{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:46:57Z","timestamp":1742392017389},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/noms59830.2024.10575088","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:23:51Z","timestamp":1719941031000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Exploring the Benefit of Path Plausibility Algorithms in BGP"],"prefix":"10.1109","author":[{"given":"Nils","family":"Rodday","sequence":"first","affiliation":[{"name":"Universität der Bundeswehr München,Research Institute CODE"}]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[{"name":"Universität der Bundeswehr München,Research Institute CODE"}]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Roland","family":"van Rijswijk - Deij","sequence":"additional","affiliation":[{"name":"University of Twente"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784511"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2014.6816139"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6480","article-title":"An Infrastructure to Support Secure Internet Routing","volume-title":"RFC 6480","author":"Lepinski","year":"2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2023.3327455"},{"year":"2020","key":"ref7","article-title":"NIST RPKI Monitor"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8205","article-title":"BGPsec Protocol Specification","volume-title":"RFC 8205","author":"Lepinski","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339426"},{"article-title":"A Profile for Autonomous System Provider Authorization","year":"2023","author":"Azimov","key":"ref10"},{"key":"ref11","article-title":"BGP AS PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-sidrops-aspa-verification-16","author":"Azimov","year":"2023"},{"key":"ref12","article-title":"RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-grow-rpki-as-cones-02","author":"Snijders","year":"2020"},{"article-title":"NOMS\u201924 Artifacts","year":"2023","author":"Rodday","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6482"},{"author":"Tridgell","key":"ref15","article-title":"RSYNC Protocol Man Page"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8182"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN55119.2022.9829712"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8210"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211856"},{"article-title":"Revisiting RPKI Route Origin Validation on the Data Plane","volume-title":"Proc. of Network Traffic Measurement and Analysis Conference (TMA). IFIP","author":"Rodday","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref22","article-title":"Architecture and Deployment Considerations for Secure Origin BGP (soBGP)","volume-title":"Working Draft, IETF Secretariat, Internet-Draft draft-white-sobgp-architecture-02","author":"White","year":"2006"},{"key":"ref23","article-title":"Pretty Secure BGP, psBGP","author":"Wan","year":"2005","journal-title":"NDSS. Citeseer"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7908"},{"year":"2023","key":"ref25","article-title":"Krill - Open Source RPKI Daemon Featuring CA-software and Publication Server"},{"year":"2023","key":"ref26","article-title":"Routinator - Open Source RPKI Relying Party software"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23080"},{"key":"ref28","article-title":"Interdomain Route Leak Mitigation: A Pragmatic Approach","volume-title":"PhD Dissertation, University of Tennessee","author":"McDaniel","year":"2021"},{"key":"ref29","article-title":"Methods for Detection and Mitigation of BGP Route Leaks","volume-title":"Internet Engineering Task Force, Internet-Draft draft-ietf-grow-route-leak-detection-mitigation-09","author":"Sriram","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9234"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3233833"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249474"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108966"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3610852"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327846"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327905"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934883"},{"author":"Brand","key":"ref38","article-title":"A Reproduction of \u201cJumpstarting BGP Security with Path-End Validation\u201d"},{"volume-title":"bgpsecsim Github Repository","author":"Brand","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3607505.3607509"},{"year":"2022","key":"ref41","article-title":"The CAIDA AS Relationships Dataset, 20221001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3472951.3473505"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.TN.2060","article-title":"BGP Secure Routing Extension (BGP-SRx): Reference Implementation and Test Tools for Emerging BGP Security Standards","volume-title":"National Institute of Standards and Technology, Tech. Rep. 2060","author":"Borchert","year":"2021"},{"article-title":"ASPA-based BGP AS_PATH Verification - Invited Webinar at the Internet2 Organization","year":"2023","author":"Kotikalapudi","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00070"},{"article-title":"Measuring Route Origin Validation","year":"2020","author":"Huston","key":"ref46"},{"article-title":"The year of RPKI on the control plane","year":"2019","author":"Cartwright-Cox","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624806"}],"event":{"name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2024,5,6]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,5,10]]}},"container-title":["NOMS 2024-2024 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574855\/10574897\/10575088.pdf?arnumber=10575088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T04:15:07Z","timestamp":1720066507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575088\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/noms59830.2024.10575088","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}