共 67 条
- [1] Rekhter Y., Li T., Hares S., A border gateway protocol 4 (BGP-4), (2006)
- [2] Nordstrom O., Dovrolis C., Beware of BGP attacks, ACM SIGCOMM Computer Communication Review, 34, 2, pp. 1-8, (2004)
- [3] Ratul M., Wetherall D., Anderson T., Understanding BGP misconfiguration, ACM SIGCOMM Computer Communication Review, 32, 4, (2002)
- [4] Li S., Zhuge J.W., Li X., Study on BGP security, Ruan Jian Xue Bao/Joumal of Software, 24, 1, pp. 121-138, (2013)
- [5] Giotsas V., Luckie M., Huffaker B., Inferring complex as relationships, Proc. of the 2014 Conf. on Internet Measurement Conf., pp. 23-30, (2014)
- [6] Kent S., Lynn C., Seo K., Secure border gateway protocol, IEEE Journal on Selected Areas in Communications, 18, 4, pp. 582-592, (2002)
- [7] White R., Securing BGP through secure origin BGP (soBGP), Business Communications Review, 33, 5, (2003)
- [8] Lepinski M., Kent S., An infrastructure to support secure internet routing, (2012)
- [9] Lepinski M., Kent S., Kong D., A profile for route origin authorizations (ROAs), (2012)
- [10] Lepinski M., Sriram K., BGPSEC protocol specification, (2017)