%PDF-1.5
%
1 0 obj
<< /S /GoTo /D (chapter.1) >>
endobj
4 0 obj
(1 Einleitung)
endobj
5 0 obj
<< /S /GoTo /D (section.1.1) >>
endobj
8 0 obj
(1.1 Motivation)
endobj
9 0 obj
<< /S /GoTo /D (section.1.2) >>
endobj
12 0 obj
(1.2 Problemstellung)
endobj
13 0 obj
<< /S /GoTo /D (section.1.3) >>
endobj
16 0 obj
(1.3 Aufbau dieser Arbeit)
endobj
17 0 obj
<< /S /GoTo /D (chapter.2) >>
endobj
20 0 obj
(2 Topologie)
endobj
21 0 obj
<< /S /GoTo /D (section.2.1) >>
endobj
24 0 obj
(2.1 Projekte)
endobj
25 0 obj
<< /S /GoTo /D (subsection.2.1.1) >>
endobj
28 0 obj
(2.1.1 Route-Views Project)
endobj
29 0 obj
<< /S /GoTo /D (subsection.2.1.2) >>
endobj
32 0 obj
(2.1.2 RIPE NCC)
endobj
33 0 obj
<< /S /GoTo /D (section.2.2) >>
endobj
36 0 obj
(2.2 Messmethoden)
endobj
37 0 obj
<< /S /GoTo /D (subsection.2.2.1) >>
endobj
40 0 obj
(2.2.1 BGP beacons)
endobj
41 0 obj
<< /S /GoTo /D (subsection.2.2.2) >>
endobj
44 0 obj
(2.2.2 Route Monitor Selection)
endobj
45 0 obj
<< /S /GoTo /D (section.2.3) >>
endobj
48 0 obj
(2.3 Zusammenfassung)
endobj
49 0 obj
<< /S /GoTo /D (chapter.3) >>
endobj
52 0 obj
(3 BGP Verwundbarkeit)
endobj
53 0 obj
<< /S /GoTo /D (section.3.1) >>
endobj
56 0 obj
(3.1 Wirkungsweise bekannter Angriffe)
endobj
57 0 obj
<< /S /GoTo /D (subsection.3.1.1) >>
endobj
60 0 obj
(3.1.1 Prefix Hijacking \046 Interception)
endobj
61 0 obj
<< /S /GoTo /D (section.3.2) >>
endobj
64 0 obj
(3.2 Erkennung \046 Vermeidung von Angriffen)
endobj
65 0 obj
<< /S /GoTo /D (subsection.3.2.1) >>
endobj
68 0 obj
(3.2.1 Erkennung von falschen BGP-Updates)
endobj
69 0 obj
<< /S /GoTo /D (subsection.3.2.2) >>
endobj
72 0 obj
(3.2.2 Origin AS Validation)
endobj
73 0 obj
<< /S /GoTo /D (section.3.3) >>
endobj
76 0 obj
(3.3 Zusammenfassung)
endobj
77 0 obj
<< /S /GoTo /D (chapter.4) >>
endobj
80 0 obj
(4 Abgrenzung)
endobj
81 0 obj
<< /S /GoTo /D (chapter*.4) >>
endobj
84 0 obj
(Literaturverzeichnis)
endobj
85 0 obj
<< /S /GoTo /D [86 0 R /Fit] >>
