The state of the art in BGP visualization tools: A mapping of visualization techniques to cyberattack types

J Raynor, T Crnovrsanin… - … on Visualization and …, 2022 - ieeexplore.ieee.org
Internet routing is largely dependent on Border Gateway Protocol (BGP). However, BGP
does not have any inherent authentication or integrity mechanisms that help make it secure …

[PDF][PDF] Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.

PA Vervier, O Thonnard, M Dacier - NDSS, 2015 - eurecom.fr
Some recent research presented evidence of blocks of IP addresses being stolen by BGP
hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in …

HEAP: reliable assessment of BGP hijacking attacks

J Schlamp, R Holz, Q Jacquemart… - IEEE Journal on …, 2016 - ieeexplore.ieee.org
The detection of BGP prefix hijacking attacks has been the focus of research for more than a
decade. However, the state-of-the-art techniques fall short of detecting more elaborate types …

Visual-interactive identification of anomalous ip-block behavior using geo-ip data

A Ulmer, M Schufrin, D Sessler… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Routing of network packets from one computer to another is the backbone of the internet and
impacts the everyday life of many people. Although, this is a fully automated process it has …

The abandoned side of the Internet: Hijacking Internet resources when domain names expire

J Schlamp, J Gustafsson, M Wählisch… - Traffic Monitoring and …, 2015 - Springer
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking
events. Major outages such as the China Telecom incident in 2010 stimulate speculations …

Malicious BGP hijacks: appearances can be deceiving

PA Vervier, Q Jacquemart, J Schlamp… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
BGP hijacking is a well known threat to the Internet routing infrastructure. There has been
considerable interest in developing tools that detect prefix hijacking but such systems …

Towards uncovering BGP hijacking attacks

Q Jacquemart - 2015 - pastel.hal.science
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange
routing information using the Border Gateway Protocol (BGP). Consequently, every AS …

[PDF][PDF] Detection of suspicious URLs in online social networks using supervised machine learning algorithms

MFZ Al-Janabi - 2018 - core.ac.uk
K-NN k-nearest neighbours algorithm NB classifier Naïve Bayes classifier Sub-domains A
name that could be added to the original domain but separated with a full stop. For example …

Consignor is a Spammer

R Kumar, M Punetha, I Sharma… - … Systems and Network …, 2014 - ieeexplore.ieee.org
Considering the User's point of view, the mails, which are gone through by the user, are
important, and other unread mails can be apparently considered to be of no importance …

Looking for correlation between SPAM and visits on your websites

M Michalski - 2015 IEEE 16th International Conference on High …, 2015 - ieeexplore.ieee.org
In this paper, a system implemented in a web server for searching website crawlers which
create a database of email addresses for spamming is presented. For every visitor the …