{"id":"https://openalex.org/W2156607830","doi":"https://doi.org/10.1109/cit.2009.123","title":"Reputation Mechanism for Inter-domain Routing Security Management","display_name":"Reputation Mechanism for Inter-domain Routing Security Management","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2156607830","doi":"https://doi.org/10.1109/cit.2009.123","mag":"2156607830"},"language":"en","primary_location":{"id":"doi:10.1109/cit.2009.123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2009.123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Ninth IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044196870","display_name":"Ning Hu","orcid":"https://orcid.org/0000-0002-8355-0969"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Hu","raw_affiliation_strings":["Computer School, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Peidong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peidong Zhu","raw_affiliation_strings":["Computer School, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010898755","display_name":"Peng Zou","orcid":"https://orcid.org/0000-0002-8484-5769"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Zou","raw_affiliation_strings":["Computer School, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044196870"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":2.1842,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8913517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"10","issue":null,"first_page":"98","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.7407168745994568},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.736142098903656},{"id":"https://openalex.org/keywords/default-free-zone","display_name":"Default-free zone","score":0.6700824499130249},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.6087269186973572},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5656764507293701},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5561262965202332},{"id":"https://openalex.org/keywords/policy-based-routing","display_name":"Policy-based routing","score":0.5556089878082275},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5466010570526123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4917283356189728},{"id":"https://openalex.org/keywords/multipath-routing","display_name":"Multipath routing","score":0.4900747537612915},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.4801723062992096},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4748428165912628},{"id":"https://openalex.org/keywords/enhanced-interior-gateway-routing-protocol","display_name":"Enhanced Interior Gateway Routing Protocol","score":0.469022661447525},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.45974212884902954},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.44273531436920166},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3747207522392273},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.36082398891448975}],"concepts":[{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.7407168745994568},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.736142098903656},{"id":"https://openalex.org/C101396714","wikidata":"https://www.wikidata.org/wiki/Q3021187","display_name":"Default-free zone","level":5,"score":0.6700824499130249},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.6087269186973572},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5656764507293701},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5561262965202332},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.5556089878082275},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5466010570526123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4917283356189728},{"id":"https://openalex.org/C76522221","wikidata":"https://www.wikidata.org/wiki/Q5035396","display_name":"Multipath routing","level":5,"score":0.4900747537612915},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.4801723062992096},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4748428165912628},{"id":"https://openalex.org/C87044965","wikidata":"https://www.wikidata.org/wiki/Q1091139","display_name":"Enhanced Interior Gateway Routing Protocol","level":5,"score":0.469022661447525},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.45974212884902954},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.44273531436920166},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3747207522392273},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.36082398891448975},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cit.2009.123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cit.2009.123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Ninth IEEE International Conference on Computer and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W6205387","https://openalex.org/W1505128236","https://openalex.org/W1550619482","https://openalex.org/W1604936042","https://openalex.org/W1625214948","https://openalex.org/W1811828243","https://openalex.org/W1877037860","https://openalex.org/W1967656199","https://openalex.org/W2003590000","https://openalex.org/W2065283652","https://openalex.org/W2097726984","https://openalex.org/W2098685442","https://openalex.org/W2108465375","https://openalex.org/W2112269231","https://openalex.org/W2112494680","https://openalex.org/W2113282491","https://openalex.org/W2122744359","https://openalex.org/W2142762102","https://openalex.org/W2145721479","https://openalex.org/W2149497768","https://openalex.org/W2150302545","https://openalex.org/W2156262578","https://openalex.org/W2162260997","https://openalex.org/W2211687375","https://openalex.org/W4235965804","https://openalex.org/W4251598715","https://openalex.org/W6630218232","https://openalex.org/W6632905408","https://openalex.org/W6636753732","https://openalex.org/W6638037704","https://openalex.org/W6676970763","https://openalex.org/W6681106923"],"related_works":["https://openalex.org/W2506906025","https://openalex.org/W2789964607","https://openalex.org/W2370727401","https://openalex.org/W2336009886","https://openalex.org/W2372838829","https://openalex.org/W1515438706","https://openalex.org/W2542365088","https://openalex.org/W4297888253","https://openalex.org/W2949628990","https://openalex.org/W4253970008"],"abstract_inverted_index":{"Inter-domain":[0],"routing":[1,19,29,76,108,118,128],"system":[2,13],"is":[3,21,39,50],"the":[4,25,64,72,114,122],"critical":[5],"infrastructure":[6],"of":[7,27,66,116,126],"Internet.":[8],"Make":[9],"sure":[10],"that":[11],"autonomous":[12],"(AS)":[14],"announces":[15],"and":[16,35,85,101,120,138],"prefers":[17],"authentic":[18],"information":[20,119],"very":[22],"important":[23],"to":[24,32,43,62,135],"security":[26,124],"inter-domain":[28,127],"system.":[30,129],"Due":[31],"BGP's":[33],"opaqueness":[34],"AS's":[36],"autonomy,":[37],"it":[38],"difficult":[40],"for":[41,91],"AS":[42],"identify":[44],"whether":[45],"an":[46],"incoming":[47],"BGP":[48,136],"route":[49,99],"valid.":[51],"We":[52],"design":[53],"a":[54,88,92],"reputation":[55,89,110],"mechanism":[56,69,111,131],"based":[57],"on":[58,75],"Bayesian":[59],"probability":[60,83],"theory":[61],"evaluate":[63],"trustworthiness":[65,77],"AS.":[67,94],"The":[68],"takes":[70],"in":[71],"statistical":[73],"results":[74],"published":[78],"by":[79],"AS,":[80],"employs":[81],"posterior":[82],"analysis,":[84],"finally":[86],"calculates":[87],"score":[90],"particular":[93],"Our":[95,130],"proposal":[96],"makes":[97,132],"existing":[98],"monitoring":[100],"analysis":[102],"tool":[103],"more":[104],"effective.":[105],"Combining":[106],"with":[107],"decision,":[109],"can":[112],"restrain":[113],"propagation":[115],"bogus":[117],"improve":[121],"overall":[123],"situation":[125],"no":[133],"changes":[134],"protocol":[137],"supports":[139],"incremental":[140],"deployment.":[141]},"counts_by_year":[{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
