A survey of security techniques for the border gateway protocol (BGP)

MO Nicholes, B Mukherjee - IEEE communications surveys & …, 2009 - ieeexplore.ieee.org
Web surfing is an example (and popular) Internet application where users desire services
provided by servers that exist somewhere in the Internet. To provide the service, data must …

[BOOK][B] Application of machine learning techniques to detecting anomalies in communication networks: Datasets and feature selection algorithms

Q Ding, Z Li, S Haeri, L Trajković - 2018 - Springer
Detecting, analyzing, and defending against cyber threats is an important topic in cyber
security. Applying machine learning techniques to detect such threats has received …

Using BGP features towards identifying type of BGP anomaly

NH Hammood, B Al-Musawi - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
Unregular events such as large-scale power outages and routing table leaks (RTL) can
negatively affect the global routing stability and interrupt Internet services. The Border …

A survey of BGP anomaly detection using machine learning techniques

NH Hammood, B Al-Musawi, AH Alhilali - International Conference on …, 2021 - Springer
The border gateway protocol (BGP) is the protocol underlying the Internet's global routing
system. It manages the connectivity among autonomous systems (ASes) and how the …

Detection of denial of service attacks using echo state networks

K Bekshentayeva, L Trajković - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are major threats
to cybersecurity in communication networks. These cyber attacks are evolving and …

Realtime BGP Anomaly Detection Using Graph Centrality Features

J Huang, M Odiathevar, A Valera, J Sahni… - International Conference …, 2024 - Springer
Abstract Border Gateway Protocol (BGP) anomalies, such as hijacking, is currently growing
in trend due to limited detection capabilities. BGP hijacking maliciously reroutes Internet …

BGP based Solution for International ISP Blocking

AS Alrefai - 2009 - eprints.kfupm.edu.sa
The problem that this thesis tackles is finding and evaluating a counter measure to the
malicious Internet blocking of a local region by International Internet Service Providers (IISP) …

Using natural language constructs and concepts to aid network management

A Dwaraki, R Freedman, S Zilberstein… - 2019 international …, 2019 - ieeexplore.ieee.org
The increasing complexity of networks together with technological trends that allow for fine-
grained control and programmability have made network management a pressing …

[PDF][PDF] Improving Computer Network Operations Through Automated Interpretation of State

A Dwaraki - 2020 - core.ac.uk
Software-Defined Networking (SDN) is an emerging technology for controlling networks at a
finer granularity than is possible in current networks. An SDN controller can set up the path …

[BOOK][B] Network security in the core Internet

MO Nicholes - 2009 - search.proquest.com
Inter-domain routing is critical for connecting networks together to create the Internet. Local
networks are under the control of a single administration, and so they employ consistent …