2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2014
DOI: 10.1109/smc.2014.6974096
|View full text |Cite
|
Sign up to set email alerts
|

Classification of BGP anomalies using decision trees and fuzzy rough sets

Abstract: Abstract-Border Gateway Protocol (BGP) is the core component of the Internet's routing infrastructure. Abnormal routing behavior impairs global Internet connectivity and stability. Hence, designing and implementing anomaly detection algorithms is important for improving performance of routing protocols. While various machine learning techniques may be employed to detect BGP anomalies, their performance strongly depends on the employed learning algorithms. These techniques have multiple variants that often work… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Machine learning techniques have been recently employed in designing BGP anomaly detection systems [5]- [7]. In this paper, we use Naïve Bayes (NB), Decision Tree (J48), and SVM Radial Basis Function (RBF) kernel classifiers implemented in Weka (v. 3.7.11) and test their ability to reliably detect network anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning techniques have been recently employed in designing BGP anomaly detection systems [5]- [7]. In this paper, we use Naïve Bayes (NB), Decision Tree (J48), and SVM Radial Basis Function (RBF) kernel classifiers implemented in Weka (v. 3.7.11) and test their ability to reliably detect network anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…Li et al used the fuzzy rough sets approach for feature selection and reduction then trained decision tree and Effective Learning Machine (ELM) Algorithm to detect anomalies. By doing this, 92% accuracy with decision trees and 84.59% with ELM was achieved [14].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Malicious actors have the potential to influence BGP to deny service, sniff communications, reroute traffic to malicious networks, and create network instabilities (Meinel, 2008). Abnormal routing behaviour can disrupt global or local bound Internet connectivity and stability (Li et al, 2014;Murphy, 2006).…”
Section: Border Gateway Protocolmentioning
confidence: 99%