{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T16:39:07Z","timestamp":1726072747642},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440800"},{"type":"electronic","value":"9783030440817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44081-7_5","type":"book-chapter","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T12:02:38Z","timestamp":1584446558000},"page":"71-87","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today"],"prefix":"10.1007","author":[{"given":"Cecilia","family":"Testart","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Richter","sequence":"additional","affiliation":[]},{"given":"Alistair","family":"King","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Dainotti","sequence":"additional","affiliation":[]},{"given":"David","family":"Clark","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"5_CR1","unstructured":"AS286 Routing Policy. \nhttps:\/\/as286.net\/AS286-routing-policy.html"},{"key":"5_CR2","unstructured":"AT&T\/as7018 now drops invalid prefixes from peers. \nhttps:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-February\/099501.html"},{"key":"5_CR3","unstructured":"Cymru BGP Bogon Refence. \nhttp:\/\/www.team-cymru.org\/bogon-reference-bgp.html"},{"key":"5_CR4","unstructured":"PeeringDB. \nhttps:\/\/www.peeringdb.com"},{"key":"5_CR5","unstructured":"RIPE NCC RPKI Validator. \nhttps:\/\/rpki-validator.ripe.net\/"},{"key":"5_CR6","unstructured":"RPKI Route Origin Validation - Africa. \nhttps:\/\/mailman.nanog.org\/pipermail\/nanog\/2019-April\/100445.html"},{"key":"5_CR7","unstructured":"Telia Carrier Takes Major Step to Improve the Integrity of the Internet Core. \nhttps:\/\/www.teliacarrier.com\/Press-room\/Press-releases\/Telia-Carrier-Takes-Major-Step-to-Improve-the-Integrity-of-the-Internet-Core-.html"},{"key":"5_CR8","unstructured":"The hunt for 3ve: taking down a major ad fraud operation through industry collaboration. Technical report, November 2018. \nhttps:\/\/services.google.com\/fh\/files\/blogs\/3ve_google_whiteops_whitepaper_final_nov_2018.pdf?__hstc=&__hssc=&hsCtaTracking=c7b87c5c-1676-4d53-99fb-927a07720b17%7C9d63bf77-0926-4d08-b5ec-46b1a06846bc"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Bush, R., Austein, R.: The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard), January 2013. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc6810.txt\n\n (updated by RFC 8210)","DOI":"10.17487\/rfc6810"},{"key":"5_CR10","unstructured":"Cartwright-Cox, B.: The year of RPKI on the control plane, September 2019. \nhttps:\/\/blog.benjojo.co.uk\/post\/the-year-of-rpki-on-the-control-plane"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Chung, T., et al.: RPKI is coming of age: a longitudinal study of RPKI deployment and invalid route origins. In: Proceedings of the Internet Measurement Conference (IMC 2019), pp. 406\u2013419. Association for Computing Machinery, Amsterdam, Netherlands, October 2019. \nhttps:\/\/doi.org\/10.1145\/3355369.3355596","DOI":"10.1145\/3355369.3355596"},{"key":"5_CR12","unstructured":"Cisco: IP Routing: BGP Configuration Guide, Cisco IOS XE Release 3S. \nhttps:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/iproute_bgp\/configuration\/xe-3s\/irg-xe-3s-book\/bgp-origin-as-validation.html"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Cohen, A., Herzberg, A., Schapira, M., Shulman, H.: Are we there yet? On RPKI\u2019s deployment and security. In: Proceedings 2017 Network and Distributed System Security Symposium. Internet Society, San Diego (2017)","DOI":"10.14722\/ndss.2017.23123"},{"key":"5_CR14","unstructured":"Goodin, D.: Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency, April 2018. \nhttps:\/\/arstechnica.com\/information-technology\/2018\/04\/suspicious-event-hijacks-amazon-traffic-for-2-hours-steals-cryptocurrency\/"},{"key":"5_CR15","unstructured":"Huston, G., Michaelson, G., Loomans, R.: A Profile for X.509 PKIX Resource Certificates. RFC 6487 (Proposed Standard), February 2012. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc6487.txt\n\n (updated by RFCs 7318, 8209)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Huston, G., Michaelson, G., Martinez, C., Bruijnzeels, T., Newton, A., Shaw, D.: Resource Public Key Infrastructure (RPKI) Validation Reconsidered. RFC 8360 (Proposed Standard), April 2018. