{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:29:47Z","timestamp":1759332587433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031578694"},{"type":"electronic","value":"9783031578700"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57870-0_20","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"222-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Realtime BGP Anomaly Detection Using Graph Centrality Features"],"prefix":"10.1007","author":[{"given":"Janel","family":"Huang","sequence":"first","affiliation":[]},{"given":"Murugaraj","family":"Odiathevar","sequence":"additional","affiliation":[]},{"given":"Alvin","family":"Valera","sequence":"additional","affiliation":[]},{"given":"Jyoti","family":"Sahni","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"Frean","sequence":"additional","affiliation":[]},{"given":"Winston K. G.","family":"Seah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Al-Musawi, B., Branch, P., Armitage, G.: Detecting BGP instability using recurrence quantification analysis (RQA). In: Proceedings of the IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China (2015)","DOI":"10.1109\/PCCC.2015.7410340"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","volume":"19","author":"B Al-Musawi","year":"2017","unstructured":"Al-Musawi, B., Branch, P., Armitage, G.: BGP anomaly detection techniques: a survey. IEEE Commun. Surv. Tutor. 19(1), 377\u2013396 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Al-Rousan, N.M., Trajkovi\u0107, L.: Machine learning models for classification of BGP anomalies. In: Proceedings of the IEEE 13th International Conference on High Performance Switching and Routing, Belgrade, Serbia, pp. 103\u2013108 (2012)","DOI":"10.1109\/HPSR.2012.6260835"},{"key":"20_CR4","unstructured":"Blazakis, D., Karir, M., Baras, J.S.: Analyzing BGP ASPATH behavior in the Internet. In: Proceedings of the 9th IEEE Global Internet Symposium (2006)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Yin, H., Chen, T., Nguyen, Q.V.H., Peng, W.C., Li, X.: Exploiting centrality information with graph convolutions for network representation learning. In: Proceedings of the IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, pp. 590\u2013601 (2019)","DOI":"10.1109\/ICDE.2019.00059"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: BGPlay: a system for visualizing the interdomain routing evolution. In: Liotta, G. (ed.) GD 2003. LNCS, vol. 2912, pp. 295\u2013306. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24595-7_27, http:\/\/bgplay.routeviews.org\/","DOI":"10.1007\/978-3-540-24595-7_27"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Fezeu, R.A.K., Zhang, Z.L.: Anomalous model-driven-telemetry network-stream BGP detection. In: Proceedings of the IEEE 28th International Conference on Network Protocols (ICNP), pp.\u00a01\u20136 (2020)","DOI":"10.1109\/ICNP49622.2020.9259411"},{"key":"20_CR8","unstructured":"Haeberlen, A., Avramopoulos, I., Rexford, J., Druschel, P.: NetReview: detecting when interdomain routing goes wrong. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, pp. 437\u2013452 (2009)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Hoarau, K., Tournoux, P.U., Razafindralambo, T.: BML: an efficient and versatile tool for BGP dataset collection. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), pp.\u00a01\u20136 (2021)","DOI":"10.1109\/ICCWorkshops50388.2021.9473737"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Hoarau, K., Tournoux, P.U., Razafindralambo, T.: Suitability of graph representation for BGP anomaly detection. In: Proceedings of the IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, pp. 305\u2013310 (2021)","DOI":"10.1109\/LCN52139.2021.9524941"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Hoarau, K., Tournoux, P.U., Razafindralambo, T.: BGNN: detection of BGP anomalies using graph neural networks. In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Rhodes Island, Greece (2022)","DOI":"10.1109\/ISCC55528.2022.9912989"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Latif, H., Pailliss\u00e9, J., Yang, J., Cabellos-Aparicio, A., Barlet-Ros, P.: Unveiling the potential of graph neural networks for BGP anomaly detection. In: Proceedings of the 1st International Workshop on Graph Neural Networking (GNNet), Rome, Italy, pp. 7\u201312 (2022)","DOI":"10.1145\/3565473.3569188"},{"issue":"7","key":"20_CR13","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/JSAC.2021.3078497","volume":"39","author":"Z Li","year":"2021","unstructured":"Li, Z., Rios, A.L.G., Trajkovi\u0107, L.: Machine learning for detecting anomalies and intrusions in communication networks. IEEE J. Sel. Areas Commun. 39(7), 2254\u20132264 (2021)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Lutu, A., Bagnulo, M., Cid-Sueiro, J., Maennel, O.: Separating wheat from chaff: winnowing unintended prefixes using machine learning. