A study of prefix hijacking and interception in the internet
- 27 August 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 37 (4) , 265-276
- https://doi.org/10.1145/1282380.1282411
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Building an AS-topology model that captures route diversityPublished by Association for Computing Machinery (ACM) ,2006
- An empirical study of "bogon" route advertisementsACM SIGCOMM Computer Communication Review, 2005
- Beware of BGP attacksACM SIGCOMM Computer Communication Review, 2004
- Towards an accurate AS-level traceroute toolPublished by Association for Computing Machinery (ACM) ,2003
- PlanetLabACM SIGCOMM Computer Communication Review, 2003
- On inferring and characterizing internet routing policiesPublished by Association for Computing Machinery (ACM) ,2003
- Understanding BGP misconfigurationPublished by Association for Computing Machinery (ACM) ,2002
- BGP routing stability of popular destinationsPublished by Association for Computing Machinery (ACM) ,2002
- On inferring autonomous system relationships in the InternetIEEE/ACM Transactions on Networking, 2001
- An analysis of BGP multiple origin AS (MOAS) conflictsPublished by Association for Computing Machinery (ACM) ,2001