{"id":"https://openalex.org/W2133396782","doi":"https://doi.org/10.1145/1282380.1282411","title":"A study of prefix hijacking and interception in the internet","display_name":"A study of prefix hijacking and interception in the internet","publication_year":2007,"publication_date":"2007-08-27","ids":{"openalex":"https://openalex.org/W2133396782","doi":"https://doi.org/10.1145/1282380.1282411","mag":"2133396782"},"language":"en","primary_location":{"id":"doi:10.1145/1282380.1282411","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1282380.1282411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090179071","display_name":"Hitesh Ballani","orcid":"https://orcid.org/0000-0003-1573-3314"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hitesh Ballani","raw_affiliation_strings":["Cornell University, Ithaca, NY","Cornell University (Ithaca, NY);"],"affiliations":[{"raw_affiliation_string":"Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]},{"raw_affiliation_string":"Cornell University (Ithaca, NY);","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029526597","display_name":"Paul Francis","orcid":"https://orcid.org/0000-0002-8781-8678"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Francis","raw_affiliation_strings":["Cornell University, Ithaca, NY","Cornell University (Ithaca, NY);"],"affiliations":[{"raw_affiliation_string":"Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]},{"raw_affiliation_string":"Cornell University (Ithaca, NY);","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102850149","display_name":"Xinyang Zhang","orcid":"https://orcid.org/0000-0002-7159-3697"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyang Zhang","raw_affiliation_strings":["Cornell University, Ithaca, NY","Cornell University (Ithaca, NY);"],"affiliations":[{"raw_affiliation_string":"Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]},{"raw_affiliation_string":"Cornell University (Ithaca, NY);","institution_ids":["https://openalex.org/I205783295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090179071"],"corresponding_institution_ids":["https://openalex.org/I205783295"],"apc_list":null,"apc_paid":null,"fwci":19.1974,"has_fulltext":false,"cited_by_count":224,"citation_normalized_percentile":{"value":0.99423333,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"265","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.9527373909950256},{"id":"https://openalex.org/keywords/interception","display_name":"Interception","score":0.9294898509979248},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7437949180603027},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7049333453178406},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5583631992340088},{"id":"https://openalex.org/keywords/ip-forwarding","display_name":"IP forwarding","score":0.452359676361084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4334460198879242},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.42763152718544006},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.18593966960906982},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18345901370048523},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.1411019265651703},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.0866352915763855}],"concepts":[{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.9527373909950256},{"id":"https://openalex.org/C61270487","wikidata":"https://www.wikidata.org/wiki/Q476843","display_name":"Interception","level":2,"score":0.9294898509979248},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7437949180603027},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7049333453178406},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5583631992340088},{"id":"https://openalex.org/C174809319","wikidata":"https://www.wikidata.org/wiki/Q5973191","display_name":"IP forwarding","level":5,"score":0.452359676361084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4334460198879242},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.42763152718544006},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.18593966960906982},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18345901370048523},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.1411019265651703},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.0866352915763855},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1282380.1282411","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1282380.1282411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.121.3913","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.3913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sigcomm.org/ccr/drupal/files/fp069-ballani.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.527.6260","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.527.6260","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://stuff.mit.edu/afs/sipb/project/reading-group/past-readings/2009-06-15-prefix-hijacking.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.88.8677","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.8677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.cornell.edu/People/francis/sigcomm07-interception.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1483178615","https://openalex.org/W1484738311","https://openalex.org/W1510654465","https://openalex.org/W1550619482","https://openalex.org/W1562530803","https://openalex.org/W1625214948","https://openalex.org/W1811828243","https://openalex.org/W1849243243","https://openalex.org/W1965343327","https://openalex.org/W1967656199","https://openalex.org/W1990312804","https://openalex.org/W2003590000","https://openalex.org/W2015550779","https://openalex.org/W2018505857","https://openalex.org/W2020004450","https://openalex.org/W2029303516","https://openalex.org/W2083793737","https://openalex.org/W2108465375","https://openalex.org/W2108673686","https://openalex.org/W2113282491","https://openalex.org/W2113344319","https://openalex.org/W2120652359","https://openalex.org/W2123062968","https://openalex.org/W2123491545","https://openalex.org/W2123789985","https://openalex.org/W2134313999","https://openalex.org/W2135324748","https://openalex.org/W2136680211","https://openalex.org/W2138195463","https://openalex.org/W2138370688","https://openalex.org/W2142449826","https://openalex.org/W2146164879","https://openalex.org/W2149482504","https://openalex.org/W2151972741","https://openalex.org/W2162260997","https://openalex.org/W2162695692","https://openalex.org/W2162877415","https://openalex.org/W2165960032","https://openalex.org/W2169239524","https://openalex.org/W2546246032","https://openalex.org/W2554804802","https://openalex.org/W4233802931","https://openalex.org/W4251650116","https://openalex.org/W4285719527","https://openalex.org/W6629025437","https://openalex.org/W6630497885","https://openalex.org/W6638037704","https://openalex.org/W6655505568","https://openalex.org/W6676307443","https://openalex.org/W6676970763","https://openalex.org/W6680468213","https://openalex.org/W6684688227"],"related_works":["https://openalex.org/W2257619495","https://openalex.org/W3162417966","https://openalex.org/W2174919075","https://openalex.org/W2133396782","https://openalex.org/W2104508887","https://openalex.org/W1494299001","https://openalex.org/W2181411023","https://openalex.org/W1562048064","https://openalex.org/W2804776960","https://openalex.org/W2587595093"],"abstract_inverted_index":{"There":[0],"have":[1],"been":[2],"many":[3],"incidents":[4],"of":[5,38,61],"prefix":[6,40,54,65,100],"hijacking":[7,12,41],"in":[8,72],"the":[9,16,24,31,45,59,73],"Internet.":[10],"The":[11,77],"AS":[13],"can":[14,21,67],"blackhole":[15],"hijacked":[17,25,69],"traffic.":[18],"Alternatively,":[19],"it":[20,29],"transparently":[22],"intercept":[23,85],"traffic":[26,62,87],"by":[27],"forwarding":[28],"onto":[30],"owner.":[32],"This":[33],"paper":[34],"presents":[35],"a":[36,51,94],"study":[37,96],"such":[39],"and":[42,70,82],"interception":[43,78],"with":[44],"following":[46],"contributions:":[47],"(1).":[48],"We":[49,57,92],"present":[50],"methodology":[52,79],"for":[53],"interception,":[55],"(2).":[56],"estimate":[58],"fraction":[60],"to":[63,84,88,97],"any":[64],"that":[66],"be":[68],"intercepted":[71],"Internet":[74],"today,":[75],"(3).":[76],"is":[80],"implemented":[81],"used":[83],"real":[86],"our":[89],"prefix,":[90],"(4).":[91],"conduct":[93],"detailed":[95],"detect":[98],"ongoing":[99],"interception.":[101]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":19},{"year":2015,"cited_by_count":21},{"year":2014,"cited_by_count":19},{"year":2013,"cited_by_count":17},{"year":2012,"cited_by_count":15}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
