Balanced Peer Lists: Towards a Collusion-Resistant BGP
暂无分享,去创建一个
Yan Li | Mohamed G. Gouda | M. Gouda | Yan Li
[1] Daniel Massey,et al. Collecting the internet AS-level topology , 2005, CCRV.
[2] Jennifer Rexford,et al. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[3] Daniel Massey,et al. Detection of invalid routing announcement in the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.
[4] Michalis Faloutsos,et al. Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Christopher Krügel,et al. Topology-Based Detection of Anomalous BGP Messages , 2003, RAID.
[6] Lixia Zhang,et al. Observing the evolution of internet as topology , 2007, SIGCOMM 2007.
[7] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[8] Volker Roth,et al. Listen and whisper: security mechanisms for BGP , 2004 .
[9] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM '07.
[10] Patrick D. McDaniel,et al. Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing , 2003, NDSS.
[11] Zhuoqing Morley Mao,et al. Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Dan Pei,et al. A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM '07.
[13] Patrick D. McDaniel,et al. Origin authentication in interdomain routing , 2003, CCS '03.
[14] Daniel Massey,et al. An analysis of BGP multiple origin AS (MOAS) conflicts , 2001, IMW '01.
[15] Vitaly Shmatikov,et al. Truth in advertising: lightweight verification of route integrity , 2007, PODC '07.
[16] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM 2002.
[17] Yih-Chun Hu,et al. SPV: secure path vector routing for securing BGP , 2004, SIGCOMM 2004.
[18] Evangelos Kranakis,et al. Pretty Secure BGP, psBGP , 2005, NDSS.
[19] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[20] Patrick D. McDaniel,et al. Origin authentication in interdomain routing , 2006, Comput. Networks.
[21] Randy Bush,et al. iSPY: Detecting IP Prefix Hijacking on My Own , 2008, IEEE/ACM Transactions on Networking.
[22] Sean W. Smith,et al. Aggregated path authentication for efficient BGP security , 2005, CCS '05.
[23] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[24] Charles Lynn,et al. Secure Border Gateway Protocol (Secure-BGP) , 2000 .
[25] Michalis Faloutsos,et al. Power laws and the AS-level internet topology , 2003, TNET.
[26] Daniel Massey,et al. PHAS: A Prefix Hijack Alert System , 2006, USENIX Security Symposium.