Subject
Computer Networks and Communications
Reference43 articles.
1. A border gateway protocol 4 (BGP-4);Rekhter,1994
2. X. Shi, Y. Xiang, Z. Wang, X. Yin, J. Wu, Detecting prefix hijackings in the internet with argus, in: Proceedings of the 2012 Internet Measurement Conference, 2012, pp. 15–28.
3. MS-LSTM: A multi-scale LSTM model for BGP anomaly detection;Cheng,2016
4. Z. Zhang, Y. Zhang, Y.C. Hu, Z.M. Mao, R. Bush, iSPY: Detecting IP prefix hijacking on my own, in: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, 2008, pp. 327–338.
5. A novel unsupervised method for securing BGP against routing hijacks;Theodoridis,2013
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Graph Attention Networks: A Comprehensive Review of Methods and Applications;Future Internet;2024-09-03
2. Practical Anomaly Detection in Internet Services: An ISP centric approach;NOMS 2024-2024 IEEE Network Operations and Management Symposium;2024-05-06
3. Realtime BGP Anomaly Detection Using Graph Centrality Features;Lecture Notes on Data Engineering and Communications Technologies;2024
4. Classification of BGP Anomalies Using GRU with BGP Update Messages;Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security;2023-12-22
5. Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01