{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:20:59Z","timestamp":1761398459100,"version":"build-2065373602"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T00:00:00Z","timestamp":1650499200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1016\/j.comnet.2022.108966","type":"journal-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T11:47:42Z","timestamp":1650282462000},"page":"108966","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Practicable route leak detection and protection with ASIRIA"],"prefix":"10.1016","volume":"211","author":[{"given":"Marcelo","family":"Bagnulo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6877-3486","authenticated-orcid":false,"given":"Alberto","family":"Garc\u00eda-Mart\u00ednez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8005-0638","authenticated-orcid":false,"given":"Stefano","family":"Angieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7361-1257","authenticated-orcid":false,"given":"Andra","family":"Lutu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6826-0288","authenticated-orcid":false,"given":"Jinze","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2012","series-title":"An infrastructure to support secure internet routing","author":"Lepinski","key":"10.1016\/j.comnet.2022.108966_b1"},{"year":"2017","series-title":"BGPsec protocol specification","author":"Lepinski","key":"10.1016\/j.comnet.2022.108966_b2"},{"year":"2015","series-title":"Massive route leak causes internet slowdown","author":"Toonk","key":"10.1016\/j.comnet.2022.108966_b3"},{"year":"2019","series-title":"Anatomy of a route leak","author":"Fleury","key":"10.1016\/j.comnet.2022.108966_b4"},{"year":"2016","series-title":"Problem definition and classification of BGP route leaks","author":"Sriram","key":"10.1016\/j.comnet.2022.108966_b5"},{"year":"2020","series-title":"MANRS implementation guide, filtering","author":"MANRS","key":"10.1016\/j.comnet.2022.108966_b6"},{"issue":"6","key":"10.1016\/j.comnet.2022.108966_b7","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/90.974527","article-title":"On inferring autonomous system relationships in the internet","volume":"9","author":"Gao","year":"2001","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"72","key":"10.1016\/j.comnet.2022.108966_b8","first-page":"51","article-title":"The growing complexity of internet interconnection","author":"Faratin","year":"2008","journal-title":"Commun. Strateg."},{"key":"10.1016\/j.comnet.2022.108966_b9","series-title":"ACM Internet Measurement Conference","first-page":"23","article-title":"Inferring complex AS relationships","author":"Giotsas","year":"2014"},{"year":"2017","series-title":"The resource public key infrastructure (RPKI) to router protocol, version 1","author":"Bush","key":"10.1016\/j.comnet.2022.108966_b10"},{"key":"10.1016\/j.comnet.2022.108966_b11","doi-asserted-by":"crossref","unstructured":"Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, KC Claffy, AS relationships, customer cones, and validation, in: Proceedings of the 2013 Conference on Internet Measurement Conference, 2013, pp. 243\u2013256.","DOI":"10.1145\/2504730.2504735"},{"year":"1999","series-title":"Routing policy specification language (RPSL)","author":"Kessens","key":"10.1016\/j.comnet.2022.108966_b12"},{"year":"1999","series-title":"Using RPSL in practice","author":"Meyer","key":"10.1016\/j.comnet.2022.108966_b13"},{"issue":"1","key":"10.1016\/j.comnet.2022.108966_b14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1080\/23738871.2017.1295092","article-title":"Internet routing registries, data governance, and security","volume":"2","author":"Kuerbis","year":"2017","journal-title":"J. Cyber Policy"},{"key":"10.1016\/j.comnet.2022.108966_b15","series-title":"International Conference on Passive and Active Network Measurement","first-page":"71","article-title":"To filter or not to filter: Measuring the benefits of registering in the RPKI today","author":"Testart","year":"2020"},{"key":"10.1016\/j.comnet.2022.108966_b16","series-title":"2012 IEEE International Conference on Communications","first-page":"1193","article-title":"Valley-free violation in internet routing - analysis based on bgp community data","author":"Giotsas","year":"2012"},{"year":"2021","series-title":"AS Rank: A ranking of the largest autonomous systems in the internet","author":"CAIDA","key":"10.1016\/j.comnet.2022.108966_b17"},{"issue":"3","key":"10.1016\/j.comnet.2022.108966_b18","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/TNET.2020.2979665","article-title":"Power prefixes prioritization for smarter BGP reconvergence","volume":"28","author":"Brenes","year":"2020","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"12","key":"10.1016\/j.comnet.2022.108966_b19","doi-asserted-by":"crossref","first-page":"2432","DOI":"10.1109\/LCOMM.2019.2945964","article-title":"Measuring BGP route propagation times","volume":"23","author":"Garc\u00eda-Mart\u00ednez","year":"2019","journal-title":"IEEE Commun. Lett."},{"year":"2022","series-title":"BGP In 2021 - BGP updates","author":"Huston","key":"10.1016\/j.comnet.2022.108966_b20"},{"year":"2022","series-title":"BGP In 2021 - The BGP table","author":"Huston","key":"10.1016\/j.comnet.2022.108966_b21"},{"year":"2021","series-title":"Verification of AS_PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization","author":"Azimov","key":"10.1016\/j.comnet.2022.108966_b22"},{"year":"2021","series-title":"Route Leak Prevention using Roles in Update and Open messages","author":"Azimov","key":"10.1016\/j.comnet.2022.108966_b23"},{"key":"10.1016\/j.comnet.2022.108966_b24","doi-asserted-by":"crossref","unstructured":"Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira, Jumpstarting BGP Security with Path-End Validation, in: ACM SIGCOMM Conference, New York, NY, USA, ISBN: 9781450341936, 2016, p. 342 355.","DOI":"10.1145\/2934872.2934883"},{"key":"10.1016\/j.comnet.2022.108966_b25","series-title":"2015 IEEE International Conference on Communications","first-page":"7192","article-title":"Towards real-time route leak events detection","author":"Su","year":"2015"},{"year":"2020","series-title":"Flexsealing BGP against route leaks: Peerlock active measurement and analysis","author":"McDaniel","key":"10.1016\/j.comnet.2022.108966_b26"},{"key":"10.1016\/j.comnet.2022.108966_b27","series-title":"ACM SIGCOMM MineNet Workshop","article-title":"How to extract BGP peering information from the internet routing registry","author":"Di Battista","year":"2006"},{"key":"10.1016\/j.comnet.2022.108966_b28","series-title":"IEEE Global Telecommunications Conference, 2004. GLOBECOM \u201904","first-page":"1373","article-title":"On the evaluation of AS relationship inferences [internet reachability\/traffic flow applications]","volume":"Vol. 3","author":"Xia","year":"2004"},{"issue":"1","key":"10.1016\/j.comnet.2022.108966_b29","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/3211852.3211862","article-title":"A survey among network operators on BGP prefix hijacking","volume":"48","author":"Sermpezis","year":"2018","journal-title":"SIGCOMM Comput. Commun. Rev."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622001402?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622001402?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:18:56Z","timestamp":1761398336000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128622001402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":29,"alternative-id":["S1389128622001402"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2022.108966","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Practicable route leak detection and protection with ASIRIA","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2022.108966","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"108966"}}