{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:06:01Z","timestamp":1759017961900,"version":"3.44.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031962271"},{"type":"electronic","value":"9783031962288"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-96228-8_6","type":"book-chapter","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T05:38:05Z","timestamp":1750743485000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Border Gateway Protocol Hijacks and Anomalies Detection: A Graph-Based Deep Learning Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0606-9186","authenticated-orcid":false,"given":"Or","family":"Elroy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3176-8982","authenticated-orcid":false,"given":"Abraham","family":"Yosipof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,25]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","volume":"19","author":"B Al-Musawi","year":"2016","unstructured":"Al-Musawi, B., Branch, P., Armitage, G.: BGP anomaly detection techniques: a survey. IEEE Commun. Surv. Tutorials 19, 377\u2013396 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T., Hares, S.: A border gateway protocol 4 (BGP-4) (2006)","DOI":"10.17487\/rfc4271"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3211852.3211862","volume":"48","author":"P Sermpezis","year":"2018","unstructured":"Sermpezis, P., Kotronis, V., Dainotti, A., Dimitropoulos, X.: A survey among network operators on BGP prefix hijacking. ACM SIGCOMM Comput. Commun. Rev. 48, 64\u201369 (2018)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Lepinski, M., Sriram, K.: BGPSEC protocol specification (2017)","DOI":"10.17487\/RFC8205"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bush, R., Austein, R.: The resource public key infrastructure (RPKI) to router protocol (2013)","DOI":"10.17487\/rfc6810"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hlavacek, T., Herzberg, A., Schapira, M., Shulman, H.: Perfect is the enemy of good: Setting realistic goals for BGP security. In: Proceedings of the 17th ACM Workshop on Hot Topics in Networks, pp. 57\u201363 (2018)","DOI":"10.1145\/3286062.3286071"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1109\/TNET.2018.2869798","volume":"26","author":"P Sermpezis","year":"2018","unstructured":"Sermpezis, P., et al.: ARTEMIS: neutralizing BGP hijacking within a minute. IEEE\/ACM Trans. Netw. 26, 2471\u20132486 (2018)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"W\u00fcbbeling, M., Elsner, T., Meier, M.: Inter-AS routing anomalies: Improved detection and classification. 2014 6th International Conference on Cyber Conflict (CyCon 2014), pp. 223\u2013238 (2014)","DOI":"10.1109\/CYCON.2014.6916405"},{"key":"6_CR9","first-page":"3","volume":"1","author":"M Lad","year":"2006","unstructured":"Lad, M., Massey, D., Pei, D., Wu, Y., Zhang, B., Zhang, L.: PHAS: a prefix hijack alert system. USENIX Secur. Symp. 1, 3 (2006)","journal-title":"USENIX Secur. Symp."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Qiu, J., Gao, L., Ranjan, S., Nucci, A.: Detecting bogus BGP route information: Going beyond prefix hijacking. In: 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, pp. 381\u2013390 (2007)","DOI":"10.1109\/SECCOM.2007.4550358"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M.: Practical defenses against BGP prefix hijacking. In: Proceedings of the 2007 ACM CoNEXT Conference, pp. 1\u201312 (2007)","DOI":"10.1145\/1364654.1364658"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Hawkins, D.M.: Identification of outliers. Springer (1980)","DOI":"10.1007\/978-94-015-3994-4"},{"key":"6_CR13","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett, V., Lewis, T.: Outliers in statistical data. Wiley, New York (1994)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1021\/acs.jcim.5b00515","volume":"55","author":"OE Nahum","year":"2015","unstructured":"Nahum, O.E., Yosipof, A., Senderowitz, H.: A multi-objective genetic algorithm for outlier removal. J. Chem. Inf. Model. 55, 2507\u20132518 (2015)","journal-title":"J. Chem. Inf. Model."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1002\/jcc.23803","volume":"36","author":"A Yosipof","year":"2015","unstructured":"Yosipof, A., Senderowitz, H.: K-Nearest neighbors optimization-based outlier removal. J. Comput. Chem. 36, 493\u2013506 (2015)","journal-title":"J. Comput. Chem."