IP prefix hijack detection using BGP connectivity monitoring
暂无分享,去创建一个
[1] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[2] Michael Meier,et al. Inter-AS routing anomalies: Improved detection and classification , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[3] Philip S. Yu,et al. Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.
[4] Miao Wang,et al. A Packet-Based Anomaly Detection Model for Inter-domain Routing , 2009, 2009 IEEE International Conference on Networking, Architecture, and Storage.
[5] Seok-Hee Hong. Network Analysis and Visualisation , 2005, Graph Drawing.
[6] Georg Carle,et al. The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire , 2015, TMA.
[7] Murat Can Ganiz,et al. An anomaly detection framework for BGP , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.
[8] Olaf Maennel,et al. Towards detecting BGP route hijacking using the RPKI , 2012, SIGCOMM.
[9] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM 2007.
[10] Marc Dacier,et al. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks , 2015, NDSS.
[11] Amit Chhabra,et al. Improved J48 Classification Algorithm for the Prediction of Diabetes , 2014 .
[12] Arnold Pears,et al. Connectivity Models : A New Approach to Modeling Contacts in Opportunistic Networks. ∗ , 2006 .
[13] Marc Dacier,et al. Malicious BGP hijacks: Appearances can be deceiving , 2014, 2014 IEEE International Conference on Communications (ICC).
[14] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[15] Daniel Massey,et al. On Detection of Anomalous Routing Dynamics in BGP , 2004, NETWORKING.