“…Additionally, incidents drastically vary in duration from minutes to several hours making the prospects of properly capturing data from an attack challenging. While there are possible automated solutions for adding security to the BGP system-such as Resource Public Key Infrastructure (RPKI) and Secure BGP (S-BGP) [26,35,38,51]-the deep entrenchment and foundational role of BGP in the internet [64] means that the protocol does not often change and infrastructure and software upgrades are costly. Because of these challenges, visualization tools present a feasible alternative to manage and understand operations, security incidents, and anomalies.…”