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc8360.txt","DOI":"10.17487\/RFC8360"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Huston, G., Michaelson, G.: RFC 6483: Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs), February 2012. \nhttps:\/\/tools.ietf.org\/html\/rfc6483","DOI":"10.17487\/rfc6483"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-319-15509-8_3","volume-title":"Passive and Active Measurement","author":"D Iamartino","year":"2015","unstructured":"Iamartino, D., Pelsser, C., Bush, R.: Measuring BGP route origin registration and validation. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 28\u201340. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-15509-8_3"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Kent, S., Kong, D., Seo, K., Watro, R.: Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI). RFC 6484 (Best Current Practice), February 2012. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc6484.txt","DOI":"10.17487\/rfc6484"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Kent, S.: An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational), February 2012. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc6480.txt","DOI":"10.17487\/rfc6480"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Kent, S., Kong, D.: A Profile for Route Origin Authorizations (ROAs). RFC 6482 (Proposed Standard), February 2012. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc6482.txt","DOI":"10.17487\/rfc6482"},{"key":"5_CR22","unstructured":"Maddison, B.: RIPE Forum - Routing Working Group - RPKI Route Origin Validation - Africa, April 2019. \nhttps:\/\/www.ripe.net\/participate\/mail\/forum\/routing-wg\/PDZlMzAzMzhhLWVhOTAtNzIxOC1lMzI0LTBjZjMyOGI1Y2NkM0BzZWFjb20ubXU+"},{"key":"5_CR23","unstructured":"Newman, L.H.: Why Google Internet Traffic Rerouted Through China and Russia. Wired, November 2018. \nhttps:\/\/www.wired.com\/story\/google-internet-traffic-china-russia-rerouted\/"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Newton, A., Huston, G.: Policy Qualifiers in Resource Public Key Infrastructure (RPKI) Certificates. RFC 7318 (Proposed Standard), July 2014. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc7318.txt","DOI":"10.17487\/rfc7318"},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Orsini, C., King, A., Giordano, D., Giotsas, V., Dainotti, A.: BGPStream: a software framework for live and historical BGP data analysis. In: Proceedings of the 2016 Internet Measurement Conference (IMC 2016), pp. 429\u2013444. Association for Computing Machinery, Santa Monica, November 2016. \nhttps:\/\/doi.org\/10.1145\/2987443.2987482","DOI":"10.1145\/2987443.2987482"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/3211852.3211856","volume":"48","author":"A Reuter","year":"2018","unstructured":"Reuter, A., Bush, R., Cunha, I., Katz-Bassett, E., Schmidt, T.C., Waehlisch, M.: Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering. ACM SIGCOMM Comput. Commun. Rev. 48(1), 9 (2018)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Sermpezis, P., et al.: ARTEMIS: Neutralizing BGP Hijacking within a Minute. \narXiv:1801.01085\n\n [cs], January 2018. \nhttp:\/\/arxiv.org\/abs\/1801.01085","DOI":"10.1145\/3232755.3234554"},{"key":"5_CR28","unstructured":"Strickx, T.: How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today, June 2019. \nhttps:\/\/blog.cloudflare.com\/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today\/"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Testart, C., Richter, P., King, A., Dainotti, A., Clark, D.: Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table. In: Proceedings of the Internet Measurement Conference (IMC 2019), pp. 420\u2013434. ACM Press, Amsterdam (2019). \nhttps:\/\/doi.org\/10.1145\/3355369.3355581","DOI":"10.1145\/3355369.3355581"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Yoo, C., Wishnick, D.: Lowering legal barriers to RPKI adoption. Faculty Scholarship at Penn Law, January 2019. \nhttps:\/\/scholarship.law.upenn.edu\/faculty_scholarship\/2035","DOI":"10.2139\/ssrn.3308619"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44081-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T00:07:51Z","timestamp":1584922071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44081-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440800","9783030440817"],"references-count":30,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-030-44081-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eugene, OR","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2020.cs.uoregon.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"JEMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}