C. Cimpanu, “Standard to protect against BGP hijack attacks gets first official draft,” ZDNet. [Online]. Available: https://www.zdnet.com/article/standard-to-protect-against-bgp-hijack-attacks-gets-first-official-draft/. [Accessed: 10-Oct-2019]
“NIST Releases Draft on BGP Security,” Dark Reading. [Online]. Available: https://www.darkreading.com/perimeter/nist-releases-draft-on-bgp-security/d/d-id/1332740. [Accessed: 25-Jan-2019]
“NIST Unveils Recommendations to Secure Federal Networks,” Executive Gov. [Online]. Available: https://www.executivegov.com/2018/12/nist-unveils-recommendations-to-secure-federal-networks/. [Accessed: 21-Dec-2018]
“The Internet is Getting Safer: Fall 2020 RPKI Update,” The Cloudflare Blog, 06-Nov-2020. [Online]. Available: https://blog.cloudflare.com/rpki-2020-fall-update/. [Accessed: 28-Nov-2020]
“MANRS,” MANRS. [Online]. Available: https://www.manrs.org/. [Accessed: 02-Sep-2020]
C. Yoo and D. Wishnick, “Lowering Legal Barriers to RPKI Adoption,” Faculty Scholarship at Penn Law, Jan. 2019 [Online]. Available: https://scholarship.law.upenn.edu/faculty_scholarship/2035
A. Reuter, R. Bush, Í. Cunha, E. Katz-Bassett, T. C. Schmidt, and M. Wählisch, “Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering,” arXiv:1706.04263 [cs], Jun. 2017 [Online]. Available: http://arxiv.org/abs/1706.04263. [Accessed: 20-Feb-2018]
P. Sermpezis et al., “ARTEMIS: Neutralizing BGP Hijacking within a Minute,” in Proceedings of the Applied Networking Research Workshop, Montreal, QC, Canada, 2018, p. 6, doi: 10.1145/3232755.3234554 [Online]. Available: https://doi.org/10.1145/3232755.3234554. [Accessed: 07-Jun-2020]
T. Hlavacek et al., “DISCO: Sidestepping RPKI’s Deployment Barriers,” in Proceedings 2020 Network and Distributed System Security Symposium, San Diego, CA, 2020, doi: 10.14722/ndss.2020.24355 [Online]. Available: https://www.ndss-symposium.org/wp-content/uploads/2020/02/24355.pdf. [Accessed: 07-Jun-2020]
M. Brouwer and E. Dekker, “The Current State of DNS Resolvers and RPKI Protection,” p. 8.
D. Cooper, E. Heilman, K. Brogle, L. Reyzin, and S. Goldberg, “On the Risk of Misbehaving RPKI Authorities,” in Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, New York, NY, USA, 2013, p. 16:1–16:7, doi: 10.1145/2535771.2535787 [Online]. Available: http://doi.acm.org/10.1145/2535771.2535787. [Accessed: 13-Dec-2019]
B. Al-Musawi, P. Branch, and G. Armitage, “BGP Anomaly Detection Techniques: A Survey,” IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 377–396, Firstquarter 2017, doi: 10.1109/COMST.2016.2622240.
“Bamboozling Certificate Authorities with BGP | USENIX.” [Online]. Available: https://www.usenix.org/conference/usenixsecurity18/presentation/birge-lee. [Accessed: 13-Dec-2019]
H. Birge-Lee, Y. Sun, A. Edmundson, J. Rexford, and P. Mittal, “Bamboozling Certificate Authorities with {BGP},” presented at the 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018, pp. 833–849 [Online]. Available: https://www.usenix.org/conference/usenixsecurity18/presentation/birge-lee. [Accessed: 19-Feb-2019]
Y. Gilad, A. Cohen, A. Herzberg, M. Schapira, and H. Shulman, “Are We There Yet? On RPKI’s Deployment and Security,” 1010, 2016 [Online]. Available: http://eprint.iacr.org/2016/1010. [Accessed: 20-Feb-2018]
“Dozens of Dormant North American Networks Suspiciously Resurrected at Once | SecurityWeek.Com.” [Online]. Available: https://www.securityweek.com/dozens-dormant-north-american-networks-suspiciously-resurrected-once. [Accessed: 11-Dec-2020]
“Microsoft introduces steps to improve internet routing security.” [Online]. Available: https://azure.microsoft.com/en-us/blog/microsoft-introduces-steps-to-improve-internet-routing-security/. [Accessed: 11-Dec-2020]
