{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:45:07Z","timestamp":1725792307860},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","funder":[{"name":"Dutch Research Council (NWO)","award":["NWA.1215.18.003"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,23]]},"DOI":"10.1145\/3673422.3674899","type":"proceedings-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T10:25:21Z","timestamp":1721125521000},"page":"67-73","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the security of Internet paths: A case study of Dutch critical infrastructures"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3660-6226","authenticated-orcid":false,"given":"Shyam Krishna","family":"Khadka","sequence":"first","affiliation":[{"name":"University of Twente"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6662-704X","authenticated-orcid":false,"given":"Suzan","family":"Bayhan","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9614-2377","authenticated-orcid":false,"given":"Ralph","family":"Holz","sequence":"additional","affiliation":[{"name":"University of Twente and University of M\u00fcnster"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7052-9300","authenticated-orcid":false,"given":"Cristian","family":"Hesselman","sequence":"additional","affiliation":[{"name":"SIDN Labs and University of Twente"}]}],"member":"320","published-online":{"date-parts":[[2024,7,20]]},"reference":[{"volume-title":"Discovery and Mapping of the Dutch National Critical IP Infrastructure. Retrieved","year":"2024","author":"Alizadeh Fahimeh","key":"e_1_3_2_1_1_1","unstructured":"Fahimeh Alizadeh and Razvan C. Oprea. 2013. Discovery and Mapping of the Dutch National Critical IP Infrastructure. Retrieved March 27, 2024 from https:\/\/www.nlnetlabs.nl\/downloads\/publications\/RP2_report_Mapping_the_Dutch_Critical_Infrastructure.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"asrank 2024. AS Rank. https:\/\/doi.org\/10.21986\/CAIDA.DATA.AS-RANK","DOI":"10.21986\/CAIDA.DATA.AS-RANK"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Clingendael Policy Brief. 2024. Too late to act? Europe's quest for cloud sovereignty. https:\/\/doi.org\/10.21986\/CAIDA.DATA.AS-RANK","DOI":"10.21986\/CAIDA.DATA.AS-RANK"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.11.2021.0026"},{"volume-title":"Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism. Com","year":"2004","author":"European Commission","key":"e_1_3_2_1_6_1","unstructured":"European Commission. 2004. Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism. Com (2004), 702."},{"volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","year":"2016","author":"Cunha \u00cdtalo","key":"e_1_3_2_1_7_1","unstructured":"\u00cdtalo Cunha, Pietro Marchetta, Matt Calder, Yi-Ching Chiu, Bruno VA Machado, Antonio Pescap\u00e8, Vasileios Giotsas, Harsha V Madhyastha, and Ethan Katz-Bassett. 2016. Sibyl: a practical Internet route oracle. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 325--344."},{"volume-title":"Retrieved","year":"2024","author":"National Coordinator for Security, Counterterrorism.","key":"e_1_3_2_1_8_1","unstructured":"National Coordinator for Security, Counterterrorism. Ministry of Security, and Justice. 2024. Critical Infrastructure (protection) | National Coordinator for Security and Counterterrorism. Retrieved March 28, 2024 from https:\/\/english.nctv.nl\/topics\/critical-infrastructure-protection"},{"volume-title":"On inferring autonomous system relationships in the Internet","year":"2001","author":"Gao Lixin","key":"e_1_3_2_1_9_1","unstructured":"Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on networking 9, 6 (2001), 733--745."},{"volume-title":"Stable Internet routing without global coordination","year":"2001","author":"Gao Lixin","key":"e_1_3_2_1_10_1","unstructured":"Lixin Gao and Jennifer Rexford. 2001. Stable Internet routing without global coordination. IEEE\/ACM Transactions on networking 9, 6 (2001), 681--692."},{"volume-title":"Are we there yet? On RPKI's deployment and security. Cryptology ePrint Archive","year":"2016","author":"Gilad Yossi","key":"e_1_3_2_1_11_1","unstructured":"Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, and Haya Shulman. 2016. Are we there yet? On RPKI's deployment and security. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363987"},{"volume-title":"Proceedings of the 7th Python in Science Conference, Ga\u00ebl Varoquaux, Travis Vaught, and Jarrod Millman (Eds.). Pasadena, CA USA, 11--15","author":"Hagberg Aric A.","key":"e_1_3_2_1_13_1","unstructured":"Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. 2008. Exploring Network Structure, Dynamics, and Function using NetworkX. In Proceedings of the 7th Python in Science Conference, Ga\u00ebl Varoquaux, Travis Vaught, and Jarrod Millman (Eds.). Pasadena, CA USA, 11--15."},{"volume-title":"21th USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","year":"2024","author":"Holterbach Thomas","key":"e_1_3_2_1_14_1","unstructured":"Thomas Holterbach, Thomas Alfroy, Amreesh D. Phokeer, Alberto Dainotti, and Cristel Pelsser. 