijacks","year":"2024"},{"key":"ref25","volume-title":"ASN list - ASN lookup blacklist and IPs spam statistics","year":"2024"},{"key":"ref26","volume-title":"Live long and prosper:analyzing long-lived MOAS prefixes in BGP","author":"Sediqi","year":"2023"},{"key":"ref27","volume-title":"AS rank: GraphQL API overview page","year":"2024"},{"key":"ref28","volume-title":"Routing Information Service (RIS)","year":"2023"},{"key":"ref29","first-page":"43","article-title":"Argus: An accurate and agile system to detecting IP prefix hijacking","volume-title":"2011 19th IEEE International Conference on Network Protocols","author":"Xiang"},{"key":"ref30","first-page":"25","article-title":"BGP hijacking classification","volume-title":"2019 Network Traffic Measurement and Analysis Conference (TMA)","author":"Cho"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"ref32","volume-title":"Network operator actions"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3405671.3405814"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","location":"Dresden, Germany","start":{"date-parts":[[2024,5,21]]},"end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10559067.pdf?arnumber=10559067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:41Z","timestamp":1719343061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10559067","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}