{"id":"https://openalex.org/W2004884318","doi":"https://doi.org/10.1109/lcn.2011.6115172","title":"About prefix hijacking in the Internet","display_name":"About prefix hijacking in the Internet","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W2004884318","doi":"https://doi.org/10.1109/lcn.2011.6115172","mag":"2004884318"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2011.6115172","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2011.6115172","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE 36th Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074394762","display_name":"Uli Bornhauser","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Uli Bornhauser","raw_affiliation_strings":["Institute of Computer Science, University of Bonn, Bonn, Germany","University of Bonn - Institute of Computer Science 4 - Friedrich-Ebert-Allee 144 - D - 53113 Bonn#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]},{"raw_affiliation_string":"University of Bonn - Institute of Computer Science 4 - Friedrich-Ebert-Allee 144 - D - 53113 Bonn#TAB#","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107832047","display_name":"Peter Martini","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Peter Martini","raw_affiliation_strings":["Institute of Computer Science, University of Bonn, Bonn, Germany","University of Bonn - Institute of Computer Science 4 - Friedrich-Ebert-Allee 144 - D - 53113 Bonn#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]},{"raw_affiliation_string":"University of Bonn - Institute of Computer Science 4 - Friedrich-Ebert-Allee 144 - D - 53113 Bonn#TAB#","institution_ids":["https://openalex.org/I135140700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074394762"],"corresponding_institution_ids":["https://openalex.org/I135140700"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61053428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"15","issue":null,"first_page":"143","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8506357669830322},{"id":"https://openalex.org/keywords/blueprint","display_name":"Blueprint","score":0.7333461046218872},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.6478217244148254},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.6347602605819702},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5973166227340698},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5839961767196655},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.44275155663490295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.269737184047699},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2669781446456909}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8506357669830322},{"id":"https://openalex.org/C155911762","wikidata":"https://www.wikidata.org/wiki/Q422321","display_name":"Blueprint","level":2,"score":0.7333461046218872},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.6478217244148254},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.6347602605819702},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5973166227340698},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5839961767196655},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.44275155663490295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.269737184047699},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2669781446456909},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2011.6115172","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2011.6115172","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE 36th Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W111633743","https://openalex.org/W1550619482","https://openalex.org/W1811828243","https://openalex.org/W1828150029","https://openalex.org/W1967656199","https://openalex.org/W2020004450","https://openalex.org/W2065283652","https://openalex.org/W2123789985","https://openalex.org/W2145721479","https://openalex.org/W2162260997","https://openalex.org/W2162877415","https://openalex.org/W2169239524","https://openalex.org/W2181411023","https://openalex.org/W2287088142","https://openalex.org/W3162906515","https://openalex.org/W4300490703","https://openalex.org/W6604528980","https://openalex.org/W6632905408","https://openalex.org/W6638037704","https://openalex.org/W6678243374","https://openalex.org/W6685936718"],"related_works":["https://openalex.org/W4304620183","https://openalex.org/W2384575798","https://openalex.org/W2007211730","https://openalex.org/W2265189214","https://openalex.org/W2766654718","https://openalex.org/W2379378785","https://openalex.org/W4396600116","https://openalex.org/W1975337239","https://openalex.org/W1971312788","https://openalex.org/W4319347573"],"abstract_inverted_index":{"From":[0],"time":[1,65],"to":[2,43,57,66,81,106,115],"time,":[3],"global":[4,12,20],"routing":[5,15,21,117],"is":[6],"affected":[7],"by":[8],"local":[9],"misconfigurations":[10],"of":[11,113],"impact.":[13],"Incorrect":[14],"information":[16],"leaks":[17],"into":[18],"the":[19,111],"IP":[22],"address":[23],"space":[24],"becomes":[25],"hijacked.":[26],"As":[27,54],"such":[28,50],"incidents":[29,51,61],"are":[30,52,76],"highly":[31],"problematic":[32],"and":[33,70,119],"may":[34,71],"even":[35],"serve":[36,96],"as":[37,97],"blueprints":[38],"for":[39,99,110],"purposeful":[40],"attacks,":[41],"concepts":[42],"prevent":[44,58],"or":[45],"at":[46],"least":[47],"automatically":[48],"detect":[49,116],"desirable.":[53],"planned":[55],"architectures":[56],"prefix":[59],"hijacking":[60],"will":[62],"need":[63],"some":[64],"become":[67],"globally":[68],"deployed":[69],"be":[72,82],"ineffective":[73],"if":[74],"manipulations":[75,118],"obfuscated,":[77],"automatic":[78],"detection":[79],"seems":[80],"an":[83],"crucial":[84],"facet.":[85],"In":[86],"this":[87,102],"paper,":[88],"we":[89,104],"study":[90],"a":[91],"misconflguration":[92],"event":[93],"that":[94],"could":[95],"blueprint":[98],"attacks.":[100],"With":[101],"analysis,":[103],"try":[105],"provide":[107],"starting":[108],"points":[109],"development":[112],"indicators":[114],"classify":[120],"them":[121],"automatically.":[122]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
