Scapy. http://www.secdev.org/projects, 2009. ,
7007 Explanation and Apology, 1997. ,
A Survey of BGP Security Issues and Solutions, Proceedings of the IEEE, vol.98, issue.1, 2008. ,
DOI : 10.1109/JPROC.2009.2034031
Modeling adoptability of secure BGP protocol, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, p.290, 2006. ,
DOI : 10.1145/1159913.1159946
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.608.2333
Active BGP Probing, 2009. ,
DOI : 10.1016/j.micpro.2007.05.001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.183
BGP Vulnerability Testing: Separating Fact from FUD, p.28, 2003. ,
The Generalized TTL Security Mechanism (GTSM), RFCExperimental), vol.3682, 2004. ,
DOI : 10.17487/rfc5082
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, Proc. NDSS, 2003. ,
Protection of BGP Sessions via the TCP MD5 Signature Option, RFC, vol.2385, 1998. ,
DOI : 10.17487/rfc2385
Extensions to BGP to support secure origin BGP (sobgp). Network Working Group, 2002. ,
Design and analysis of the Secure Border Gateway Protocol (S-BGP), Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, 2000. ,
DOI : 10.1109/DISCEX.2000.824939
Nmap ? Free Security Scanner For Network Exploration & Security Audits, 2009. ,
Understanding BGP misconfiguration, Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pp.3-16, 2002. ,
DOI : 10.1145/633025.633027
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1862
Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew, GLOBECOM 2009, 2009 IEEE Global Telecommunications Conference, 2008. ,
DOI : 10.1109/GLOCOM.2009.5425977
Beware of BGP attacks, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.1-8, 2004. ,
DOI : 10.1145/997150.997152
BGPDNS, Using BGP topology information for DNS RR sorting a scalable way of multi-homing, 2002. ,
Stealing The Internet, 2009. ,
Understanding the network-level behavior of spammers, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, p.302, 2006. ,
BGP-4) RFC 4271 (Draft Standard), A Border Gateway Protocol, vol.4, 2006. ,
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance, IEEE Journal on Selected Areas in Communications, vol.24, issue.10, p.1901, 2006. ,
DOI : 10.1109/JSAC.2006.877218
BGP Route Flap Damping, RFC 2439 (Proposed Standard), 1998. ,
DOI : 10.17487/rfc2439
Slipping in the Window, TCP Reset attacks, 2004. ,