Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Listen and Whisper: Security Previous: Acknowledgments

Bibliography

1
Cisco ios netflow.
https://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.

2
Gnu zebra router implementation.
https://www.zebra.org/.

3
Internet Corporation for Assigned Names and Numbers.
https://www.icann.org/.

4
Internet routing registry.
https://www.irr.net/.
Version current January 2003.

5
libpcap utility.
https://sourceforge.net/projects/libpcap.

6
Microsoft port 1433 vulnerability.
http:/lists.insecure.org/lists/vuln-dev/2002/Aug/0073.html.

7
Ripe ncc.
https://www.ripe.net.

8
Routeviews.
https://www.routeviews.org/.

9
Sprint IPMON project.
https://ipmon.sprint.com/.

10
Trends in dos attack technology.
https://www.cert.org/archive/pdf/DoS_trends.pdf.

11
J. Arkko and P. Nikander.
How to authenticate unknown principals without trusted parties.
In Proc. Security Protocols Workshop 2002, April 2002.

12
M. Bellare and D. Micciancio.
A new paradigm for collision-free hashing: Incrementality at reduced cost.
volume 1223 of Lecture Notes in Computer Science. Springer Verlag, 1997.

13
I. Blake, G. Serossi, and N. Smart.
Elliptic Curves in Cryptography.
Cambridge University Press, 2000.

14
V. J. Bono.
7007 explanation and apology.
https://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html.

15
R. Clarke.
Conventional public key infrastructure: An artefact ill-fitted to the needs of the information society.
Technical report.
https://www.anu.edu.au/people/Roger.Clarke/II/PKIMisFit.html.

16
D. Davis.
Compliance defects in public key cryptography.
In Proc. 6th USENIX Security Symposium, 1996.

17
C. Ellison and B. Schneier.
Ten risks of PKI: What you're not being told about public key infrastructure.
Computer Security Journal, 16(1):1-7, 2000.
Available online at URL https://www.counterpane.com/pki-risks.html.

18
L. Gao and J. Rexford.
Stable internet routing without global coordination.
In IEEE/ACM Transactions on Networking, 2001.

19
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin.
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing.
In Proc. of NDSS, San Diego, CA, USA, Feb. 2003.

20
Y. Hu, D. B. Johnson, and A. Perrig.
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks.
In Proc. of WMCSA, June 2002.

21
Y. Hu, A. Perrig, and D. B. Johnson.
Wormhole detection in wireless ad hoc networks.
Technical Report TR01-384, Department of Computer Science, Rice University, Dec. 2001.

22
Y. Hu, A. Perrig, and D. B. Johnson.
Efficient security mechanisms for routing protocols.
In Proc. of NDSS'03, February 2003.

23
S. Kent, C. Lynn, and K. Seo.
Design and analysis of the Secure Border Gateway Protocol (S-BGP).
In Proc. of DISCEX '00.

24
S. Kent, C. Lynn, and K. Seo.
Secure Border Gateway Protocol (Secure-BGP).
IEEE Journal on Selected Areas of Communications, 18(4):582-592, Apr. 2000.

25
R. Mahajan, D. Wetherall, and T. Anderson.
Understanding BGP misconfigurations.
In Proc. ACM SIGCOMM Conference, Pittsburg, Aug. 2002.

26
Z. Mao, J. Rexford, J. Wang, and R. H. Katz.
Towards an accurate AS-level traceroure tool.
In ACM SIGCOMM, 2003.

27
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington.
Retrofitting security into Internet infrastructure protocols.
In Proc. of DISCEX '00, volume 1, pages 3-17, 1999.

28
J. Ng.
Extensions to BGP to support Secure Origin BGP (sobgp).
Internet Draft draft-ng-sobgp-bgp-extensions-00, Oct. 2002.

29
V. N. Padmanabhan and D. R. Simon.
Secure traceroute to detect faulty or malicious routing.
In Proc. HotNets-I, 2002.

30
V. Paxson and S.Floyd.
Wide area traffic: Failure of poisson modeling.
In Proc. ACM SIGCOMM, 1994.

31
B. Smith and J. Garcia-Luna-Aceves.
Securing the Border Gateway Routing Protocol.
In Proc. Global Internet '96, London, UK, November 1996.

32
L. Subramanian, S.Agarwal, J.Rexford, and R. H. Katz.
Characterizing the Internet hierarchy from multiple vantage points.
In IEEE INFOCOM, New York, 2002.

33
R. Thomas.
https://www.cmyru.com.

34
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang.
An analysis of BGP multiple origin AS (MOAS) conflicts.
In ACM SIGCOMM IMW, 2001.

35
D. Zhu, M. Gritter, and D. Cheriton.
Feedback based routing.
In Proc. of HotNets-I, October 2002.



116 2004-02-12