2016
DOI: 10.1109/tnet.2015.2413838
|View full text |Cite
|
Sign up to set email alerts
|

The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior

Abstract: In this paper, we propose the BGP Visibility Toolkit, a system for detecting and analyzing anomalous behavior in the Internet. We show that interdomain prefix visibility can be used to single out cases of erroneous demeanors resulting from misconfiguration or bogus routing policies. The implementation of routing policies with BGP is a complicated process, involving fine-tuning operations and interactions with the policies of the other active ASes. Network operators might end up with faulty configurations or un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 24 publications
(25 reference statements)
0
11
0
Order By: Relevance
“…Previous work already showed that SVM [13], NB [5], DT [24], and NN [10] provided satisfactory results in detecting anomalies in BGP. In addition, these techniques are the most common binary classification methods [25], which are appropriate in classifying between anomalous and non-anomalous events.…”
Section: Machine Learning Algorithmsmentioning
confidence: 94%
See 1 more Smart Citation
“…Previous work already showed that SVM [13], NB [5], DT [24], and NN [10] provided satisfactory results in detecting anomalies in BGP. In addition, these techniques are the most common binary classification methods [25], which are appropriate in classifying between anomalous and non-anomalous events.…”
Section: Machine Learning Algorithmsmentioning
confidence: 94%
“…In this paper, we provide a rigorous evaluation of the aforementioned graph features through an extensive comparison of different ML algorithms used in BGP anomaly detection, i.e., Naive Bayes classifier (NB) [5], Decision Trees (DT) [24], Random Forests (RF), Support Vector Machines (SVM) [13], and Neural Networks (NN) [10], that use graph features to detect BGP path leaks. Our results indicate that these algorithms are able to detect anomalies, which demonstrate that graph features do not depend on any ML method to show their strength as data input predictors.…”
Section: Introductionmentioning
confidence: 99%
“…Study in [39] proposes a principal component analysis (PCA)-based anomaly method whilst study in [40] uses a PCA sparse. Authors in [41] propose a toolkit for analyzing and detecting anomalous behavior on the Internet. The works in [42]- [44] propose an anomalous mobile agent-based detection scheme, diagnostic and detection of occurrences on a network-wide, and PCA-based distributed-anomaly detection scheme, respectively.…”
Section: Anomaly Detection Studiesmentioning
confidence: 99%
“…Zhang et al [158] relied on unsupervised clustering techniques to recognize deviations from the normal state of BGP data flow. Lutu et al [159] argued that prefixes that are less visible in the Internet than expected by the prefix owners is an indicator for routing issues. The authors periodically collected BGP messages from vantage points and assigned a visibility degree to each prefix based on the fraction of ASs that have an active stable route for it.…”
Section: Detection and Mitigation Of Anomaliesmentioning
confidence: 99%