Impact of prefix hijacking on payments of providers
暂无分享,去创建一个
[1] Sharon Goldberg,et al. Rationality and traffic attraction: incentives for honest path announcements in bgp , 2008, SIGCOMM '08.
[2] Balachander Krishnamurthy,et al. On the use and performance of content distribution networks , 2001, IMW '01.
[3] Zhenhai Duan,et al. Region-based BGP announcement filtering for improved BGP security , 2010, ASIACCS '10.
[4] Amogh Dhamdhere,et al. Can ISPs be profitable without violating “network neutrality”? , 2008, NetEcon '08.
[5] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM 2007.
[6] Zhuoqing Morley Mao,et al. Practical defenses against BGP prefix hijacking , 2007, CoNEXT '07.
[7] Z. Morley Mao,et al. Accurate Real-time Identification of IP Hijacking , 2006 .
[8] David Clark,et al. Tussle in cyberspace: defining tomorrow's internet , 2002, SIGCOMM 2002.
[9] Lixia Zhang,et al. Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[10] Renata Teixeira,et al. Dynamics of hot-potato routing in IP networks , 2004, SIGMETRICS '04/Performance '04.
[11] Ying Zhang,et al. iSPY: Detecting IP Prefix Hijacking on My Own , 2010, IEEE/ACM Trans. Netw..
[12] Dan Pei,et al. A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM '07.
[13] Xenofontas A. Dimitropoulos,et al. On the 95-Percentile Billing Method , 2009, PAM.
[14] Steve Uhlig,et al. Modeling the routing of an autonomous system with C-BGP , 2005, IEEE Network.
[15] Dan Pei,et al. A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM 2007.
[16] David E. Taylor,et al. Longest prefix matching using bloom filters , 2006, TNET.
[17] Ke Zhang,et al. An analysis on selective dropping attack in BGP , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[18] Jon Crowcroft,et al. Net neutrality: the technical side of the debate: a white paper , 2007, CCRV.
[19] Kirk Lougheed,et al. Border Gateway Protocol (BGP) , 2021, IP Routing Protocols.
[20] Ion Stoica,et al. ROFL: routing on flat labels , 2006, SIGCOMM '06.
[21] Susan Hares,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[22] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[23] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[24] Walter Willinger,et al. To Peer or Not to Peer: Modeling the Evolution of the Internet's AS-Level Topology , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[25] Murat Yuksel,et al. Class-of-service in ip backbones: informing the network neutrality debate , 2008, SIGMETRICS '08.
[26] Patrick D. McDaniel,et al. Toward Valley-Free Inter-domain Routing , 2007, 2007 IEEE International Conference on Communications.
[27] Zhuoqing Morley Mao,et al. Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[28] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[29] Pablo Rodriguez,et al. On economic heavy hitters: shapley value analysis of 95th-percentile pricing , 2010, IMC '10.
[30] Daniel Massey,et al. PHAS: A Prefix Hijack Alert System , 2006, USENIX Security Symposium.
[31] Patrick D. McDaniel,et al. A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.
[32] Mina Guirguis,et al. Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[33] Constantinos Dovrolis,et al. Beware of BGP attacks , 2004, CCRV.