endobj
90 0 obj <<
/Length 554
/Filter /FlateDecode
>>
stream
xڥn0y
m`QEJcAV߶ XbQpކ 1Gx.5,[>'Xp-H!̓=,d,ål 7lSAk';8uŘBM-kOo樹Ǯ$()ŴJrϏ*g
.X0e47*c}M.S)Ϫa~tI.ݯDbݒ\E'osS]+&(SB 3.7!z
R
"B`jζKۅnm΅
sDb+߅m"!^:S{_&PFH6v'z(uͻX@z~7imr[Ӭan3RW*`@@٫H@Q^OFCIߤRq8'߹U@zFl>
TMR#@5 SV{iuk]mh/8kI eOEz)NFD
endstream
endobj
86 0 obj <<
/Type /Page
/Contents 90 0 R
/Resources 89 0 R
/MediaBox [0 0 595.276 841.89]
/Parent 95 0 R
/Group 88 0 R
>> endobj
87 0 obj <<
/Type /XObject
/Subtype /Image
/Width 596
/Height 194
/BitsPerComponent 8
/ColorSpace /DeviceRGB
/SMask 96 0 R
/Length 6027
/Filter /FlateDecode
>>
stream
x흿=K})8p
" @3nd$7;h &j3guu~Xl]]5j Nѯ> } h ڇ ڇ e } h h 0 0 h h h h h a h h h h h a h h h h h V> @> @> @> @> @> O?/rY!Wo|-|ULw37^^S'pܥ*emU5Ȁ:TEc*
͵BZ_Qr|:j.%ʚ ʵf[?㳲T^;W_!q{UR7VD_AڥΗ^7jWMBkaYxů~R˚m?ݘ4|THtʗo|SM/4IRu#+2h߃n)~?W%f?ܻja}P˶rf~g9Q}rZ!L0x9:~k+o|<#-qkRSod}NlydF[,4fc
~ӋT-dLvwbU!'yiύ.Q9gWE;.l<\
Yаvvt!sORաD.k3>BAUI1rn_3,X<*c3YV}B8VSG)˴}FS9rSv$x!\^P])V:[Bڗ|}46l;,^=E5زs3Hb96i@eY3PwQάtQvʣ
Kײ
')7_Ӏn{X\mgiQ+TbtcjEeLDk۶cŤҨs)Vl&^\dz}X@Qf<ؔbYƲ$+*qCsNެȔv\:=!}}ڤFF9t=QgzY]ZG^}A80̎u:B7&SA6x\]̒5ep&'Ma]Z2--5(}37Սh6ttJy*Z[i_𗃺-.S)g7ʭ{}ω2plC&JHS4WKų/=J2dxd9Veҩ:}sbZKX-9rEő9bjeGx?Y]٭i6]2}rF*l9^͘&ODyWc;'[ojz+B˼v纘͌.Gqu=;ȡsNh\C
9zܤ-Op4K9牼E;-cj{]CTHq@ΊԾuk;[F}h=K7j%ʼ;R}9>ӾӜԼ|S}'2ƳIёFZ:D9DloLsSbYfvs
XmSS=+xY&eo}9-҆_}. iFkM,vg7Wk, LZhvZX[3
huӜT+-\X/pNp*V;)ےWJ͞2m/־M{eKsҾ6]ڷ>gę͖{Xr̪jrGʥTN)v3ۨM=u|0 Ll3Mguro-U)=sR˘?KNCoM@@riPϙe7GՖk0g1Zk~xRY/6V뒼*NC+ߜiӗ:.6Gт6}g]>gG:3i
߷LkjrqukLN; vos'p
\\h{Lf~9w-
jfשJKs=y}e/#b>\ڒ^\xd|/LE^Arqoo ^0sq¥j4UeHܓW6slEcٯA=j77;eң\[Z2bΩ
NmeWmɎ'WT/ӗWn>:,Bz1g+s|:Scqm@ڗo
,cq/WQdlϻx{ uk{SgYW,g~U|*rCsnBM }k;ܘ9]*E.8}vL{Xfܮ՚3RN)u:b8L*+KBȑpGzd5qz3nj0hQn>B(V[9υ+zNҮ|kVVsfd\n4;d[d__u5Z [rmh"8;QG/>dF ޜ+ʘ*O(G i/dNKG~h@^?c B>snF>vm ،M3t oI> _z}?y*S Jcy_C 8]Ѫuѯc߉U4=W ~M5wJՋ%RrǣUÙ:e} >Pg֫+O'T oo]w4wQ.[J
ѫ,4mveyYx'#n>Ǟ}uj%?sW9~uZ胟&S:NJCϫ9=#hB#T9 9~('0G_3ؔ켵'_uٓ#\mDJ]LZN-ޖu0Ӷ;тuZ-:4RYiO]4(jLμ]WLSr~4vd_ Ց͐^%JB`ϊ#P[#3/_#\#jVfm rv}ZW#Yqtl