Computer Science ›› 2014, Vol. 41 ›› Issue (8): 158-163.doi: 10.11896/j.issn.1002-137X.2014.08.035
Previous Articles Next Articles
YANG Bin,LU Yu-liang,YANG Guo-zheng and ZHANG Liang
[1] Rekhter Y,Li T,Hares S.A Border Gateway Protocol 4(BGP-4)[EB/OL].RFC4271.2006 [2] 黎松,诸葛建伟,李星.BGP安全研究[J].软件学报,2013,4(1):121-138 [3] Brown M A.Pakistan hijacks YouTube.Renesys Blog[EB/OL].http://www.renesys.c-om/blog/2008/02/pakistan-hijacks-youtube-1.shtml,2008 [4] Prefix hijacking by Michael Lindsay via Internap[EB/OL].http://mailman.nanog.org/pipermail/nanog/2011-August/039379.html.2011.08 [5] Hiran R,Carlsson N,Gill P.Characterizin-g Large-scale Routing Anomalies A Case Study of the China Telecom Incident[C]∥Passive and Active Measurement.2012:229-238 [6] Hu X,Mao Z M.Accurate real-time identification of IP hijacking[C]∥Proc.07th Security and Privacy.Berkeley,CA,2007:3-17 [7] Kruegel C,Mutz D,Robertson W,et al.Topology-based detection of anomalous BGP messages[C]∥Proc.6th Symp.Recent Advances in Intrusion Detection(RAID).2007:17-35 [8] Hong S C,Hong J W K,Ju H.IP prefix hijacking detectionusing the collection of AS Characteristics[C]∥Proc.17th Network Operations and management symposium.Taipei,China,2011:1-7 [9] Li J,Ehrenkranz T,Elliott P.Buddyguard:a buddy system for fast and reliable detection of IP prefix anomalies[C]∥Proc.20th IEEE International Conference(ICNP).2012:1-10 [10] Zhao X,Pei D,Wang L,et al.An analysis of BGP multiple origin AS(MOAS) conflicts[C]∥Proc.of the SIGCOMM Internet Measurement Workshop,2001.San Francisco:ACM,2001:31-35 [11] http://www.gossamer-threads.com/lists/nanog/users/144024.2011 [12] Route Views Project Page.http://www.routeviews.org.2005 |
No related articles found! |
|