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, pp. 943\u2013951 (2014)","DOI":"10.1109\/INFOCOM.2014.6848023"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Odiathevar, M., Cameron, D., Seah, W.K.G., Frean, M., Valera, A.: Humans learning from machines: data science meets network management. In: Proceedings of the International Conference on COMmunication Systems NETworkS (COMSNETS), Bengaluru, India, pp. 421\u2013428 (2021)","DOI":"10.1109\/COMSNETS51098.2021.9352890"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"109129","DOI":"10.1016\/j.comnet.2022.109129","volume":"214","author":"S Peng","year":"2022","unstructured":"Peng, S., et al.: A multi-view framework for BGP anomaly detection via graph attention network. Comput. Netw. 214, 109129 (2022)","journal-title":"Comput. Netw."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Prakash, B., Valler, N., Andersen, D., Faloutsos, M., Faloutsos, C.: BGP-lens: patterns and anomalies in internet routing updates. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 1315\u20131324 (2009)","DOI":"10.1145\/1557019.1557160"},{"key":"20_CR18","unstructured":"Prince, M.: Aug 30th 2020: Analysis of century-link\/level(3) outage. https:\/\/blog.cloudflare.com\/analysis-of-todays-centurylink-level-3-outage\/"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Putina, A., et\u00a0al.: Unsupervised real-time detection of BGP anomalies leveraging high-rate and fine-grained telemetry data. In: Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.\u00a01\u20132 (2018)","DOI":"10.1109\/INFCOMW.2018.8406838"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Hares, S., Li, T.: A border gateway protocol 4 (BGP-4). RFC 4271 (2006). https:\/\/rfc-editor.org\/rfc\/rfc4271.txt","DOI":"10.17487\/rfc4271"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Shi, X., et\u00a0al.: Detecting prefix hijackings in the internet with Argus. In: Proceedings of the Internet Measurement Conference (IMC), Boston, MA, USA, pp. 15\u201328 (2012)","DOI":"10.1145\/2398776.2398779"},{"key":"20_CR22","unstructured":"Simon, T.L.: oof.\u00a0panix sidelined by incompetence... again. https:\/\/www.mail-archive.com\/nanog@merit.edu\/msg40003.html"},{"key":"20_CR23","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-981-19-9697-9_40","volume-title":"Emerging Networking Architecture and Technologies","author":"J Sun","year":"2022","unstructured":"Sun, J., et al.: An efficient BGP anomaly detection scheme with hybrid graph features. In: Quan, W. (ed.) ICENAT 2022. CCIS, vol. 1696, pp. 494\u2013506. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-9697-9_40"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-88623-5_40","volume-title":"Challenges for Next Generation Network Operations and Service Management","author":"M Tahara","year":"2008","unstructured":"Tahara, M., Tateishi, N., Oimatsu, T., Majima, S.: A method to detect prefix hijacking by using ping tests. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol. 5297, pp. 390\u2013398. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88623-5_40"},{"key":"20_CR25","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-1-4471-4594-3_3","volume-title":"Computer and Information Sciences III","author":"G Theodoridis","year":"2013","unstructured":"Theodoridis, G., Tsigkas, O., Tzovaras, D.: A novel unsupervised method for securing BGP against routing hijacks. In: Gelenbe, E., Lent, R. (eds.) Computer and Information Sciences III, pp. 21\u201329. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4594-3_3"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"de\u00a0Urbina\u00a0Cazenave, I.O., K\u00f6\u015fl\u00fck, E., Ganiz, M.C.: An anomaly detection framework for BGP. In: Proceedings of the International Symposium on Innovations in Intelligent Systems and Applications, Istanbul, Turkey, pp. 107\u2013111 (2011)","DOI":"10.1109\/INISTA.2011.5946083"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Structural Analysis in the Social Sciences. Cambridge University Press, Cambridge (1994)","DOI":"10.1017\/CBO9780511815478"},{"issue":"6","key":"20_CR28","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TNET.2010.2066284","volume":"18","author":"Z Zhang","year":"2010","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: iSPY: detecting IP prefix hijacking on my own. IEEE\/ACM Trans. Netw. 18(6), 1815\u20131828 (2010)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57870-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:10:33Z","timestamp":1712635833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57870-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578694","9783031578700"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57870-0_20","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}