2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2016
DOI: 10.1109/smc.2016.7844751
|View full text |Cite
|
Sign up to set email alerts
|

Detecting BGP anomalies using machine learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…SVM have been proven to work well with worm detection in BGP (e.g., [8,14,16]). More recently, Dai et al [13] proposed SVMbased BGP Anomaly Detection (SVM-BGPAD) using different SVM kernels and Fisher algorithm for feature selection.…”
Section: Ml-based Bgp Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…SVM have been proven to work well with worm detection in BGP (e.g., [8,14,16]). More recently, Dai et al [13] proposed SVMbased BGP Anomaly Detection (SVM-BGPAD) using different SVM kernels and Fisher algorithm for feature selection.…”
Section: Ml-based Bgp Anomaly Detectionmentioning
confidence: 99%
“…The current ML-based works focus on worm attacks (i.e., [5,6,10,12,16,17]), while only a few (cf. [11,14]) have studied the combination of worm attacks, blackouts, and table leaks.…”
Section: Ml-based Bgp Anomaly Detectionmentioning
confidence: 99%
“…1) extracted from raw BGP data can be classi ied as: i) volume features, such as the number of announcements and withdrawals; ii) AS-PATH features, such as average AS-PATH length, and the maximum edit distance. Various work, using statistical features, achieved good performance on the detection of large-scale anomalies using conventional ML models such as SVM [8,9], Naive Bayes classi iers [8,9], decision trees [9] and deep learning [8,10].…”
Section: Statistical Featuresmentioning
confidence: 99%
“…1, part of the preprocessing may involve transforming them into either statistical features (i.e. count of announcements, preixes [8,9,10,11]) or graph features (e.g. eccentricity, centrality [12,11]).…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, most of the approaches towards addressing this escalating problem are based on machine learning (ML) [4][5][6][7] and deep learning (DL) techniques [8][9][10], and while these methods are effective in identifying the unusual patterns indicative of cyber threats, their implementation requires extensive data preprocessing and accurate data labeling to differentiate between normal and anomalous behaviors effectively. In addition, these techniques require time and resource-intensive training stages.…”
Section: Introductionmentioning
confidence: 99%