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-019-0069-y","volume":"6","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Tong, H., Xu, J., Maciejewski, R.: Graph convolutional networks: a comprehensive review. Comput. Soc. Netw. 6, 1\u201323 (2019)","journal-title":"Comput. Soc. Netw."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 594\u2013602 (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Huang, X., Li, J., Hu, X.: Label informed attributed network embedding. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 731\u2013739 (2017)","DOI":"10.1145\/3018661.3018667"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Dani, H., Hu, X., Tang, J., Chang, Y., Liu, H.: Attributed network embedding for learning in a dynamic environment. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 387\u2013396 (2017)","DOI":"10.1145\/3132847.3132919"},{"key":"6_CR20","unstructured":"Dan Goodin: Some Twitter traffic briefly funneled through Russian ISP, thanks to BGP mishap. https:\/\/arstechnica.com\/information-technology\/2022\/03\/absence-of-malice-russian-isps-hijacking-of-twitter-ips-appears-to-be-a-goof\/. Accessed 7 Feb 2024"},{"key":"6_CR21","unstructured":"Doug Madory: BGP hijack of Twitter by Russian ISP. https:\/\/www.kentik.com\/analysis\/bgp-hijack-of-twitter-by-russian-isp\/. Accessed 4 Feb 2024"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Hoarau, K., Tournoux, P.U., Razafindralambo, T.: Suitability of graph representation for BGP anomaly detection. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 305\u2013310. IEEE (2021)","DOI":"10.1109\/LCN52139.2021.9524941"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"2000173","DOI":"10.1002\/minf.202000173","volume":"41","author":"A Yosipof","year":"2022","unstructured":"Yosipof, A., Khalemsky, A., Gelbard, R., Senderowitz, H.: Dynamic classification for materials-informatics: mining the solar cell space. Mol. Inf. 41, 2000173 (2022)","journal-title":"Mol. Inf."},{"key":"6_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.119723","volume":"148","author":"Y Song","year":"2019","unstructured":"Song, Y., Berger, R., Yosipof, A., Barnes, B.R.: Mining and investigating the factors influencing crowdfunding success. Technol. Forecast. Soc. Chang. 148, 119723 (2019)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"6_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.crsust.2024.100256","volume":"7","author":"O Elroy","year":"2024","unstructured":"Elroy, O., Komendantova, N., Yosipof, A.: Cyber-echoes of climate crisis: unraveling anthropogenic climate change narratives on social media. Current Res. Environ. Sustain. 7, 100256 (2024)","journal-title":"Current Res. Environ. Sustain."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Elroy, O., Yosipof, A.: Analysis of COVID-19 5G conspiracy theory tweets using SentenceBERT embedding. In: Artificial Neural Networks and Machine Learning \u2013 ICANN 2022, pp. 186\u2013196. Springer Nature Switzerland (2022)","DOI":"10.1007\/978-3-031-15931-2_16"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Elroy, O., Erokhin, D., Komendantova, N., Yosipof, A.: Mining the Discussion of Monkeypox Misinformation on Twitter Using RoBERTa. In: Artificial Intelligence Applications and Innovations, pp. 429\u2013438. Springer Nature Switzerland (2023)","DOI":"10.1007\/978-3-031-34111-3_36"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Elroy, O., Yosipof, A.: Semi-supervised learning classifier for misinformation related to earthquakes prediction on social media. In: Artificial Neural Networks and Machine Learning \u2013 ICANN 2023, pp. 256\u2013267. Springer Nature Switzerland (2023)","DOI":"10.1007\/978-3-031-44207-0_22"},{"key":"6_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2024.104635","volume":"110","author":"R Vicari","year":"2024","unstructured":"Vicari, R., Elroy, O., Komendantova, N., Yosipof, A.: Persistence of misinformation and hate speech over the years: the Manchester Arena bombing. Int. J. Disaster Risk Reduction 110, 104635 (2024)","journal-title":"Int. J. Disaster Risk Reduction"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"13391","DOI":"10.1038\/s41598-023-40399-9","volume":"13","author":"I Dallo","year":"2023","unstructured":"Dallo, I., Elroy, O., Fallou, L., Komendantova, N., Yosipof, A.: Dynamics and characteristics of misinformation related to earthquake predictions on Twitter. Sci. Rep. 13, 13391 (2023)","journal-title":"Sci. Rep."