“How Google is working to improve internet routing security,” Google Cloud Blog. [Online]. Available: https://cloud.google.com/blog/products/networking/how-google-is-working-to-improve-internet-routing-security/. [Accessed: 04-Dec-2020]
“Network Outages Go Global.” [Online]. Available: http://www.circleid.com/posts/20201113-network-outages-go-global/. [Accessed: 29-Nov-2020]
“The Internet is Getting Safer: Fall 2020 RPKI Update,” The Cloudflare Blog, 06-Nov-2020. [Online]. Available: https://blog.cloudflare.com/rpki-2020-fall-update/. [Accessed: 28-Nov-2020]
“BGP Route Hijack Incident Review | BGP Origin Hijacks.” [Online]. Available: https://blog.catchpoint.com/2020/04/30/bgp-route-hijack-incident-review/. [Accessed: 06-Oct-2020]
“RPKI slowly catching on in Australia and New Zealand,” APNIC Blog, 18-Aug-2020. [Online]. Available: https://blog.apnic.net/2020/08/18/rpki-slowly-catching-on-in-australia-and-new-zealand/. [Accessed: 02-Sep-2020]
“Big Regional Network Outages,” POTs and PANs, 23-Jun-2020. [Online]. Available: https://potsandpansbyccg.com/2020/06/23/big-regional-network-outages/. [Accessed: 30-Jun-2020]
“How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today,” The Cloudflare Blog, 24-Jun-2019. [Online]. Available: https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/. [Accessed: 15-May-2020]
Cloudflare, “Is BGP safe yet? · Cloudflare.” [Online]. Available: https://isbgpsafeyet.com. [Accessed: 17-Apr-2020]
J. M. Smith, K. Birkeland, T. McDaniel, and M. Schuchard, “Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements,” arXiv:1811.03716 [cs], Jan. 2020, doi: 10.14722/ndss.2020.23240. [Online]. Available: http://arxiv.org/abs/1811.03716. [Accessed: 05-Mar-2020]
D. Goodin, “How 3ve’s BGP hijackers eluded the Internet—and made $29M,” Ars Technica, 21-Dec-2018. [Online]. Available: https://arstechnica.com/information-technology/2018/12/how-3ves-bgp-hijackers-eluded-the-internet-and-made-29m/. [Accessed: 13-Dec-2019]
C. Cimpanu, “Standard to protect against BGP hijack attacks gets first official draft,” ZDNet. [Online]. Available: https://www.zdnet.com/article/standard-to-protect-against-bgp-hijack-attacks-gets-first-official-draft/. [Accessed: 10-Oct-2019]
Stilgherrian, “‘Screaming car wreck’ of internet routing needs a fire brigade: Geoff Huston,” ZDNet. [Online]. Available: https://www.zdnet.com/article/screaming-car-wreck-of-internet-routing-needs-a-fire-brigade-geoff-huston/. [Accessed: 23-Sep-2019]
Stilgherrian, “Dear network operators, please use the existing tools to fix security,” ZDNet. [Online]. Available: https://www.zdnet.com/article/dear-network-operators-please-use-the-existing-tools-to-fix-security/. [Accessed: 23-Sep-2019]
“BGP Route Hijacking - The Akamai Blog.” [Online]. Available: https://blogs.akamai.com/2018/11/bgp-route-hijacking.html. [Accessed: 07-Aug-2019]
“Let’s fix those BGP route leaks - muada.com.” [Online]. Available: http://www.muada.com/2019/06-13-lets-fix-those-bgp-route-leaks.html. [Accessed: 01-Jul-2019]
A. Naik, “Anatomy of a BGP Hijack on Amazon’s Route 53 DNS Service,” Blog | ThousandEyes | Network Monitoring Software, 24-Apr-2018. [Online]. Available: https://blog.thousandeyes.com/amazon-route-53-dns-and-bgp-hijack/. [Accessed: 04-Jun-2018]
“Large BGP Leak by Google Disrupts Internet in Japan | Dyn Blog.” [Online]. Available: https://dyn.com/blog/large-bgp-leak-by-google-disrupts-internet-in-japan/. [Accessed: 02-Sep-2017]
R. C. 27 A. 2017 at 22:35 tweet_btn(), “Google routing blunder sent Japan’s Internet dark on Friday.” [Online]. Available: https://www.theregister.co.uk/2017/08/27/google_routing_blunder_sent_japans_internet_dark/. [Accessed: 31-Aug-2017]
R. C. 19 J. 2017 at 03:57 tweet_btn(), “Internet boffins take aim at BGP route leaks.” [Online]. Available: https://www.theregister.co.uk/2017/06/19/bgp_route_leak_prevention_draft_policy/. [Accessed: 31-Aug-2017]