Back to Results
First PageMeta Content
Internet standards / Internet protocols / Routing protocols / Routing / Computer network security / Border Gateway Protocol / IP hijacking / Router / Route Views / Internet / Network architecture / Computing


Through the Looking-Glass, and What Eve Found There Luca Bruno, Mariano Graziano, Davide Balzarotti, AurĀ“elien Francillon EURECOM {firstname.lastname}@eurecom.fr Abstract
Add to Reading List

Document Date: 2014-08-08 13:49:05


Open Document

File Size: 203,07 KB

Share Result on Facebook

City

New York / /

Company

Autonoumous Systems / LG / Autonomous Systems / Google / Cisco / Juniper Networks / /

Country

Poland / Russia / United States / /

Currency

PHP / /

/

Event

FDA Phase / /

Facility

University of Oregon Route Views Project / /

IndustryTerm

software flaws / web attack / public-access network / web applications / exposed infrastructure / web server directory / Internet infrastructure / open-source software looking-glasses / restricted web access / defacto interdomain routing protocol / backbone routers / actionable web applications / software developers / web-applications / open-source software / search engine bots / web-servers / web threats / remote networks / web search engines / Internet BGP table / Internet routing / web server / administration services / web-access / Web security It / web scripts / lookingglass server / administration web-applications / typical web security scenario / inactive services / tional utilities / routable networks / dedicated network devices / public Internet / Internet backbone / Internet routing attack / web failures / public web / public services / targeted operator / web responses / web input / software deployments / web interface / routers administration services / above software / open-source looking-glass software / web servers / net Internet NOC NOC Public web / network services / Internet core infrastructure / remote routers / search engine indexes / web security / cross site / /

OperatingSystem

UNIX / Cisco IOS / Linux / DoS / /

Organization

TCP BGP / US FR / University of Oregon / Network Operations Center / /

Person

Johnny Long / CAL IT AL CZ AU / Pierre-Antoine Vervier / Quentin Jacquemart / Elie Bursztein / Jatin Kataria / Dan Boneh / Ahn / Andy Davis / Blum / Earl Zmijewski / Michael Lynn / Hristo Bojinov / Luis Von / Salvatore J. Stolfo / Eve Found There Luca Bruno / Mariano Graziano / /

/

Position

Butler / editor / Private / /

Product

BGP injection / Related Work BGP injection / BGP / /

ProgrammingLanguage

PHP / HTML / Perl / /

ProvinceOrState

New York / /

Technology

Linux / defacto interdomain routing protocol / PKI / 4.2 Backbone routers / HTML / CGI / Encryption / six routers / 53 routers / cryptography / backbone BGP routers / ISP / Network Operations Center / PHP / UNIX / VPN / Border Gateway Protocol / search engine / Perl / existing routers / pdf / Public-key infrastructure / Hacking Huawei Routers / 5 Backbone routers / backbone routers / artificial intelligence / http / malicious BGP routers / attacked router / well-configured routers / web server / /

URL

http /

SocialTag