Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP

ST Teoh, K Zhang, SM Tseng, KL Ma… - Proceedings of the 2004 …, 2004 - dl.acm.org
The security of Internet routing is a major concern because attacks and errors can result in
data packets not reaching their intended destination and/or falling into the wrong hands. A …

[PDF][PDF] A visual technique for internet anomaly detection

ST Teoh, KL Ma, SF Wu, X Zhao - IASTED International Conference …, 2002 - cs.ucdavis.edu
The Internet can be made more secure and efficient with effective anomaly detection. In this
paper, we describe a visual method for anomaly detection using archived Border Gateway …

BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies

ST Teoh, S Ranjan, A Nucci, CN Chuah - Proceedings of the 3rd …, 2006 - dl.acm.org
Owing to the inter-domain aspects of BGP routing, it is difficult to correlate information across
multiple domains in order to analyze the root cause of the routing outages. We present BGP …

Internet routing anomaly detection and visualization

T Wong, V Jacobson… - … on Dependable Systems …, 2005 - ieeexplore.ieee.org
Diagnosing inter-domain routing problems in the Internet is hard. BGP, the defacto inter-
domain glue, is designed for routing, not diagnosis. It is extremely chatty-the most minor …

On detection of anomalous routing dynamics in BGP

K Zhang, A Yen, X Zhao, D Massey, SF Wu… - … , Services, and Protocols; …, 2004 - Springer
BGP, the de facto inter-domain routing protocol, is the core component of current Internet
infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing …

An anomaly detection framework for BGP

IO de Urbina Cazenave, E Köşlük… - … on Innovations in …, 2011 - ieeexplore.ieee.org
Abnormal events such as large scale power outages, misconfigurations, and worm attacks
can affect the global routing infrastructure and consequently create regional or global …

Vistracer: a visual analytics tool to investigate routing anomalies in traceroutes

F Fischer, J Fuchs, PA Vervier, F Mansmann… - Proceedings of the …, 2012 - dl.acm.org
Routing in the Internet is vulnerable to attacks due to the insecure design of the border
gateway protocol (BGP). One possible exploitation of this insecure design is the hijacking of …

Learning-based anomaly detection in BGP updates

J Zhang, J Rexford, J Feigenbaum - Proceedings of the 2005 ACM …, 2005 - dl.acm.org
Detecting anomalous BGP-route advertisements is crucial for improving the security and
robustness of the Internet's interdomain-routing system. In this paper, we propose an …

Neighborhood watch for internet routing: Can we improve the robustness of internet routing today?

G Siganos, M Faloutsos - IEEE INFOCOM 2007-26th IEEE …, 2007 - ieeexplore.ieee.org
Protecting BGP routing from errors and malice is one of the next big challenges for Internet
routing. Several approaches have been proposed that attempt to capture and block routing …

[图书][B] Case study: Interactive visualization for internet security

ST Teoh, KL Ma, SF Wu, X Zhao - 2002 - ieeexplore.ieee.org
Internet connectivity is defined by a set of routing protocols which let the routers that
comprise the Internet backbone choose the best route for a packet to reach its destination …