},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Lavinia, Y., Durairajan, R., Rejaie, R., Willinger, W.: Challenges in using ML for networking research: how to label if you must. In: Proceedings of the Workshop on Network Meets AI & ML, pp. 21\u201327. (2020)","DOI":"10.1145\/3405671.3405812"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Shapira, T., Shavitt, Y.: A deep learning approach for IP hijack detection based on ASN embedding. In: Proceedings of the Workshop on Network Meets AI & ML, pp. 35\u201341 (2020)","DOI":"10.1145\/3405671.3405814"},{"key":"6_CR33","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1002\/minf.201400174","volume":"34","author":"A Yosipof","year":"2015","unstructured":"Yosipof, A., Nahum, O.E., Anderson, A.Y., Barad, H.N., Zaban, A., Senderowitz, H.: Data mining and machine learning tools for combinatorial material science of all-oxide photovoltaic cells. Mol. Inform. 34, 367\u2013379 (2015)","journal-title":"Mol. Inform."},{"key":"6_CR34","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1186\/s13321-017-0224-0","volume":"9","author":"O Kaspi","year":"2017","unstructured":"Kaspi, O., Yosipof, A., Senderowitz, H.: RANdom SAmple Consensus (RANSAC) algorithm for material-informatics: application to photovoltaic solar cells. J Cheminform 9, 34 (2017)","journal-title":"J Cheminform"},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"2200186","DOI":"10.1002\/minf.202200186","volume":"42","author":"MS Bahia","year":"2023","unstructured":"Bahia, M.S., et al.: A comparison between 2D and 3D descriptors in QSAR modeling based on bio-active conformations. Mol. Inf. 42, 2200186 (2023)","journal-title":"Mol. Inf."},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Yosipof, A., Senderowitz, H.: Optimization algorithms for chemoinformatics and material-informatics. In: Ozgur, B. (ed.) Optimization Algorithms. IntechOpen, Rijeka (2016)","DOI":"10.5772\/62483"},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s12525-024-00712-4","volume":"34","author":"A Yosipof","year":"2024","unstructured":"Yosipof, A., Drori, N., Elroy, O., Pierrakis, Y.: Textual sentiment analysis and description characteristics in crowdfunding success: the case of cybersecurity and IoT industries. Electron. Mark. 34, 30 (2024)","journal-title":"Electron. Mark."},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Latif, H., Pailliss\u00e9, J., Yang, J., Cabellos-Aparicio, A., Barlet-Ros, P.: Unveiling the potential of graph neural networks for BGP anomaly detection. In: Proceedings of the 1st International Workshop on Graph Neural Networking, pp. 7\u201312. (2022)","DOI":"10.1145\/3565473.3569188"},{"key":"6_CR39","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1109\/TKDE.2018.2819980","volume":"30","author":"L Liao","year":"2018","unstructured":"Liao, L., He, X., Zhang, H., Chua, T.-S.: Attributed social network embedding. IEEE Trans. Knowl. Data Eng. 30, 2257\u20132270 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR40","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1109\/TCBB.2021.3069441","volume":"19","author":"D Li","year":"2021","unstructured":"Li, D., Zhang, S., Ma, X.: Dynamic module detection in temporal attributed networks of cancers. IEEE\/ACM Trans. Comput. Biol. Bioinf. 19, 2219\u20132230 (2021)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"6_CR41","unstructured":"RIPE: RIPEstat Data API. https:\/\/stat.ripe.net\/docs\/02.data-api\/. Accessed 1 Feb 2024"},{"key":"6_CR42","unstructured":"CAIDA: The CAIDA AS Organizations Dataset. https:\/\/www.caida.org\/catalog\/datasets\/as-organizations. Accessed 1 Feb 2024"},{"key":"6_CR43","unstructured":"Liu, K., et al.: PyGOD: A python library for graph outlier detection. arXiv preprint arXiv:2204.12095 (2022)"},{"key":"6_CR44","unstructured":"Ramesh, R., et al.: Network responses to Russia\u2019s invasion of Ukraine in 2022: a cautionary tale for internet freedom. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 2581\u20132598 (2023)"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96228-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T11:07:17Z","timestamp":1758971237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96228-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031962271","9783031962288"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96228-8_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}