Argus: An accurate and agile system to detecting IP prefix hijacking
暂无分享,去创建一个
[1] Zhuoqing Morley Mao,et al. Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Cengiz Alaettinoglu,et al. Routing Policy Specification Language (RPSL) , 1998, RFC.
[3] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[4] Arun Venkataramani,et al. iPlane: an information plane for distributed services , 2006, OSDI '06.
[5] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM '02.
[6] Daniel Massey,et al. An analysis of BGP multiple origin AS (MOAS) conflicts , 2001, IMW '01.
[7] Lixia Zhang,et al. Quantifying Path Exploration in the Internet , 2006, IEEE/ACM Transactions on Networking.
[8] Jennifer Rexford,et al. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[9] Russ White. Architecture and Deployment Considerations for Secure Origin BGP (soBGP) , 2006 .
[10] Evangelos Kranakis,et al. On interdomain routing security and pretty secure BGP (psBGP) , 2007, TSEC.
[11] Patrick D. McDaniel,et al. Origin authentication in interdomain routing , 2006, Comput. Networks.
[12] Volker Roth,et al. Listen and whisper: security mechanisms for BGP , 2004 .
[13] Daniel Massey,et al. PHAS: A Prefix Hijack Alert System , 2006, USENIX Security Symposium.
[14] Randy Bush,et al. iSPY: Detecting IP Prefix Hijacking on My Own , 2008, IEEE/ACM Transactions on Networking.
[15] Lixia Zhang,et al. Cyclops: the AS-level connectivity observatory , 2008, CCRV.
[16] Dan Pei,et al. A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM '07.
[17] Patrick D. McDaniel,et al. Origin authentication in interdomain routing , 2003, CCS '03.