1Ballani H,Francis P,Zhang Xinyang. A study of prefix hijac- king and interception in the Internet [ J ]. ACM SIGCOMM Computer Communication Review,2007,37 (4) :265-276.
2Dimitropoulos X A, Krioukov D V, Fomenkov M, et al. AS re- lationships: inference and validation [ J ]. ACM SIGCOMM Computer Communication Review, 2007,37 ( 1 ) :29-40.
3Ramachandran A, Feamster N. Understanding the network- level behavior of spammers [ J ]. ACM SIGCOMM Computer Communication Review,2006,36 ( 4 ) :291 - 302.
4Adhlkari V K, Jain S, Zhang Zhili. YouTube traffic dynamicsand its interplay with a tier- 1 ISP: an ISP perspective [ C ]// Proceedings of the 10th ACM SIGCOMM conference on Inter- net measurement. [ s. 1. ] : ACM ,2010:431-443.
5Lad M, Oliveira R, Zhang B, et al. Understanding resiliency of internet topology against prefix hijack attacks [ C ]//Proc of 37th annual IEEE/IFIP international conference on dependa- ble systems and networks. Los Angeles: IEEE, 2007:368 - 377.
7Zhao Xiaoliang, Pei Dan, Wang Lan, et al. An analysis of BGP multiple origin AS ( MOAS ) conflicts [ C ]//Proceedings of ACM Intemet measurement workshop. San Francisco, CA, USA:ACM,2001:31-35.