2020
DOI: 10.1016/j.cola.2020.100966
|View full text |Cite
|
Sign up to set email alerts
|

Multi-view routing visualization for the identification of BGP issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Finally, Youn et al presented a study on BGP visualization tools focused on cyber situational awareness [82]. Their survey canvassed 10 tools, seven of which appear in our study: [5,9,64,67,68,73,76], and give more specifics on the visualization techniques employed, core functions, level of detail and use cases. However, they do not consider the specific attacks used to validate the tools or attempt to map the visualization techniques to the attack types.…”
Section: Related Surveys and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, Youn et al presented a study on BGP visualization tools focused on cyber situational awareness [82]. Their survey canvassed 10 tools, seven of which appear in our study: [5,9,64,67,68,73,76], and give more specifics on the visualization techniques employed, core functions, level of detail and use cases. However, they do not consider the specific attacks used to validate the tools or attempt to map the visualization techniques to the attack types.…”
Section: Related Surveys and Motivationmentioning
confidence: 99%
“…Unfortunately, nine of the 29 papers in this survey did not mention an attack type specifically, or the attack types were unknown or unavailable. Some papers had lower levels of detail and sub categories of attacks, such as prefix matching or more specific prefix attacks such as in Candela et al [9]. Additionally, these higher-level attacks can sometimes overlap in terms of observable routing behavior.…”
Section: Bgp Attack and Anomaly Typesmentioning
confidence: 99%
See 2 more Smart Citations
“…Syamkumar et al(2020) [14] proposed a model called BigBen, a network telemetry processing system designed to accurately and timely report Internet events (interruptions, attacks, configuration changes, etc.). It was developed to identify a wide range of Internet events, characterized by location, range, and duration, and to compare detected events with events detected by large active probe-based detection systems..Massimo Candela et al(2020) [15] proposed a model called Upstream Visibility for scenario-based monitoring of Internet events (interruptions, attacks, configuration changes, etc.). The global view based on the stack area chart provides a high trend for the visibility of IP prefixes and has been developed to provide a local view to check the impact of IP prefixes visibility time.…”
Section: Related Work 21 Cyber Situation Awareness (Cyber Sa) Overviewsmentioning
confidence: 99%