Open Access System for Information Sharing

Login Library

 

Article
Cited 3 time in webofscience Cited 4 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorSeong-Cheol Hong-
dc.contributor.authorHong-Taek Ju-
dc.contributor.authorHong, JWK-
dc.date.accessioned2016-03-31T08:50:54Z-
dc.date.available2016-03-31T08:50:54Z-
dc.date.created2013-02-04-
dc.date.issued2013-01-
dc.identifier.issn1055-7148-
dc.identifier.other2013-OAK-0000026286-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/16169-
dc.description.abstractIP prefix hijacking is a major threat to the security of the Internet routing system owing to the lack of authoritative prefix ownership information. Despite many efforts to design IP prefix hijack detection schemes, no existing design satisfies all the critical requirements of a truly effective system, i.e. to be real-time, deployable, and robust. In this paper, we present a novel approach that detects IP prefix hijacking in the current Internet environment. The focus of this work is on maintaining the Border Gateway Protocol routing infrastructure and not relying on mutual cooperation to ensure ease of deployment. In addition, we look at fingerprinting two autonomous systems that have the same IP prefix to distinguish hijacking events from legitimate routing updates. This paper proposes a practical and deployable IP prefix hijacking detection algorithm with live hosts on the Internet. Copyright (C) 2012 John Wiley & Sons, Ltd.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherWILEY-BLACKWELL-
dc.relation.isPartOfInternational Journal of Network Management-
dc.subjectBGP Security-
dc.subjectIP Prefix Hijacking-
dc.subjectFingerprinting-
dc.titleNetwork Reachability-based IP Prefix Hijacking Detection-
dc.typeArticle-
dc.contributor.college정보전자융합공학부-
dc.identifier.doi10.1002/NEM.1805-
dc.author.googleHong, SC-
dc.author.googleJu, H-
dc.author.googleHong, JWK-
dc.relation.volume23-
dc.relation.issue1-
dc.relation.startpage1-
dc.relation.lastpage15-
dc.contributor.id10154615-
dc.relation.journalInternational Journal of Network Management-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCI-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationInternational Journal of Network Management, v.23, no.1, pp.1 - 15-
dc.identifier.wosid000313725800002-
dc.date.tcdate2019-01-01-
dc.citation.endPage15-
dc.citation.number1-
dc.citation.startPage1-
dc.citation.titleInternational Journal of Network Management-
dc.citation.volume23-
dc.contributor.affiliatedAuthorHong, JWK-
dc.identifier.scopusid2-s2.0-84872351560-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc2-
dc.description.scptc3*
dc.date.scptcdate2018-05-121*
dc.type.docTypeArticle-
dc.subject.keywordAuthorBGP Security-
dc.subject.keywordAuthorIP Prefix Hijacking-
dc.subject.keywordAuthorFingerprinting-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

홍원기HONG, WON KI
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse