{"id":"https://openalex.org/W4360770736","doi":"https://doi.org/10.1109/access.2023.3261128","title":"On the Effectiveness of BGP Hijackers That Evade Public Route Collectors","display_name":"On the Effectiveness of BGP Hijackers That Evade Public Route Collectors","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4360770736","doi":"https://doi.org/10.1109/access.2023.3261128"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3261128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10078883.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10078883.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085555268","display_name":"Alexandros Milolidakis","orcid":"https://orcid.org/0000-0002-3275-040X"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alexandros Milolidakis","raw_affiliation_strings":["KTH Royal Institute of Technology, 28 Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, 28 Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024991410","display_name":"Tobias B\u00fchler","orcid":"https://orcid.org/0000-0002-8876-1546"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Tobias B\u00fchler","raw_affiliation_strings":["ETH Z\\\"{u}rich, Z\\\"{u}rich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\\\"{u}rich, Z\\\"{u}rich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100615242","display_name":"Kunyu Wang","orcid":"https://orcid.org/0000-0003-0297-8216"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Kunyu Wang","raw_affiliation_strings":["KTH Royal Institute of Technology, 28 Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, 28 Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058517041","display_name":"Marco Chiesa","orcid":"https://orcid.org/0000-0002-9675-9729"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marco Chiesa","raw_affiliation_strings":["KTH Royal Institute of Technology, 28 Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, 28 Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070110259","display_name":"Laurent Vanbever","orcid":"https://orcid.org/0000-0003-1455-4381"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Laurent Vanbever","raw_affiliation_strings":["ETH Z\\\"{u}rich, Z\\\"{u}rich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\\\"{u}rich, Z\\\"{u}rich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009296594","display_name":"Stefano Vissicchio","orcid":"https://orcid.org/0000-0003-3699-8127"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stefano Vissicchio","raw_affiliation_strings":["Department of Computer Science, University College London (UCL), WC1E 6BT London, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University College London (UCL), WC1E 6BT London, U.K","institution_ids":["https://openalex.org/I45129253"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1078,"currency":"EUR","value_usd":1162,"provenance":"openapc"},"fwci":3.171,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":10,"citation_normalized_percentile":{"value":0.999976,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"31092","last_page":"31124"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/peering","display_name":"Peering","score":0.67460823},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.4899687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248864},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6750851},{"id":"https://openalex.org/C95981142","wikidata":"https://www.wikidata.org/wiki/Q772532","display_name":"Peering","level":3,"score":0.67460823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6189968},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.4899687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4771825},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41075492},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.39963543},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20405132},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.07555261}],"mesh":[],"locations_count":4,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3261128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10078883.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11850/610074","pdf_url":"https://www.research-collection.ethz.ch/bitstream/20.500.11850/610074/2/On_the_Effectiveness_of_BGP_Hijackers_That_Evade_Public_Route_Collectors.pdf","source":{"id":"https://openalex.org/S4306402302","display_name":"Repository for Publications and Research Data (ETH Zurich)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35440088","host_organization_name":"ETH Zurich","host_organization_lineage":["https://openalex.org/I35440088"],"host_organization_lineage_names":["ETH Zurich"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10168984/","pdf_url":"https://discovery.ucl.ac.uk/10168984/1/On_the_Effectiveness_of_BGP_Hijackers_That_Evade_Public_Route_Collectors.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":["University College London"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10168984/1/On_the_Effectiveness_of_BGP_Hijackers_That_Evade_Public_Route_Collectors.pdf","pdf_url":"https://discovery.ucl.ac.uk/id/eprint/10168984/1/On_the_Effectiveness_of_BGP_Hijackers_That_Evade_Public_Route_Collectors.