The state of the art in BGP visualization tools: A mapping of visualization techniques to cyberattack types

J Raynor, T Crnovrsanin… - … on Visualization and …, 2022 - ieeexplore.ieee.org
BGP security—not in the form of prevention, but rather on incident and anomaly identification
and analysis. … methods for detecting BGP issues. We limit our systematic review to focus on …

BGPStream: a software framework for live and historical BGP data analysis

C Orsini, A King, D Giordano, V Giotsas… - Proceedings of the 2016 …, 2016 - dl.acm.org
… Although BGP is a crucial operational component of the … security, topology, protocols,
economics, etc., there is no efficient way of processing large amounts of distributed and/or live BGP

Survey Studies of Software-Defined Networking: A Systematic Review and Meta-analysis

B Babayigit, B Ulu, M Abubaker - Engineering Journal, 2023 - engj.org
security paradigms within SDN to secure new technologies represents a significant frontier.
2) Content and Performance Placement: The field of content and performance placement …

Bigfoot: A geo-based visualization methodology for detecting bgp threats

M Syamkumar, R Durairajan… - … for Cyber Security  …, 2016 - ieeexplore.ieee.org
… (BGP) … analyze and visualize BGP updates that enable characteristics and behaviors of
interest to be identified effectively. To demonstrate Bigfoot’s capabilities, we consider 1.79B BGP

Classifying anomalous events in BGP datasets

M Ćosović, S Obradovió… - 2016 IEEE Canadian …, 2016 - ieeexplore.ieee.org
… In this paper, we analyze performance of BGP detection models based on Naïve Bayes and
Decision Tree J48 classifiers. The Moscow Power Blackout, AS 9121 Routing Table Leak, …

An investigation to cybersecurity countermeasures for global internet infrastructure.

H Hammood - 2021 - eprints.bournemouth.ac.uk
BGP security, due to the fact that it is the only external protocol connecting the ASes around
the globe. In this thesis, different securitysecurity issues of BGP. Followed by the evolution of …

Practical defenses against BGP prefix hijacking

Z Zhang, Y Zhang, YC Hu, ZM Mao - Proceedings of the 2007 ACM …, 2007 - dl.acm.org
BGP router originates an IP prefix that the router does not own, is becoming an increasingly
serious security … preserve the convergence properties of BGP regardless of the number of …

The implementation of border gateway protocol using software-defined networks: A systematic literature review

X Zhao, SS Band, S Elnaffar, M Sookhak… - IEEE …, 2021 - ieeexplore.ieee.org
… They posited this to be key to addressed BGP security. Also, they have used BGPSecX
for improved the BGP security. Their design also contains secure channels between the …

Global Internet Traffic Routing and Privacy

R Brooks, KC Wang, J Oakley… - … Scientific and Technical …, 2020 - ieeexplore.ieee.org
… We describe work we performed that applies BGP injects to Internet … Analysis of this work
shows that BGP reliance on autonomous … Why is it taking so long to secure internet routing? …

Performance evaluation of BGP anomaly classifiers

M Ćosović, S Obradović… - 2015 Third International …, 2015 - ieeexplore.ieee.org
… We use BGP update messages that originated from AS 513 (route collector rrc04) member
… and it is used for analysis of dump files. We transform BGP update messages from MRT into …