Supplemental Material
- The New Threat: Targeted Internet Traffic Misdirection. http://www.renesys.com/2013/11/mitm-internet-hijacking/.Google Scholar
- The CAIDA AS Relationships Dataset. http://www.caida.org/data/as-relationships/, Jan. 2016.Google Scholar
- M. Aertsen, M. Korczynski, G. C. M. Moura, S. Tajalizadehkhoob, and J. van den Berg. No domain left behind: is Let's Encrypt democratizing encryption? In ANRW, pages 48--54. ACM, 2017. Google ScholarDigital Library
- H. Ballani, P. Francis, and X. Zhang. A study of prefix hijacking and interception in the Internet. In J. Murai and K. Cho, editors, SIGCOMM, pages 265--276. ACM, 2007. Google ScholarDigital Library
- R. Barnesm, J. Hoffman-Andrews, and J. Kasten. Automatic certificate management environment (ACME). https://tools.ietf.org/html/draft-ietf-acme-acme-08, October 2017. Internet-Draft.Google Scholar
- L. Blunk, M. Karir, and C. Labovitz. Multi-threaded routing toolkit (mrt) routing information export format, October 2011. RFC6396.Google Scholar
- A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira. One Hop for RPKI, One Giant Leap for BGP Security. In HotNets, pages 10:1--10:7. ACM, 2015. Google ScholarDigital Library
- A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira. One hop for rpki, one giant leap for bgp security. In J. de Oliveira, J. Smith, K. J. Argyraki, and P. Levis, editors, HotNets, pages 10:1--10:7. ACM, 2015. Google ScholarDigital Library
- A. Cohen, Y. Gilad, A. Herzberg, and M. Schapira. Jumpstarting BGP Security with Path-End Validation. In SIGCOMM, pages 342--355. ACM, 2016. Google ScholarDigital Library
- D. Cooper, E. Heilman, K. Brogle, L. Reyzin, and S. Goldberg. On the risk of misbehaving RPKI authorities. In HotNets, pages 16:1--16:7. ACM, 2013. Google ScholarDigital Library
- J. Durand, I. Pepelnjak, and G. Doering. Bgp operations and security, February 2015. RFC7454.Google Scholar
- Y. Gilad, A. Cohen, A. Herzberg, M. Schapira, and H. Shulman. Are We There Yet? On RPKI's Deployment and Security. In NDSS, 2017.Google ScholarCross Ref
- Y. Gilad, S. Goldberg, K. Sriram, and J. Snijders. The Use of Maxlength in the RPKI. https://tools.ietf.org/html/draft-yossigi-rpkimaxlen-01, September 2017. Internet-Draft.Google Scholar
- Y. Gilad and A. Herzberg. Plug-and-Play IP Security: Anonymity Infrastructure instead of PKI. In ESORICS, pages 255--272. Springer, 2013.Google ScholarCross Ref
- Y. Gilad, O. Sagga, and S. Goldberg. Maxlength considered harmful to the RPKI. In CoNEXT, pages 101--107, 2017. Google ScholarDigital Library
- P. Gill, M. Schapira, and S. Goldberg. Modeling on Quicksand: Dealing with the Scarcity of Ground Truth in Interdomain Routing Data. Computer Communication Review, 42(1):40--46, 2012. Google ScholarDigital Library
- T. Hlavacek. ROV adoption rate measurement. https://2017.peeringdays.eu/file.php?id=16&n=23_7_cz.nic_hlavacek.pdf, March 2017. CEE Peering Days 2017.Google Scholar
- T. Hlavacek, A. Herzberg, H. Shulman, and M. Waidner. Practical experience: Methodologies for measuring route origin validation. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 634--641, June 2018.Google ScholarCross Ref
- D. Iamartino, C. Pelsser, and R. Bush. Measuring BGP Route Origin Registration and Validation. In PAM, volume 8995 of LNCS, pages 28--40. Springer, 2015.Google Scholar
- J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. In ICNP, pages 290--299. IEEE Computer Society, 2006. Google ScholarDigital Library
- M. Lepinski and S. Kent. An infrastructure to support secure internet routing, February 2012. RFC6480.Google Scholar
- M. Lepinski and K. Sriram. Bgpsec protocol specification, September 2017. RFC8205.Google Scholar
- R. Lychev, S. Goldberg, and M. Schapira. BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? In SIGCOMM, pages 171--182. ACM, 2013. Google ScholarDigital Library
- A. Manousis, R. Ragsdale, B. Draffin, A. Agrawal, and V. Sekar. Shedding Light on the Adoption of Let's Encrypt. CoRR, abs/1611.00469, 2016.Google Scholar
- NIST. RPKI Monitor. http://rpki-monitor.antd.nist.gov/, 2015.Google Scholar
- Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (bgp-4), January 2006. RFC4271.Google Scholar
- A. Reuter, R. Bush, Í. Cunha, E. Katz-Bassett, T. C. Schmidt, and M. Wählisch. Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering. ACM Computer Communication Review, 2018. Google ScholarDigital Library
- RIPE NCC. YouTube Hijacking: A RIPE NCC RIS case study, March 2008.Google Scholar
- J. Snijders. BGP Large Communities. SINOG 4, Ljubljana, Slovenia, May 2017.Google Scholar
- J. Snijders. Deprecation of bgp path attribute values 30, 31, 129, 241, 242, and 243, February 2017. RFC8093.Google Scholar
- L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security Mechanisms for BGP. In NSDI, pages 127--140. USENIX, 2004. Google ScholarDigital Library
- A. Toonk. Hijack Event Today by Indosat. http://www.bgpmon.net/hijack-event-today-by-indosat/.Google Scholar
- A. Toonk. Turkey Hijacking IP Addresses for Popular Global DNS Providers. BGPMon.Google Scholar
- P.-A. Vervier, O. Thonnard, and M. Dacier. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS. The Internet Society, 2015.Google ScholarCross Ref
- M. Wählisch, O. Maennel, and T. C. Schmidt. Towards Detecting BGP Route Hijacking Using the RPKI. SIGCOMM Comput. Commun. Rev., 42(4):103--104, Aug. 2012. Google ScholarDigital Library
- M. Wählisch, R. Schmidt, T. C. Schmidt, O. Maennel, S. Uhlig, and G. Tyson. RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem. In Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York, 2015. ACM. Google ScholarDigital Library
- R. White. Deployment Considerations for Secure Origin BGP (soBGP)., June 2003.Google Scholar
Recommendations
E-Government towards good governance: A global appraisal
This research paper is aimed to illustrate the roles of e-Government technology in modern management. It has discussed the contribution of the e-Government technology towards Good Governance in the selected developing and developed countries. It ...
The Path to Good E-Governance: A Study on Democratic E-Participation in China
ICEE '12: Proceedings of the 2012 3rd International Conference on E-Business and E-Government - Volume 02Sustainable development of the democratic eparticipation has brought enormous pressure to China government. Therefore e-governance should accelerate the pace of reform to meet these changes. The goal of this article is trying to find the path to reach ...
An E-Government Approach for Bridging the Participation Gap in Achieving Participatory Good Governance
Electronic Government e-Government has been considered as an essential strategy for many governments in their efforts to ensure qualities of participatory good governance. Various e-Government applications have been recognised as effective methods of ...
Comments