Back to Results
First PageMeta Content
Internet standards / Routing / Internet protocols / Domain name system / IP hijacking / Border Gateway Protocol / Resource Public Key Infrastructure / Hijacking / The Spamhaus Project / Network architecture / Internet / Computing


A Forensic Case Study on AS Hijacking: The Attacker’s Perspective Johann Schlamp Georg Carle
Add to Reading List

Document Date: 2013-05-09 10:49:30


Open Document

File Size: 760,22 KB

Share Result on Facebook

City

Munich / /

Company

DNS Link Telecom / Link Telecom / North American Network Operators’ Group / Computer-Communication Networks / Relians Ltd. / ComputerCommunication Networks / Russian ISP Link Telecom / /

Country

United States / United Kingdom / /

Currency

USD / /

/

Event

Product Recall / Product Issues / Person Communication and Meetings / Bankruptcy / /

Facility

University of Oregon RouteViews / /

IndustryTerm

Internet service providers / Internet resources / heterogenous and independent autonomous systems / Internet registrars / Internet archive10 / active network / database software / questionable products / border routers / Internet topology / registration systems / scientific network / blackhole Internet traffic / auto pilot software / /

OperatingSystem

Microsoft Windows / /

Organization

University of Oregon / European Commission / /

Person

Michael Lindsay / Ernst W. Biersack / Pierre-Antoine Vervier / Sophia Antipolis / Internap / Lothar Braun / /

Position

proxy registrar / General / author / Network monitoring General / representative / /

Product

messages / routes / /

ProgrammingLanguage

V / /

ProvinceOrState

Oregon / /

PublishedMedium

The Internet Protocol Journal / /

Technology

Public Key Infrastructure / IP / BGP router / html / pdf / software BGP router / reverse DNS lookup / ISP / HTTP / border routers / /

URL

http /

SocialTag