{"id":"https://openalex.org/W4381734356","doi":"https://doi.org/10.1109/noms56928.2023.10154437","title":"Analysis and emulation of BGP hijacking events","display_name":"Analysis and emulation of BGP hijacking events","publication_year":2023,"publication_date":"2023-05-08","ids":{"openalex":"https://openalex.org/W4381734356","doi":"https://doi.org/10.1109/noms56928.2023.10154437"},"language":"en","primary_location":{"id":"doi:10.1109/noms56928.2023.10154437","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043668931","display_name":"Pietro Spadaccino","orcid":"https://orcid.org/0000-0002-5920-680X"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Pietro Spadaccino","raw_affiliation_strings":["DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy"],"affiliations":[{"raw_affiliation_string":"DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092241905","display_name":"Sara Bruzzese","orcid":null},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Sara Bruzzese","raw_affiliation_strings":["DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy"],"affiliations":[{"raw_affiliation_string":"DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022341678","display_name":"Francesca Cuomo","orcid":"https://orcid.org/0000-0002-9122-7993"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesca Cuomo","raw_affiliation_strings":["DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy"],"affiliations":[{"raw_affiliation_string":"DIET Sapienza Universit&#x00E0; di Roma,Rome,Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038821611","display_name":"Flavio Luciani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flavio Luciani","raw_affiliation_strings":["Namex (Rome IXP),Rome,Italy","Namex (Rome IXP), Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Namex (Rome IXP),Rome,Italy","institution_ids":[]},{"raw_affiliation_string":"Namex (Rome IXP), Rome, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043668931"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":null,"apc_paid":null,"fwci":0.7006,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74812556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9524999856948853,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.9562519788742065},{"id":"https://openalex.org/keywords/default-free-zone","display_name":"Default-free zone","score":0.8125669956207275},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8031089901924133},{"id":"https://openalex.org/keywords/network-mapping","display_name":"Network mapping","score":0.6820440888404846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6317724585533142},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5851821899414062},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.5632860064506531},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.5543609261512756},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5332906246185303},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5180180668830872},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47091126441955566},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4216892719268799},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.40724730491638184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3274897634983063},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19932794570922852},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.14785808324813843},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08104130625724792},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.08023184537887573}],"concepts":[{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.9562519788742065},{"id":"https://openalex.org/C101396714","wikidata":"https://www.wikidata.org/wiki/Q3021187","display_name":"Default-free zone","level":5,"score":0.8125669956207275},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8031089901924133},{"id":"https://openalex.org/C133474645","wikidata":"https://www.wikidata.org/wiki/Q17104660","display_name":"Network mapping","level":3,"score":0.6820440888404846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6317724585533142},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5851821899414062},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.5632860064506531},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5543609261512756},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5332906246185303},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5180180668830872},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47091126441955566},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4216892719268799},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.40724730491638184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3274897634983063},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19932794570922852},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.14785808324813843},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08104130625724792},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.08023184537887573},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/noms56928.2023.10154437","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154437","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1701857","is_oa":false,"landing_page_url":"https://hdl.handle.net/11573/1701857","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2312391375","https://openalex.org/W2134956925","https://openalex.org/W1594989898","https://openalex.org/W3180329408","https://openalex.org/W2137736907","https://openalex.org/W2910714899","https://openalex.org/W2564665778","https://openalex.org/W2279651150","https://openalex.org/W2049545835","https://openalex.org/W1971985463"],"abstract_inverted_index":{"Border":[0],"Gateway":[1],"Protocol":[2],"(BGP)":[3],"is":[4,60,100,135],"the":[5,13,53,75,133,142,146,151,154,157,160,163,166],"standard":[6],"protocol":[7],"used":[8,44,149],"for":[9,150],"inter-domain":[10],"routing":[11,65],"in":[12,26,67,86,106,115],"Internet.":[14],"Since":[15],"it":[16,24,99,139],"was":[17],"designed":[18],"without":[19],"built-in":[20],"security":[21,31,66,104,201],"mechanisms,":[22],"nowadays":[23],"results":[25],"being":[27],"vulnerable":[28],"to":[29,36,46,61,69,73,83,90,102,127,191,199],"various":[30],"issues.":[32],"Although":[33],"countermeasures":[34,105],"exist":[35],"secure":[37],"BGP":[38,78,113,174,196],"sessions,":[39],"they":[40],"are":[41],"not":[42],"widely":[43],"due":[45],"lack":[47],"of":[48,52,57,77,132,165],"knowledge":[49],"and":[50,80,97,144,162,193],"complexity":[51],"setup.":[54],"The":[55,108],"aim":[56],"this":[58],"paper":[59,109,158],"raise":[62],"awareness":[63],"about":[64],"BGP,":[68],"provide":[70],"a":[71,81,87,111,119,172],"methodology":[72],"deepen":[74],"analysis":[76,131],"incidents":[79],"tool":[82,167,187],"reproduce":[84],"them":[85],"sandbox":[88],"environment,":[89],"better":[91],"understand":[92],"how":[93,138],"these":[94],"issues":[95],"arise":[96],"why":[98],"crucial":[101],"have":[103],"place.":[107],"examines":[110],"recent":[112],"incident":[114,134],"March":[116],"2022,":[117],"where":[118],"Russian":[120],"ISP":[121],"hijacked":[122],"an":[123],"IP":[124],"prefix":[125],"belonging":[126],"Twitter.":[128],"A":[129],"comprehensive":[130],"performed,":[136],"including":[137],"spread":[140],"throughout":[141],"Internet":[143],"presenting":[145],"powerful":[147],"toolkit":[148],"analysis.":[152],"In":[153],"last":[155],"section,":[156],"explains":[159],"usage":[161],"potentiality":[164],"KathBGPBuilder,":[168],"which":[169],"can":[170,188],"recreate":[171,194],"real":[173,195],"deployment":[175],"with":[176],"minimal":[177],"manual":[178],"configuration":[179],"using":[180],"open":[181],"data":[182],"collected":[183],"from":[184],"RIPEstat.":[185],"This":[186],"be":[189],"utilized":[190],"experiment":[192],"incidents,":[197],"or":[198],"test":[200],"mechanisms.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-01-20T17:24:06.736184","created_date":"2025-10-10T00:00:00"}