2024. A System to Detect Forged-Origin Hijacks. In 21th USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). USENIX Association."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624799"},{"volume-title":"Retrieved","year":"2020","author":"Krebs Brian","key":"e_1_3_2_1_16_1","unstructured":"Brian Krebs. 2020. Not just another BGP Hijack. Retrieved March 29, 2024 from https:\/\/manrs.org\/2020\/04\/not-just-another-bgp-hijack\/"},{"volume-title":"Retrieved","year":"2022","author":"Krebs Brian","key":"e_1_3_2_1_17_1","unstructured":"Brian Krebs. 2022. DDoS Mitigation Firm Has History of Hijacks. Retrieved March 29, 2024 from https:\/\/krebsonsecurity.com\/2016\/09\/ddos-mitigation-firm-has-history-of-hijacks\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624806"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107377"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3270565"},{"volume-title":"Characterizing Mail Service Provider Usage. In ACM Internet Measurement Conference (IMC'21)","author":"Liu Enze","key":"e_1_3_2_1_23_1","unstructured":"Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M. Voelker. 2021. Who's Got Your Mail? Characterizing Mail Service Provider Usage. In ACM Internet Measurement Conference (IMC'21). ACM, Virtual Event."},{"volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation. 367--380","year":"2006","author":"Madhyastha Harsha V","key":"e_1_3_2_1_24_1","unstructured":"Harsha V Madhyastha, Tomas Isdal, Michael Piatek, Colin Dixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. 2006. iPlane: An information plane for distributed services. In Proceedings of the 7th symposium on Operating systems design and implementation. 367--380."},{"volume-title":"Retrieved","year":"2018","author":"Madory Doug","key":"e_1_3_2_1_25_1","unstructured":"Doug Madory. 2018. Recent Routing Incidents: Using BGP to Hijack DNS and more. Retrieved March 29, 2024 from https:\/\/www.lacnic.net\/innovaportal\/file\/3207\/1\/dougmadory_lacnic_30_rosario.pdf"},{"volume-title":"Retrieved","year":"2022","author":"Madory Doug","key":"e_1_3_2_1_26_1","unstructured":"Doug Madory. 2022. What can be learned from recent BGP hijacks targeting cryptocurrency services? Retrieved March 29, 2024 from https:\/\/www.kentik.com\/blog\/bgp-hijacks-targeting-cryptocurrency-services\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064257"},{"volume-title":"Retrieved","year":"2024","author":"NOS.","key":"e_1_3_2_1_28_1","unstructured":"NOS. 2024. The US government can access emails from Dutch governments and critical companies. Retrieved March 28, 2024 from https:\/\/nos.nl\/artikel\/2510923-amerikaanse-overheid-kan-bij-e-mail-van-nederlandse-overheden-en-kritieke-bedrijven"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487825"},{"volume-title":"Algorithms in c, part 5: graph algorithms","author":"Sedgewick Robert","key":"e_1_3_2_1_30_1","unstructured":"Robert Sedgewick. 2001. Algorithms in c, part 5: graph algorithms, third edition (third ed.). Addison-Wesley Professional."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA58422.2023.10198985"},{"volume-title":"Bias in Internet Measurement Platforms. In 2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE, 1--10","year":"2023","author":"Sermpezis Pavlos","key":"e_1_3_2_1_32_1","unstructured":"Pavlos Sermpezis, Lars Prehn, Sofia Kostoglou, Marcel Flores, Athena Vakali, and Emile Aben. 2023. Bias in Internet Measurement Platforms. In 2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE, 1--10."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM55787.2022.9965155"},{"volume-title":"2015 IFIP Networking Conference (IFIP Networking). IEEE, 1--9.","year":"2015","author":"Tao Narisu","key":"e_1_3_2_1_34_1","unstructured":"Narisu Tao, Xu Chen, and Xiaoming Fu. 2015. As path inference: From complex network perspective. In 2015 IFIP Networking Conference (IFIP Networking). IEEE, 1--9."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"}],"event":{"name":"ANRW '24: Applied Networking Research Workshop","sponsor":["Internet Society Internet Society","SIGCOMM ACM Special Interest Group on Data Communication","IRTF Internet Research Task Force"],"location":"Vancouver AA Canada","acronym":"ANRW '24"},"container-title":["Proceedings of the Applied Networking Research Workshop on zzz"],"original-title":[],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T10:25:57Z","timestamp":1721125557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3673422.3674899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,20]]},"references-count":32,"alternative-id":["10.1145\/3673422.3674899","10.1145\/3673422"],"URL":"https:\/\/doi.org\/10.1145\/3673422.3674899","relation":{},"subject":[],"published":{"date-parts":[[2024,7,20]]},"assertion":[{"value":"2024-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}