{"id":"https://openalex.org/W18015684","doi":"https://doi.org/10.1007/978-3-642-36818-9_54","title":"Emulation on the Internet Prefix Hijacking Attack Impaction","display_name":"Emulation on the Internet Prefix Hijacking Attack Impaction","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W18015684","doi":"https://doi.org/10.1007/978-3-642-36818-9_54","mag":"18015684"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-36818-9_54","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_54","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_54.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_54.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101603452","display_name":"Jinjing Zhao","orcid":"https://orcid.org/0000-0001-5404-6002"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jinjing Zhao","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","Beijing Institute of System Engineering (China)","National Key Laboratory of Science and Technology on Information System Security (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100700433","display_name":"Yan Wen","orcid":"https://orcid.org/0009-0002-6425-5056"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan Wen","raw_affiliation_strings":["Beijing Institute of System Engineering, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","National Key Laboratory of Science and Technology on Information System Security (China)","Beijing Institute of System Engineering (China)"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of System Engineering, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security (China)","institution_ids":[]},{"raw_affiliation_string":"Beijing Institute of System Engineering (China)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101603452"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01014626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"485","last_page":"489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8180898427963257},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.7754713296890259},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7000561952590942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6206573247909546},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5552416443824768},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.5313789248466492},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.5097147822380066},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.220270037651062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8180898427963257},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.7754713296890259},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7000561952590942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6206573247909546},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5552416443824768},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5313789248466492},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.5097147822380066},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.220270037651062},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-36818-9_54","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_54","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_54.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01480207v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01480207","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, &#x27E8;10.1007/978-3-642-36818-9_54&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-36818-9_54","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_54","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_54.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W18015684.pdf","grobid_xml":"https://content.openalex.org/works/W18015684.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1550619482","https://openalex.org/W1811828243","https://openalex.org/W1846523235","https://openalex.org/W2003590000","https://openalex.org/W2005515979","https://openalex.org/W2065283652","https://openalex.org/W2134313999","https://openalex.org/W2136680211","https://openalex.org/W2139789847","https://openalex.org/W2147575919","https://openalex.org/W2153724511","https://openalex.org/W2162260997","https://openalex.org/W2162695692","https://openalex.org/W2162877415","https://openalex.org/W2165743744","https://openalex.org/W2165960032","https://openalex.org/W2167988770","https://openalex.org/W2408417652","https://openalex.org/W2522638953","https://openalex.org/W2587378605","https://openalex.org/W4239301748"],"related_works":["https://openalex.org/W1987732684","https://openalex.org/W2286465138","https://openalex.org/W637393809","https://openalex.org/W2808742736","https://openalex.org/W3126526144","https://openalex.org/W1526983901","https://openalex.org/W3021299372","https://openalex.org/W2184211279","https://openalex.org/W2346278349","https://openalex.org/W3139094847"],"abstract_inverted_index":{"There":[0],"have":[1],"been":[2],"many":[3],"incidents":[4],"of":[5,52,83,97],"IP":[6,84],"prefix":[7,44,66,85,101],"hijacking":[8,45,53,67,86,102],"by":[9],"BGP":[10],"protocol":[11],"in":[12,55,69],"the":[13,80,94,100],"Internet.":[14],"Attacks":[15],"may":[16],"hijack":[17],"victim\u2019s":[18],"address":[19],"space":[20],"to":[21],"disrupt":[22],"network":[23,41,98],"services":[24],"or":[25],"perpetrate":[26],"malicious":[27],"activities":[28],"such":[29],"as":[30],"spamming":[31],"and":[32,43,79],"DoS":[33],"attacks":[34],"without":[35],"disclosing":[36],"identity.":[37],"The":[38,59,90],"relation":[39],"between":[40],"topology":[42],"influence":[46],"is":[47,62,77],"presented":[48],"for":[49,64],"all":[50],"sorts":[51],"events":[54,68,87],"different":[56,70],"Internet":[57,74],"layers.":[58,71],"impaction":[60,82],"parameter":[61],"analyzed":[63],"typical":[65],"A":[72],"large":[73],"emulation":[75],"environment":[76],"constructed":[78],"attack":[81],"are":[88],"evaluated.":[89],"results":[91],"assert":[92],"that":[93],"hierarchical":[95],"nature":[96],"influences":[99],"greatly.":[103]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
