Information Technology Reference
In-Depth Information
information. Being contrasted with flooding or IRV, CoISM has higher informa-
tion transmission eciency and lower communication cost. Additionally, CoISM
is incentive and builds ASs reward on its invocation.
References
1. Murphy, S.: BGP Security Vulnerabilities Analysis. RFC 4272, IETF (2006)
2. Ola, N., Constantinos, D.: Beware of BGP Attacks. Computer Communication
Review 34(2), 1-8 (2004)
3. Butler, K.: A Survey of BGP Security Issues and Solutions. Proceedings of the
IEEE 98, 100-122 (2010)
4. Rensys Blog, http://www.renesys.com/2008/02/Pakistan-hijacks-youtube-1/
5. Stephen, K., Charles, L., Karen, S.: Secure Border Gateway Protocol (S-BGP).
IEEE Journal on Selected Areas in Communications (JSAC) 18(4), 582-592 (2000)
6. Cisco, ftp://ftp-end.cisco.com/sobgp/presentations/BCR-soBGP.pdf
7. Van, P.C.O., Wan, T., Evangelos, K.: On Interdomain Routing Security and
Pretty Secure BGP (psBGP). ACM Transactions on Information and System Se-
curity 10(3), 1-41 (2005)
8. Yan, H., Oliveira, R., Burnett, K.: BGPmon: A real-time, scalable, extensible mon-
itoring system. In: Cybersecurity Applications and Technologies Conference for
Homeland Security (CATCH), pp. 212-223. IEEE Computer Society Press, Los
Angels (2009)
9. Looking Glasses, http://www.traceroute.org
10. University of oregon route views project, http://www.routeviews.org/
11. Internet Routing Registry, http://www.irr.net/index.html
12. The RIPE NCC MyASN service, http://www.ris.ripe.net/myasn.Html
13. GRADUS, http://www.renesys.com/index.shtml
14. Georgos, S., Michalis, F.: Analyzing BGP Policies: Methodology and Tool. In:
IEEE INFOCOM, pp. 1640-1651. IEEE Society Press, New York (2004)
15. Goodell, G., Aiello, W., Grin, T.: Working around BGP: An incremental ap-
proach to improving security and accuracy of inter-domain routing. In: ISOC
NDSS, pp. 75-85. National Security Agency Press, San Diego (2003)
16. Pei, D., Lad, M., Massey, D., Zhang, L.: Route Diagnosis in Path Vector Protocols.
Technical Report TR040039, UCLA CSD (2004)
17. Yu, H., Rexford, J., Felten, E.W.: A distributed reputation approach to cooperative
Internet routing protection. In: Secure Network Protocols, pp. 73-78. IEEE Society
Press, New York (2005)
Search WWH ::




Custom Search