參考文獻 |
[1] B. Hinden and S. E. Deering, "Internet Protocol, Version 6 (IPv6) Specification," Internet Engineering Task Force (IETF), 1998.
[2] J. A. Hawkinson and T. J. Bates, "Guidelines for creation, selection, and registration of an Autonomous System (AS)," IETF, March 1996.
[3] Q. Vohra et al., "BGP Support for Four-Octet Autonomous System (AS) Number Space," Internet Engineering Task Force (IETF), 2012.
[4] M. Caesar and J. Rexford, "BGP Routing Policies in ISP Networks," IEEE Network, vol. Volume: 19, no. 6, pp. 5-11, 2005.
[5] S. Vissicchio et al., "On iBGP Routing Policies," IEEE/ACM Transactions on Networking, vol. 23, no. 1, pp. 227-240, Feb. 2015.
[6] Y. Rekhter et al., "A Border Gateway Protocol 4 (BGP-4)," Internet Engineering Task Force (IETF), 2006.
[7] C. Hedrick, "Routing Information Protocol," Internet Engineering Task Force (IETF), June 1998.
[8] G. S. Malkin, "RIP Version 2," Internet Engineering Task Force (IETF), November 1998.
[9] J. Moy, "OSPF Version 2," Internet Engineering Task Force (IETF), April 1998.
[10] R. Callon, "Use of OSI IS-IS for Routing in TCP/IP and Dual Environments," Internet Engineering Task Force (IETF), December 1990.
[11] M. Wu and Z. Zhuo, "Digital content access control for end-users," in proceedings of the International Conference on Software Intelligence Technologies and Applications & International Conference on Frontiers of Internet of Things, pp. 39-42, 2014.
[12] A. M. Roffarello, "End User Development in the IoT: A Semantic Approach," in proceedings of the International Conference on Intelligent Environments, pp. 107-110, 2018.
[13] A. Abdullahi et al., "A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art," IEEE Access, vol. 9, pp. 74499-74509, 2021.
[14] P. L. Ventre et al., "GEANT SDX - SDN based Open eXchange Point," in proceedings of the IEEE NetSoft Conference and Workshops, pp. 345-346, 2016.
[15] H. Kumar et al., "Enhancing Security Management at Software-Defined Exchange Points," IEEE Transactions on Network and Service Management, vol. 16, no. 4, pp. 1479-1492, 2019.
[16] A. Rego et al., "Software defined networks for traffic management in emergency situations," in proceedings of the Fifth International Conference on Software Defined Systems, pp. 45-51, 2018.
[17] L. Wang et al., "Research on Security Service Model of Software Defined Network," in proceedings of the International Symposium on Computer Science and Intelligent Control, pp. 347-351, 2022.
[18] P. W. Tsai et al., "Design, Development, and Operation of a SDN-Based BGP Playground for Networkers," in proceedings of the Asia-Pacific Network Operations and Management Symposium, pp. 1-4, 2022.
[19] P. Amaral et al., "Multipath policy routing for the inter-domain scenario," in proceedings of the IEEE International Conference on Communications, pp. 3215-3221, 2014.
[20] J. Li et al., "Performance Analysis of Multipath BGP," in proceedings of the IEEE Conference on Computer Communications Workshops, pp. 1-6, 2021.
[21] H. Fujinoki, "Multi-path BGP (MBGP): A solution for improving network bandwidth utilization and defense against link failures in inter-domain routing," IEEE International Conference on Networks, pp. 1-6, 2008.
[22] J. Li et al., "BGP-Multipath Routing in the Internet," IEEE Transactions on Network and
Service Management, vol. 19, no. 3, pp. 2812-2826, 2022.
[23] C. Labovitz et al., "Internet routing instability," IEEE/ACM Transactions on Networking,
vol. 6, no. 5, pp. 512-528, 1998.
[24] C. Labovitz et al., "The impact of Internet policy and topology on delayed routing convergence," in proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Society, pp. 537-546, 2001.
[25] L. Cittadini et al., "Wheel + Ring = Reel: The Impact of Route Filtering on the Stability of Policy Routing," IEEE/ACM Transactions on Networking, vol. 19, no. 4, pp. 1085- 1096, 2011.
[26] R. Khosla et al., "On the Impact of Filters on Analyzing Prefix Reachability in the Internet," in proceedings of the International Conference on Computer Communications and Networks, pp. 1-8, 2009.
[27] J. Bhatia et al., "Software Defined Networking: From Theory to Practice," in proceedings of the International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 789-794, 2018.
[28] D. Kreutz et al., "Software-Defined Networking: A Comprehensive Survey," in Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76, 2015.
[29] V. S et al., "Network management and performance monitoring using Software Defined Networks," in proceedings of the International Conference on Advanced Computing and Communications (ADCOM), pp. 29-31, 2015.
