참고문헌
- Milton Muller, "Scarcity in IP addresses: IPv4 Address Transfer Markets and the Regional Internet Address Registries," Internet Governance Project, 20 Jul., 2008.
- M. Lepinski, S. Kent, "An Infrastructure to Support Secure Internet Routing (draft-ieth-sidr-arch- 09.txt)," IETF sidr WG draft, 2009. 10.
- Michaelson, G., Kent, S., and Huston, G., "A Profile for Trust Anchor Material for the Resource Certificate PKI," draft-ietf-sidr-ta-02, September, 2009.
- S. Murphy, "RFC:4272 BGP Security Vulnerabilities Analysis," IETF, 2006. 1.
- S.M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," Computer Communication Review, Vol.10, No.2, 1989. 4. https://doi.org/10.1145/378444.378449
- Nordstrom, C. Dovrolis, "Beware of BGP Attacks," ACM SIGCOMM Computer Communications Review, Vol.34, No.2., 2004. 4. https://doi.org/10.1145/997150.997152
- Hawkinson, J., Bates, T., "RFC1930: Guidelines for creation, selection, and registration of an autonomous syste (AS)," IETF, 1996.
- Stewart, J., "BGP4: Inter-Domain Routing in the Internet," Addison-Wesley, 1999.
- Z. Zhang, Y. Zhang, C. Hu, Z. M. Mao, "Practical Defenses Against BGP Prefix Hijacking," Proceeding of ACM CoNEXT, 2007. 12. https://doi.org/10.1145/1364654.1364658
- D. Wendlandt, I. Avramopoulos, D. Andersenm J. Rexford, "Don't Secure Routing Protocols, Secure Data Delivery," Proceeding of ACM HotNets, 2006. 11.
- S. Kent, C. Lynn, K. Seo, "Secure Border Gateway Protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications (JSAC), Vol.18, No.4, 2000. 4. https://doi.org/10.1109/49.839934