2017
DOI: 10.1016/j.cose.2017.06.011
|View full text |Cite
|
Sign up to set email alerts
|

Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Routing anomalies caused by both misconfigurations and malicious intent have tested the resilience of Internet core protocols [40]. Here, we propose an anomaly detection method and show that it would identify three large scale anomalies significantly in advance when compared with the state-ofthe-art method [54].…”
Section: Discussionmentioning
confidence: 99%
“…Routing anomalies caused by both misconfigurations and malicious intent have tested the resilience of Internet core protocols [40]. Here, we propose an anomaly detection method and show that it would identify three large scale anomalies significantly in advance when compared with the state-ofthe-art method [54].…”
Section: Discussionmentioning
confidence: 99%
“…We have included networks and autonomous systems in our assessment of third-party dependencies in access paths due to the increasing relevance of BGPrelated security issues [26,27,28]. Indeed, BGP attacks have occurred even in application scenarios different from the web [29] and others have proven to be feasible [30,31].…”
Section: Motivations and Related Workmentioning
confidence: 99%