<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.geng-sidrops-aspa-analysis" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-aspa-analysis-01">
   <front>
      <title>An Analysis of ASPA-based AS_PATH Verification</title>
      <author initials="N." surname="Geng" fullname="Nan Geng">
         <organization>Huawei</organization>
      </author>
      <author initials="M." surname="Huang" fullname="Mingqing(Michael) Huang">
         </author>
      <author initials="Y." surname="Wang" fullname="Yangyang Wang">
         <organization>Tsinghua University</organization>
      </author>
      <date month="June" day="29" year="2024" />
      <abstract>
	 <t>   Autonomous System Provider Authorization (ASPA) is very helpful in
   detecting and mitigating route leaks (valley-free violations) and a
   majority of forged-origin hijacks.  This document does an analysis on
   ASPA-based AS_PATH verification to help people understand its
   strengths and deficiencies.

   The document can help people deploy ASPA properly and provide some
   potential directions of enhancing ASPA.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-aspa-analysis-01" />
   
</reference>
