2003
DOI: 10.1007/978-3-540-39671-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events

Abstract: Abstract. To complement machine intelligence in anomaly event analysis and correlation, in this paper, we investigate the possibility of a human-interactive visual-based anomaly detection system for faults and security attacks related to the BGP (Border Gateway Protocol) routing protocol. In particular, we have built and tested a program, based on fairly simple information visualization techniques, to navigate interactively real-life BGP OASC (Origin AS Change) events. Our initial experience demonstrates that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…“A picture is worth a thousand of words.” Information visualization generally needs to handle very large amounts of textual, symbolic, or relational data and to transfer these data into graphics that can be displayed . A visualization system provides a more perceptive method for security analysis.…”
Section: Data Process and Analysismentioning
confidence: 99%
“…“A picture is worth a thousand of words.” Information visualization generally needs to handle very large amounts of textual, symbolic, or relational data and to transfer these data into graphics that can be displayed . A visualization system provides a more perceptive method for security analysis.…”
Section: Data Process and Analysismentioning
confidence: 99%
“…Besides cryptographic solutions, other works focused on the MOAS conflicts. Wu et al worked on BGP anomalies and MOAS visualization tools (Teoh, 2003) (Teoh, 2004). Anomaly visualization is not efficient enough againt anomalies, it would be more efficient to have a mechanism that detects and reacts to anomalies as the routing system is running or even a mechanism that prevent those attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the study in [34] proposed to enhance BGP protocol to detect IP address ownership violation . Researchers also applied visualization [29] and topology-based [14] techniques to attack the above problem. The more related work to IRF is [33], which used signature-based and statistics-base methods.…”
Section: Related Workmentioning
confidence: 99%