Probabilistic IP prefix authentication (PIPA) for prefix hijacking

被引:0
|
作者
Seoul National University, Korea, Republic of [1 ]
机构
关键词
Compendex;
D O I
4th International Conference on Future Internet Technologies, CFI '09
中图分类号
学科分类号
摘要
Authentication
引用
收藏
相关论文
共 50 条
  • [31] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification
    Biersack, Ernst
    Jacquemart, Quentin
    Fischer, Fabian
    Fuchs, Johannes
    Thonnard, Olivier
    Theodoridis, Georgios
    Tzovaras, Dimitrios
    Vervier, Pierre-Antoine
    IEEE NETWORK, 2012, 26 (06): : 33 - 39
  • [32] Case Study Analysis on BGP: Prefix Hijacking and Transit AS
    Hakimi, Rifqy
    Saputra, Yuris Mulya
    Nugraha, Beny
    2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,
  • [33] NPLA: Network Prefix Level Authentication
    Li, Ming
    Cui, Yong
    Siekkinen, Matti
    Yla-Jaaski, Antti
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 339 - 344
  • [34] Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew
    McArthur, Christian
    Guirguis, Mina
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2480 - 2485
  • [35] Stealthy IP prefix hijacking: Don't bite off more than you can chew
    Department of Computer Science, Texas A and M University, United States
    不详
    GLOBECOM IEEE Global Telecommun. Conf.,
  • [36] Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases
    Alshamrani, Hussain
    Ghita, Bogdan
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 57 - 63
  • [37] A Prefix Hijacking Detection Model Based on the Immune Network Theory
    Zhang, Jian
    Li, Daofeng
    Zhao, Bowen
    IEEE ACCESS, 2019, 7 : 132384 - 132394
  • [38] Understanding the impact of outsourcing mitigation against BGP prefix hijacking
    Zeng, Man
    Huang, Xiaohong
    Zhang, Pei
    Li, Dandan
    COMPUTER NETWORKS, 2022, 202
  • [39] How Can Multipath Dissemination Help to Detect Prefix Hijacking?
    Wang, Feng
    Dai, Bin
    Su, Jinshu
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [40] LDC: Detecting BGP Prefix Hijacking by Load Distribution Change
    Liu, Yujing
    Su, Jinshu
    Chang, Rocky K. C.
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1197 - 1203