Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,205 papers from all fields of science
Search
Sign In
Create Free Account
Bogon filtering
Known as:
Bogon (address)
, Debogon
, Bogon Reference
Expand
Bogon filtering is the practice of filtering bogons, which are bogus IP addresses of a computer network. Bogon is also an informal name for an IP…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Black hole (networking)
Denial-of-service attack
IPv4 address exhaustion
Ingress filtering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Large-Scale Analysis of Infrastructure-Leaking DNS Servers
Dennis Tatang
,
C. Schneider
,
Thorsten Holz
International Conference on Detection of…
2019
Corpus ID: 184482888
The Domain Name System (DNS) is a fundamental backbone service of the Internet. In practice, this infrastructure often shows…
Expand
2019
2019
Medindo a incidência de spoofing no contexto de tráfego IPv6 inter-domínio em um IXP
Rodrigo Favalessa Peruch
2019
Corpus ID: 202769249
Spoofing is a very well-known type of attack in which the sender forges the source address of packets it transmits. In the…
Expand
2015
2015
Demystifying the IP Blackspace
Quentin Jacquemart
,
Pierre-Antoine Vervier
,
G. Urvoy-Keller
,
E. Biersack
International Symposium on Recent Advances in…
2015
Corpus ID: 27962439
A small part of the IPv4 address space has still not been assigned for use to any organization. However, some of this IP space is…
Expand
2014
2014
Experience with large-scale end user measurement techniques
G. Michaelson
,
G. Huston
Australasian Telecommunication Networks and…
2014
Corpus ID: 17994358
For business and strategic planning reasons, there is considerable interest in the take-up of protocols such as IPv6 and DNSSEC…
Expand
2014
2014
Detecting routing anomalies with RIPE Atlas
Todor Yakimov
2014
Corpus ID: 16049106
Routing anomalies are a common occurrence on Today’s Internet. Given the vast size of the Internet, detecting such anomalies…
Expand
2012
2012
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic
R. Vaidyanathan
,
Abhrajit Ghosh
,
Yukiko Sawaya
,
A. Kubota
International Conference on Computing, Networking…
2012
Corpus ID: 14829260
Spoofed IP traffic (traffic containing packets with incorrect source IP addresses) is often used by Internet-based attackers for…
Expand
2011
2011
The use and abuse of unassigned IP address space
N. Wolters
2011
Corpus ID: 45067097
Not all the IP-addresses are assigned to Internet Service Providers, all those that are not are consider unassigned or…
Expand
2008
2008
A Profile for Bogon Origin Attestations (BOAs)
G. Huston
,
T. Manderson
,
G. Michaelson
2008
Corpus ID: 126049874
This document defines a standard profile for Bogon Origin Attestations (BOAs). A BOA is a digitally signed object that provides a…
Expand
2001
2001
Language death. David Crystal. Cambridge: Cambridge University Press, 2000. Pp. 208.
R. Thompson
,
J. Gleason
Applied Psycholinguistics
2001
Corpus ID: 59429942
“On 4 November 1995 Kasabe existed; on 5 November it did not.” This brief obituary in David Crystal's book (p. 1) does not refer…
Expand
1986
1986
Measuring User Satisfaction
Kieran Mathieson
1986
Corpus ID: 62589329
Bogon the gnome was obsessed with the measurement of user satisfaction. Together with his super-servant LISREL, he set out to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required