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":["University College London"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3261128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10078883.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.62,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[{"funder":"https://openalex.org/F4320320940","funder_display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","award_id":"64455"}],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W1993906333","https://openalex.org/W2038055456","https://openalex.org/W2058200382","https://openalex.org/W2069222612","https://openalex.org/W2092233407","https://openalex.org/W2100415265","https://openalex.org/W2127904496","https://openalex.org/W2133396782","https://openalex.org/W2141938573","https://openalex.org/W2162877415","https://openalex.org/W2163545003","https://openalex.org/W2308096330","https://openalex.org/W2333538671","https://openalex.org/W2414764438","https://openalex.org/W2556714538","https://openalex.org/W2562742701","https://openalex.org/W2613487677","https://openalex.org/W2788918638","https://openalex.org/W2895447227","https://openalex.org/W2897232905","https://openalex.org/W2901771268","https://openalex.org/W2903158016","https://openalex.org/W2981280544","https://openalex.org/W2983253154","https://openalex.org/W2993887313","https://openalex.org/W3007409674","https://openalex.org/W3009706734","https://openalex.org/W3088063260","https://openalex.org/W3094353319","https://openalex.org/W3136617837","https://openalex.org/W3160784735","https://openalex.org/W3162417966","https://openalex.org/W3163362950","https://openalex.org/W3172298356","https://openalex.org/W4226548863","https://openalex.org/W4302094287","https://openalex.org/W4307020346","https://openalex.org/W4307020396"],"related_works":["https://openalex.org/W334179229","https://openalex.org/W2976551561","https://openalex.org/W2777503116","https://openalex.org/W2556623958","https://openalex.org/W2154039708","https://openalex.org/W2134359286","https://openalex.org/W2099645399","https://openalex.org/W1994570980","https://openalex.org/W1793614450","https://openalex.org/W178528476"],"abstract_inverted_index":{"Routing":[0],"hijack":[1],"attacks":[2,73,100],"have":[3],"plagued":[4],"the":[5,47,120,154,165,173,180,210],"Internet":[6,134],"for":[7,209,217,242],"decades.":[8],"After":[9],"many":[10,85],"failed":[11],"mitigation":[12],"attempts,":[13],"recent":[14],"Internet-wide":[15],"BGP":[16,105,115],"monitoring":[17],"infrastructures":[18],"relying":[19],"on":[20,187,197],"distributed":[21],"route":[22,26,51,67,111,116,149,162,183],"collection":[23],"systems,":[24],"called":[25],"collectors,":[27,184],"give":[28],"us":[29],"hope":[30],"that":[31,77,119,175,202],"future":[32,56,133],"monitor":[33,188],"systems":[34,79],"can":[35],"quickly":[36],"detect":[37],"and":[38,140,194],"ultimately":[39],"mitigate":[40],"hijacks.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45,74],"investigate":[46],"effectiveness":[48],"of":[49,93,109,156],"public":[50,110],"collectors":[52,163],"with":[53,136,148,168],"respect":[54],"to":[55,62,83,103,142,171,178,182,212,220,226],"attackers":[57],"deliberately":[58],"engineering":[59],"longer":[60],"hijacks":[61,88,158,218,224],"avoid":[63],"being":[64],"recorded":[65],"by":[66,161,235],"collectors.":[68,112,150],"Our":[69],"extensive":[70],"simulations":[71],"(and":[72],"device)":[75],"show":[76,201],"monitor-based":[78],"may":[80],"be":[81,207],"unable":[82],"observe":[84],"carefully":[86],"crafted":[87],"diverting":[89],"traffic":[90],"from":[91],"thousands":[92],"ASes.":[94],"Hijackers":[95],"could":[96,206],"predict":[97,172],"whether":[98],"their":[99],"would":[101],"propagate":[102],"some":[104],"feeders":[106],"(i.e.,":[107,190],"monitors)":[108],"Then,":[113],"manipulate":[114],"propagation":[117],"so":[118],"attack":[121,181],"never":[122],"reaches":[123],"those":[124],"monitors.":[125,245],"This":[126],"observation":[127],"remains":[128],"true":[129],"when":[130],"considering":[131],"plausible":[132],"topologies,":[135],"more":[137,145],"IXP":[138],"links":[139],"up":[141],"4":[143],"times":[144],"monitors":[146,174,216],"peering":[147],"We":[151],"then":[152],"evaluate":[153],"feasibility":[155],"performing":[157],"not":[159],"observed":[160],"in":[164],"real-world.We":[166],"experiment":[167],"two":[169],"classifiers":[170],"are":[176],"dangerous":[177,215,244],"report":[179],"one":[185],"based":[186,196],"proximities":[189],"shortest":[191],"path":[192],"lengths)":[193],"another":[195],"Gao-Rexford":[198,230],"routing":[199],"policies.We":[200],"a":[203,229],"proximity-based":[204],"classifier":[205,231],"sufficient":[208],"hijacker":[211],"identify":[213],"all":[214],"announced":[219,225],"peer-to-peer":[221],"neighbors.":[222],"For":[223],"transit":[227],"networks,":[228],"reduces":[232],"wrong":[233],"inferences":[234],"\u2265":[236],"91%":[237],"without":[238],"introducing":[239],"new":[240],"misclassifications":[241],"existing":[243]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4360770736","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3}],"updated_date":"2025-01-07T11:13:28.913215","created_date":"2023-03-25"}