{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:51:14Z","timestamp":1729633874300,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/lcn.2011.6115172","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T19:30:31Z","timestamp":1325878231000},"page":"143-146","source":"Crossref","is-referenced-by-count":2,"title":["About prefix hijacking in the Internet"],"prefix":"10.1109","author":[{"given":"Uli","family":"Bornhauser","sequence":"first","affiliation":[]},{"given":"Peter","family":"Martini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NWFP-33-16 (BW)\/06\/PTA - Blocking of Offensive Website","year":"2008","key":"19"},{"journal-title":"CAIDA DATA","year":"0","key":"17"},{"journal-title":"About Prefix Hijacking in the Internet - DB","year":"2011","author":"bornhauser","key":"18"},{"journal-title":"An Infrastructure to Support Secure Internet Routing","year":"2011","author":"lepinski","key":"15"},{"journal-title":"Routing information service (RIS)","year":"0","key":"16"},{"key":"13","article-title":"PHAS: A Prefix Hijack Alert System","volume":"15","author":"lad","year":"2006","journal-title":"Proceedings of the 15th conference on USENIX Security Symposium"},{"journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","year":"2008","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233708"},{"key":"12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/964725.633027","article-title":"Understanding bgp misconfiguration","volume":"32","author":"mahajan","year":"2002","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4271"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1034"},{"key":"10","first-page":"353","article-title":"Analysis of BGP Prefix Origins during Google's May 2005 Outage","author":"wan","year":"2006","journal-title":"Proceedings of the 20th International Conference on Parallel and Distributed Processing"},{"key":"7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2007.7","article-title":"Accurate Real-time Identification of IP Prefix Hijacking","author":"hu","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"journal-title":"BGP Security Availability and Operator Needs","year":"2003","author":"meyer","key":"5"},{"key":"4","article-title":"Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues","author":"kent","year":"2000","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"9","first-page":"22","article-title":"Analysis of IP Prefix Hijacking and Traffic Interception","volume":"10","author":"latt","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"key":"8","first-page":"127","article-title":"Listen and whisper: Security mechanisms for bgp","author":"subramanian","year":"2004","journal-title":"1st Symposium on Networked Systems Design and Implementation (NSDI 2004)"}],"event":{"name":"2011 IEEE 36th Conference on Local Computer Networks (LCN 2011)","start":{"date-parts":[[2011,10,4]]},"location":"Bonn, Germany","end":{"date-parts":[[2011,10,7]]}},"container-title":["2011 IEEE 36th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6105664\/6114410\/06115172.pdf?arnumber=6115172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:22:51Z","timestamp":1497961371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6115172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/lcn.2011.6115172","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}