[30] Y. Wang et al., "Design for configurability: rethinking interdomain routing policies from the ground up," IEEE Journal on Selected Areas in Communications, vol. 27, no. 3, pp.336-348, 2009.
[31] C.Huadmai, "Verification of routing policies by using model checking technique,," in proceedings of the IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, pp. 711-716, 2011.
[32] W. Liang et al., "RPIM: Inferring BGP Routing Policies in ISP Networks," in proceedings of the IEEE Global Telecommunications Conference - GLOBECOM, pp. 1-6, 2011.
[33] Y. Rekhter et al., “A Border Gateway Protocol 4 (BGP-4),” Internet Engineering Task Force (IETF), 1995.
[34] R. K. C. Chang and M. Lo, "Inbound traffic engineering for multi-homed ASes using AS path prepending," in proceedings of the IEEE/IFIP Network Operations and Management Symposium, pp. 89-102, 2004.
[35] Y. Zhang and M. Tatipamula, "Characterization and design of effective BGP AS-path prepending," in proceedings of the IEEE International Conference on Network Protocols, pp. 59-68, 2011.
[36] N. Feamster et al., "Implications of Autonomy for the Expressiveness of Policy Routing," IEEE/ACM Transactions on Networking, vol. 15, no. 6, pp. 1266-1279, 2007.
[37] L. Yujing et al., "Research on AS path betweenness based filtering policy against BGP prefix hijacking," in proceedings of the International Conference on Information Science and Engineering, pp. 4659-4662, 2010.
[38] P. -A. Vervier et al., "Malicious BGP hijacks: Appearances can be deceiving," in proceedings of the IEEE International Conference on Communications, pp. 884-889, 2014.
[39] M. Apostolaki et al., "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies," in proceedings of the IEEE Symposium on Security and Privacy, pp. 375-392, 2017.
[40] P. Sermpezis et al., "Estimating the Impact of BGP Prefix Hijacking," in proceedings of the IFIP Networking Conference, pp. 1-10, 2021.
[41] S. Cho et al., "BGP hijacking classification," in proceedings of the Network Traffic Measurement and Analysis Conference, pp. 25-32, 2019.
[42] N. H. Hammood and B. Al-Musawi, "Using BGP Features Towards Identifying Type of BGP Anomaly," in proceedings of the International Congress of Advanced Technology and Engineering, pp. 1-10, 2021.
[43] Q. Li et al., "BGP with BGPsec: Attacks and Countermeasures," IEEE Network, vol. 33, no. 4, pp. 194-200, 2019.
[44] G. Chang et al., "Using resource public key infrastructure for secure border gateway protocol," in proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, pp. 1-6, 2016.
[45] P. H. Friedemann et al., "Assessing the RPKI Validator Ecosystem," in proceedings of the International Conference on Ubiquitous and Future Networks, pp. 295-300, 2022.
[46] R. Moskowitz et al., "Address Allocation for Private Internets," Internet Engineering Task Force (IETF), 1996.
[47] R. Vaidyanathan et al., "On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic," in proceedings of the International Conference on Computing, Networking and Communications, pp. 1-6, 2012.
[48] D. BV, "IRR EXPLORER," [Online]. Available: https://irrexplorer.nlnog.net/. [Accessed 5 June 2023].
[49] Spamhaus®, "SPAMHAUS," [Online]. Available: https://www.spamhaus.org/. [Accessed 5 June 2023].
[50]R. Hat, "Ansible is Simple IT Automation," Red Hat, [Online]. Available: https://www.ansible.com/. [Accessed 5 6 2023].
[51]Cisco Systems Inc., "ThousandEyes," Cisco Systems, [Online]. Available: https://www.thousandeyes.com/. [Accessed 5 June 2023].
[52]K. Ishiguro et al., "FRRouting User Guide," FRR, [Online]. Available: https://docs.frrouting.org/en/latest/index.html. [Accessed 5 June 2023].
[53] Feela, "The BIRD Internet Routing Daemon," [Online]. Available: https://bird.network.cz/. [Accessed 5 June 2023].
[54] Arista, "Arista EOS," Arista, [Online]. Available: https://www.arista.com/en/products/eos. [Accessed 5 June 2023].
[55] N. I. o. S. a. T. (NIST), "NIST RPKI Monitor," [Online]. Available: https://rpki- monitor.antd.nist.gov/. [Accessed 5 June 2023].
[56] N. I. o. S. a. T. (NIST), "NIST RPKI Monitor," [Online]. Available: https://rpki- monitor.antd.nist.gov/. [Accessed 5 June 2024].
[57] G. developers, "GeoPandas," [Online]. Available: https://geopandas.org/en/stable/. [Accessed 5 June 2023].
[58] T. M. d. team, "Matplotlib," [Online]. Available: https://matplotlib.org/. [Accessed 5 June 2023]. |