Author:
Meng Meng,Zheng Ruijuan,Zhang Mingchuan,Zhu Junlong,Wu Qingtao
Publisher
Springer International Publishing
Reference12 articles.
1. Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 265–276 (2007)
2. Lad, M., Oliveira, R., Zhang, B., Zhang, L.: Understanding resiliency of Internet topology against prefix hijack attacks. In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 368–377 (2007)
3. Huston, G., Michaelson, G.: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure and Route Origin Authorizations (2012).
https://www.tools.ietf.org/html/rfc6483
4. Bellovin, S.M., Bush, R., Ward, D.: Security requirements for BGP path validation (2011).
http://tools.ietf.org/html/draft-ymbk-bgpsec-reqs-02
5. Johann, S., Ralph, H., Quentin, J., Georg, C., Ernst, B.W.: HEAP: reliable assessment of BGP hijacking attacks. IEEE J. Sel. Areas Commun. 34, 1849–1861 (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献