[1] |
REKHTER Y , LI T , HARES S . A Border Gateway Protocol 4(BGP-4)[EB/OL]. . 2006.
|
[2] |
KENT S , LYNN C , SEO K . Secure border gateway protocol (S-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000,18(4): 582-592.
|
[3] |
WHITE R . Securing BGP through secure origin BGP (soBGP)[J]. The Internet Protocol Journal, 2003,6(3): 15-22.
|
[4] |
OORSCHOT P C , WAN T , KRANAKIS E . On inter-domain routing security and pretty secure BGP (psBGP)[J].ACM Transactions on Information and System Security (TISSEC),2007,10(3):11. ACM Transactions on Information and System Security (TISSEC), 2007,10(3):11.
|
[5] |
胡湘江, 朱培栋, 龚正虎 . SE-BGP:一种 BGP 安全机制[J]. 软件学报, 2008,19(1): 167-176. HU X J , ZHU P D , GONG Z H . SE—BGP:An approach for BGP security[J].Journal of Software,2008,19 (1):167-176. Journal of Software, 2008,19(1): 167-176.
|
[6] |
王滨, 安金梁, 吴春明 ,等. 基于分治策略的BGP安全机制[J]. 通信学报, 2012,33(5): 91-98. WANG B , AN J L , WU C M ,et al. Study of BGP secure scheme based on divide and conquer strategy[J]. Journal on Communications, 2012,33(5): 91-98.
|
[7] |
KARLIN J , FORREST S , REXFORD J . Pretty good BGP:improving BGP by cautiously adopting routes[A]. Proceedings of the 2006 IEEE International Conference on Network Protocols[C]. Washingdon,DC,USA, 2006. 290-299.
|
[8] |
SUBRAMANIAN L , ROTH V , STOICA I ,et al. Listen and whisper:Security mechanisms for BGP[A]. Symposium on Networked Systems Design and Implementation (NSDI 2004)[C]. 2004. 29-31.
|
[9] |
YUN J K , BYUN C H , KIM Y . Architecture of the remote routing validation tool for BGP anomaly detection[A]. Proceedings of the 2012 ACM Research in Applied Computation Symposium[C]. CA,USA, 2012. 232-236.
|
[10] |
GAO L . On inferring autonomous system relationships in the Internet[J]. IEEE/ACM Transactions on Networking, 2001,9(6): 733-745.
|
[11] |
ZHOU S , MONDRAGON R J . The rich-club phenomenon in the Internet topology[J]. IEEE Communications Letters, 2004,8(3): 180-182.
|
[12] |
AGER B , CHATZIS N , FELDMANN A ,et al. Anatomy of a large European IXP[A]. Proceedings of the ACM SIGCOMM 2012 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication[C]. 2012. 163-174.
|
[13] |
PeeringDB[EB/OL]..2013.
|
[14] |
GIOTSAS V , ZHOU S . Valley-free violation in Internet routing—analysis based on BGP community data[A]. IEEE International Conference on Communications (ICC)[C]. 2012. 1193-1197.
|
[15] |
ORSINI C , GREGORI E , LENZINI L ,et al. Evolution of the Internet k-dense structure[J].arXiv preprint arXiv:1301.5938.2013. arXiv preprint arXiv:1301.5938. 2013.
|
[16] |
LIU X , LI A , YANG X ,et al. Passport:secure and adoptable source authentication[A]. Proceedings of the 5th USTNIX Symposium on Networked Systems Design and Implementation[C]. 2008. 365-378.
|
[17] |
ZHANG Y , YANG J , LI W ,et al. An authentication scheme for locating compromised sensor nodes in WSNs[J]. Journal of Network and Computer Applications, 2010,33(1): 50-62.
|
[18] |
University of Oregon Route Views Project[EB/OL]..2013.
|
[19] |
ZHAO M , SMITH S W , NICOL D M . Evaluating the performance impact of PKI on BGP security[A]. 4th Annual PKI R&D Workshop[C]. Gaithersburg,MD, 2005. 42-48.
|
[20] |
The SSFNET Project[EB/OL]..2013.
|