{"id":"https://openalex.org/W2137726184","doi":"https://doi.org/10.1109/icnp.2010.5762762","title":"TowerDefense: Deployment strategies for battling against IP prefix hijacking","display_name":"TowerDefense: Deployment strategies for battling against IP prefix hijacking","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2137726184","doi":"https://doi.org/10.1109/icnp.2010.5762762","mag":"2137726184"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2010.5762762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2010.5762762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 18th IEEE International Conference on Network Protocols","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://repository.gatech.edu/bitstreams/b11dd70f-5866-4da9-8e1d-523e3caef22a/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068802384","display_name":"Tongqing Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tongqing Qiu","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","College of Computing, Georgia Inst. of Technology, Atlanta, USA"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"College of Computing, Georgia Inst. of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113690589","display_name":"Lusheng Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lusheng Ji","raw_affiliation_strings":["AT and T Research Laboratories, Florham Park, NJ, USA","AT&T Labs---Research, Florham Park, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"AT and T Research Laboratories, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Labs---Research, Florham Park, NJ, USA#TAB#","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046419834","display_name":"Dan Pei","orcid":"https://orcid.org/0000-0002-5113-838X"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Pei","raw_affiliation_strings":["AT and T Research Laboratories, Florham Park, NJ, USA","AT&T Labs---Research, Florham Park, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"AT and T Research Laboratories, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Labs---Research, Florham Park, NJ, USA#TAB#","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065726008","display_name":"Wang Jia","orcid":"https://orcid.org/0000-0002-6595-8944"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jia Wang","raw_affiliation_strings":["AT and T Research Laboratories, Florham Park, NJ, USA","AT&T Labs---Research, Florham Park, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"AT and T Research Laboratories, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Labs---Research, Florham Park, NJ, USA#TAB#","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025728584","display_name":"Jun Xu","orcid":"https://orcid.org/0000-0002-0046-8119"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Xu","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","College of Computing, Georgia Inst. of Technology, Atlanta, USA"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"College of Computing, Georgia Inst. of Technology, Atlanta, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068802384"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":1.1157,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.8077949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.8864388465881348},{"id":"https://openalex.org/keywords/planetlab","display_name":"PlanetLab","score":0.8468721508979797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8400777578353882},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7651941776275635},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7646565437316895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6596304178237915},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6314966678619385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5096538066864014},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5044242143630981},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15554139018058777},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09556344151496887}],"concepts":[{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.8864388465881348},{"id":"https://openalex.org/C2780300890","wikidata":"https://www.wikidata.org/wiki/Q851973","display_name":"PlanetLab","level":3,"score":0.8468721508979797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8400777578353882},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7651941776275635},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7646565437316895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6596304178237915},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6314966678619385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5096538066864014},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5044242143630981},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15554139018058777},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09556344151496887},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icnp.2010.5762762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2010.5762762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 18th IEEE International Conference on Network Protocols","raw_type":"proceedings-article"},{"id":"pmh:oai:smartech.gatech.edu:1853/35003","is_oa":true,"landing_page_url":"http://hdl.handle.net/1853/35003","pdf_url":"http://repository.gatech.edu/bitstreams/b11dd70f-5866-4da9-8e1d-523e3caef22a/download","source":{"id":"https://openalex.org/S4377196313","display_name":"SMARTech Repository (Georgia Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130701444","host_organization_name":"Georgia Institute of Technology","host_organization_lineage":["https://openalex.org/I130701444"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:smartech.gatech.edu:1853/35003","is_oa":true,"landing_page_url":"http://hdl.handle.net/1853/35003","pdf_url":"http://repository.gatech.edu/bitstreams/b11dd70f-5866-4da9-8e1d-523e3caef22a/download","source":{"id":"https://openalex.org/S4377196313","display_name":"SMARTech Repository (Georgia Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130701444","host_organization_name":"Georgia Institute of Technology","host_organization_lineage":["https://openalex.org/I130701444"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2137726184.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1550619482","https://openalex.org/W1562530803","https://openalex.org/W1625214948","https://openalex.org/W1811828243","https://openalex.org/W1878501416","https://openalex.org/W2003590000","https://openalex.org/W2005515979","https://openalex.org/W2018505857","https://openalex.org/W2103117727","https://openalex.org/W2108465375","https://openalex.org/W2122696741","https://openalex.org/W2127904496","https://openalex.org/W2133396782","https://openalex.org/W2134313999","https://openalex.org/W2135434540","https://openalex.org/W2136680211","https://openalex.org/W2138370688","https://openalex.org/W2145582227","https://openalex.org/W2145721479","https://openalex.org/W2151972741","https://openalex.org/W2153987726","https://openalex.org/W2159285576","https://openalex.org/W2160565743","https://openalex.org/W2162695692","https://openalex.org/W2162877415","https://openalex.org/W2167153151","https://openalex.org/W2169239524","https://openalex.org/W2170280226","https://openalex.org/W2506906025","https://openalex.org/W4255131925","https://openalex.org/W6632905408","https://openalex.org/W6633638285","https://openalex.org/W6636753732","https://openalex.org/W6638037704","https://openalex.org/W6639344925","https://openalex.org/W6682458981","https://openalex.org/W6683733547","https://openalex.org/W6683862705"],"related_works":["https://openalex.org/W2977018446","https://openalex.org/W2156269510","https://openalex.org/W1975102717","https://openalex.org/W3149217859","https://openalex.org/W1998324388","https://openalex.org/W4312263439","https://openalex.org/W1745198879","https://openalex.org/W2982360089","https://openalex.org/W2157950029","https://openalex.org/W2517290447"],"abstract_inverted_index":{"IP":[0,84],"prefix":[1,25,69,85,111,125],"hijacking":[2,26,86,98,112,126],"is":[3,33],"one":[4],"of":[5,30,141],"the":[6,41,54,139],"top":[7],"security":[8],"threats":[9],"targeting":[10],"today's":[11],"Internet":[12,42],"routing":[13],"protocol.":[14],"Several":[15],"schemes":[16],"have":[17],"been":[18],"proposed":[19],"to":[20,79],"either":[21],"detect":[22],"or":[23,50],"mitigate":[24],"events.":[27],"However,":[28],"none":[29],"these":[31],"approaches":[32],"adopted":[34],"and":[35,63,81,88,100,114,123,128,135],"deployed":[36],"on":[37,40,133,138],"a":[38,106],"large-scale":[39],"for":[43,66,97,110,117,121],"reasons":[44],"such":[45],"as":[46,104],"scalability,":[47],"economical":[48],"practicality,":[49],"unrealistic":[51],"assumptions":[52],"about":[53],"collaborations":[55],"among":[56],"ISPs.":[57],"Thus":[58],"there":[59],"are":[60],"no":[61],"actionable":[62],"deployable":[64],"solutions":[65],"dealing":[67],"with":[68],"hijacking.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74],"study":[75],"key":[76],"issues":[77],"related":[78],"deploying":[80],"operating":[82],"an":[83],"detection":[87,99],"mitigation":[89,101],"system.":[90],"Our":[91],"contributions":[92],"include":[93],"(i)":[94],"deployment":[95],"strategies":[96],"system":[102],"(named":[103],"TowerDefense):":[105],"practical":[107],"service":[108],"model":[109],"protection":[113],"effective":[115],"algorithms":[116],"selecting":[118],"agent":[119],"locations":[120],"detecting":[122],"mitigating":[124],"attacks;":[127],"(ii)":[129],"large":[130],"scale":[131],"experiments":[132],"PlanetLab":[134],"extensive":[136],"analysis":[137],"performance":[140],"TowerDefense.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
