[1]Rekhter Y,Li T.A Border Gateway Protocol 4 (BGP4)[S]. RFC 1771, 1995.
[2]Nordstrom O,Dovrolis C. Beware of BGP Attacks[J].ACM SIGGCOMM Computer Communications Review,2004,34(2):18.
[3]Convery S, Cook D, Franz M. An Attack Tree for the Border Gateway Protocol[S]. InternetDraft, 2004.
[4]Kim J,Ko S Y, Nicol D M,et al. A BGP Attack Against Traffic Engineering[C]∥Proc of the 2004 Winter Simulation Conf, 2004:326.
[5]Mahajan R,Wetherall D,Anderson T.Understanding BGP Misconfiguration[C]∥Proc of the 2002 Conf on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2002:316.
[6]Gao L. On Inferring Autonomous System Relationships in the Internet[J]. Journal IEEE/ACM Trans on Networking, 2001,9(6):733745.
[7]BGP Best Path Selection Algorithm[EB/OL].[20060516].http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094431.shtml.
[8]Riley G F. LargeScale Network Simulations with GTNetS[C]∥Proc of the 2003 Winter Simulation Conf, 2003:676684.
[9]http://www.ece.gatech.edu/research/labs/MANIACS/BGP++/.
[10]Subramanian L,Agarwal S,Rexford J,et al. Characterizing the Internet Hierarchy from Multiple Vantage Points[C]∥Proc of IEEE INFOCOM’02, 2002:618627.
[11]http://asrank.caida.org/.
[12]Index of /data/2009[EB/OL].[20091010]. http://asrank.caida.org/data/2009/. |