Sciweavers

4 search results - page 1 / 1
» Towards detecting BGP route hijacking using the RPKI
Sort
View
SIGCOMM
2012
ACM
11 years 7 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
APNOMS
2009
Springer
13 years 11 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
CCR
2008
122views more  CCR 2008»
13 years 4 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
SIGCOMM
2003
ACM
13 years 9 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...