Author:
Wu Lijin,Lin Nan,Zhang Kunsan,Wu Yayan
Publisher
Springer Nature Singapore
Reference38 articles.
1. Rckhicr, Y., Li, T.: A border gateway protocol (bgp-4). RFC 1771 (1995)
2. Moriano, P., Achar, S., Camp, L.J.: Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Comput. Secur. 70, 319–334 (2017)
3. Cowie, J.: The new threat: Targeted internet traffic misdirection. Popular Mechanics (2013). http://www.renesys.com/2013/11/mitm-internethijacking
4. Benton, K., Camp, L.J.: Firewalling scenic routes: preventing data exfiltration via political and geographic routing policies. In: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pp. 31–36 (2016)
5. Radar, Bgp hijacks - malicious or mistakes? (2018). https://blog.qrator.net/en/bgp-hijacks-malicious-or-mistakes_13/