Next: About this document ...
Up: Listen and Whisper: Security
Previous: Acknowledgments
-
- 1
-
Cisco ios netflow.
https://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.
- 2
-
Gnu zebra router implementation.
https://www.zebra.org/.
- 3
-
Internet Corporation for Assigned Names and Numbers.
https://www.icann.org/.
- 4
-
Internet routing registry.
https://www.irr.net/.
Version current January 2003.
- 5
-
libpcap utility.
https://sourceforge.net/projects/libpcap.
- 6
-
Microsoft port 1433 vulnerability.
http:/lists.insecure.org/lists/vuln-dev/2002/Aug/0073.html.
- 7
-
Ripe ncc.
https://www.ripe.net.
- 8
-
Routeviews.
https://www.routeviews.org/.
- 9
-
Sprint IPMON project.
https://ipmon.sprint.com/.
- 10
-
Trends in dos attack technology.
https://www.cert.org/archive/pdf/DoS_trends.pdf.
- 11
-
J. Arkko and P. Nikander.
How to authenticate unknown principals without trusted parties.
In Proc. Security Protocols Workshop 2002, April 2002.
- 12
-
M. Bellare and D. Micciancio.
A new paradigm for collision-free hashing: Incrementality at reduced
cost.
volume 1223 of Lecture Notes in Computer Science. Springer
Verlag, 1997.
- 13
-
I. Blake, G. Serossi, and N. Smart.
Elliptic Curves in Cryptography.
Cambridge University Press, 2000.
- 14
-
V. J. Bono.
7007 explanation and apology.
https://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html.
- 15
-
R. Clarke.
Conventional public key infrastructure: An artefact ill-fitted to the
needs of the information society.
Technical report.
https://www.anu.edu.au/people/Roger.Clarke/II/PKIMisFit.html.
- 16
-
D. Davis.
Compliance defects in public key cryptography.
In Proc. 6th USENIX Security Symposium, 1996.
- 17
-
C. Ellison and B. Schneier.
Ten risks of PKI: What you're not being told about public key
infrastructure.
Computer Security Journal, 16(1):1-7, 2000.
Available online at URL
https://www.counterpane.com/pki-risks.html.
- 18
-
L. Gao and J. Rexford.
Stable internet routing without global coordination.
In IEEE/ACM Transactions on Networking, 2001.
- 19
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin.
Working around BGP: An incremental approach to improving security
and accuracy of interdomain routing.
In Proc. of NDSS, San Diego, CA, USA, Feb. 2003.
- 20
-
Y. Hu, D. B. Johnson, and A. Perrig.
SEAD: Secure efficient distance vector routing for mobile wireless
ad hoc networks.
In Proc. of WMCSA, June 2002.
- 21
-
Y. Hu, A. Perrig, and D. B. Johnson.
Wormhole detection in wireless ad hoc networks.
Technical Report TR01-384, Department of Computer Science, Rice
University, Dec. 2001.
- 22
-
Y. Hu, A. Perrig, and D. B. Johnson.
Efficient security mechanisms for routing protocols.
In Proc. of NDSS'03, February 2003.
- 23
-
S. Kent, C. Lynn, and K. Seo.
Design and analysis of the Secure Border Gateway Protocol
(S-BGP).
In Proc. of DISCEX '00.
- 24
-
S. Kent, C. Lynn, and K. Seo.
Secure Border Gateway Protocol (Secure-BGP).
IEEE Journal on Selected Areas of Communications,
18(4):582-592, Apr. 2000.
- 25
-
R. Mahajan, D. Wetherall, and T. Anderson.
Understanding BGP misconfigurations.
In Proc. ACM SIGCOMM Conference, Pittsburg, Aug. 2002.
- 26
-
Z. Mao, J. Rexford, J. Wang, and R. H. Katz.
Towards an accurate AS-level traceroure tool.
In ACM SIGCOMM, 2003.
- 27
-
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington.
Retrofitting security into Internet infrastructure protocols.
In Proc. of DISCEX '00, volume 1, pages 3-17, 1999.
- 28
-
J. Ng.
Extensions to BGP to support Secure Origin BGP (sobgp).
Internet Draft draft-ng-sobgp-bgp-extensions-00, Oct. 2002.
- 29
-
V. N. Padmanabhan and D. R. Simon.
Secure traceroute to detect faulty or malicious routing.
In Proc. HotNets-I, 2002.
- 30
-
V. Paxson and S.Floyd.
Wide area traffic: Failure of poisson modeling.
In Proc. ACM SIGCOMM, 1994.
- 31
-
B. Smith and J. Garcia-Luna-Aceves.
Securing the Border Gateway Routing Protocol.
In Proc. Global Internet '96, London, UK, November 1996.
- 32
-
L. Subramanian, S.Agarwal, J.Rexford, and R. H. Katz.
Characterizing the Internet hierarchy from multiple vantage points.
In IEEE INFOCOM, New York, 2002.
- 33
-
R. Thomas.
https://www.cmyru.com.
- 34
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang.
An analysis of BGP multiple origin AS (MOAS) conflicts.
In ACM SIGCOMM IMW, 2001.
- 35
-
D. Zhu, M. Gritter, and D. Cheriton.
Feedback based routing.
In Proc. of HotNets-I, October 2002.
116
2004-02-12