A study of prefix hijacking and interception in the Internet, Proc. ACM SIGCOMM 2007, pp.265-276, 2007. ,
Defending against BGP man-in-the-middle attacks, 2009. ,
Accurate Real-time Identification of IP Prefix Hijacking, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.3-17, 2007. ,
DOI : 10.1109/SP.2007.7
Secure Border Gateway Protocol (SBGP), IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 2000. ,
DOI : 10.1109/49.839934
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.762
A comparative study on IP prefixes and their origin ases in BGP and the IRR, ACM SIGCOMM Computer Communication Review, vol.43, issue.3, pp.16-24, 2013. ,
DOI : 10.1145/2500098.2500101
PHAS: A prefix hijack alert system, Proc. 15th USENIX Security Symposium, 2006. ,
Stealing the Internet: An Internet-scale man in the middle attack, Talk at DEFCON 16, 2008. ,
Detecting bogus BGP route information: Going beyond prefix hijacking, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007. ,
DOI : 10.1109/SECCOM.2007.4550358
Understanding the network-level behavior of spammers, Proc. ACM SIGCOMM, 2006. ,
A forensic case study on as hijacking, ACM SIGCOMM Computer Communication Review, vol.43, issue.1, pp.5-12, 2013. ,
DOI : 10.1145/2479957.2479959
Detecting prefix hijackings in the internet with argus, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, 2012. ,
DOI : 10.1145/2398776.2398779
Towards detecting BGP route hijacking using the RPKI, ACM SIGCOMM Computer Communication Review, vol.42, issue.4, pp.103-104, 2012. ,
DOI : 10.1145/2377677.2377702
iSPY: Detecting IP Prefix Hijacking on My Own, IEEE/ACM Transactions on Networking, vol.18, issue.6, pp.1815-1828, 2010. ,
DOI : 10.1109/TNET.2010.2066284
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.5241
A light-weight distributed scheme for detecting IP prefix hijacks in real-time, Proc. ACM SIGCOMM, 2007. ,