2019
DOI: 10.1109/access.2019.2941006
|View full text |Cite
|
Sign up to set email alerts
|

A Prefix Hijacking Detection Model Based on the Immune Network Theory

Abstract: The prefix hijacking problem is an urgent security issue that need to address in the Border Gateway Protocol (BGP) security research. In order to solve the problem of prefix hijacking in BGP, we propose (a) new (p)refix (h)ijacking (d)etection model based on the immune network theory in this paper, called aPHD. To be specific, aPHD uses real BGP UPDATE messages for pre-training and has the ability to detect UPDATE messages in real time after pre-training. The aPHD (1) can effectively detect prefix hijacking at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 43 publications
(39 reference statements)
0
1
0
Order By: Relevance
“…In fact, the AIS aim to emulate the mechanisms and behaviors observed by the immunologists in order to be applied to a particular problem [15]. After a quite complex modeling phase, AIS have been successfully applied to various fields of digital knowledge, including optimization theory [29], data analysis [30], image recognition [31], and computer security [32]. More specifically, AIS-based proposals have arisen to solve cybersecurity challenges for anomaly detection, intrusion detection, malicious process detection, scan and flood detection, and fraud detection, among others [33], [34], [35], [36] others.…”
Section: B Artificial Immune Systemsmentioning
confidence: 99%
“…In fact, the AIS aim to emulate the mechanisms and behaviors observed by the immunologists in order to be applied to a particular problem [15]. After a quite complex modeling phase, AIS have been successfully applied to various fields of digital knowledge, including optimization theory [29], data analysis [30], image recognition [31], and computer security [32]. More specifically, AIS-based proposals have arisen to solve cybersecurity challenges for anomaly detection, intrusion detection, malicious process detection, scan and flood detection, and fraud detection, among others [33], [34], [35], [36] others.…”
Section: B Artificial Immune Systemsmentioning
confidence: 99%