A survey of security techniques for the border gateway protocol (BGP)
MO Nicholes, B Mukherjee - IEEE communications surveys & …, 2009 - ieeexplore.ieee.org
Web surfing is an example (and popular) Internet application where users desire services
provided by servers that exist somewhere in the Internet. To provide the service, data must …
provided by servers that exist somewhere in the Internet. To provide the service, data must …
[BOOK][B] Application of machine learning techniques to detecting anomalies in communication networks: Datasets and feature selection algorithms
Detecting, analyzing, and defending against cyber threats is an important topic in cyber
security. Applying machine learning techniques to detect such threats has received …
security. Applying machine learning techniques to detect such threats has received …
Using BGP features towards identifying type of BGP anomaly
NH Hammood, B Al-Musawi - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
Unregular events such as large-scale power outages and routing table leaks (RTL) can
negatively affect the global routing stability and interrupt Internet services. The Border …
negatively affect the global routing stability and interrupt Internet services. The Border …
A survey of BGP anomaly detection using machine learning techniques
The border gateway protocol (BGP) is the protocol underlying the Internet's global routing
system. It manages the connectivity among autonomous systems (ASes) and how the …
system. It manages the connectivity among autonomous systems (ASes) and how the …
Detection of denial of service attacks using echo state networks
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are major threats
to cybersecurity in communication networks. These cyber attacks are evolving and …
to cybersecurity in communication networks. These cyber attacks are evolving and …
Realtime BGP Anomaly Detection Using Graph Centrality Features
Abstract Border Gateway Protocol (BGP) anomalies, such as hijacking, is currently growing
in trend due to limited detection capabilities. BGP hijacking maliciously reroutes Internet …
in trend due to limited detection capabilities. BGP hijacking maliciously reroutes Internet …
BGP based Solution for International ISP Blocking
AS Alrefai - 2009 - eprints.kfupm.edu.sa
The problem that this thesis tackles is finding and evaluating a counter measure to the
malicious Internet blocking of a local region by International Internet Service Providers (IISP) …
malicious Internet blocking of a local region by International Internet Service Providers (IISP) …
Using natural language constructs and concepts to aid network management
The increasing complexity of networks together with technological trends that allow for fine-
grained control and programmability have made network management a pressing …
grained control and programmability have made network management a pressing …
[PDF][PDF] Improving Computer Network Operations Through Automated Interpretation of State
A Dwaraki - 2020 - core.ac.uk
Software-Defined Networking (SDN) is an emerging technology for controlling networks at a
finer granularity than is possible in current networks. An SDN controller can set up the path …
finer granularity than is possible in current networks. An SDN controller can set up the path …
[BOOK][B] Network security in the core Internet
MO Nicholes - 2009 - search.proquest.com
Inter-domain routing is critical for connecting networks together to create the Internet. Local
networks are under the control of a single administration, and so they employ consistent …
networks are under the control of a single administration, and so they employ consistent …