Information gain-based topology attribution of diversity of BGP prefix hijacking impact
暂无分享,去创建一个
[1] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[2] Daniel Massey,et al. An analysis of BGP multiple origin AS (MOAS) conflicts , 2001, IMW '01.
[3] Jennifer Rexford,et al. A Survey of BGP Security , 2005 .
[4] Jennifer Rexford,et al. MIRO: multi-path interdomain routing , 2006, SIGCOMM.
[5] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM '07.
[6] Randy Bush,et al. iSPY: Detecting IP Prefix Hijacking on My Own , 2008, IEEE/ACM Transactions on Networking.
[7] Lixia Zhang,et al. Understanding Resiliency of Internet Topology against Prefix Hijack Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[8] Joseph Kee-yin Ng,et al. Extensions to BGP to Support Secure Origin BGP , 2004 .
[9] Lixin Gao,et al. On inferring and characterizing Internet routing policies , 2003, Journal of Communications and Networks.