{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:27:38Z","timestamp":1715819258395},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17135-6","type":"journal-article","created":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T16:02:41Z","timestamp":1699545761000},"page":"50893-50919","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimal detection of border gateway protocol anomalies with extensive feature set"],"prefix":"10.1007","volume":"83","author":[{"given":"M.","family":"Sunita","sequence":"first","affiliation":[]},{"given":"Sujata V.","family":"Mallapur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,9]]},"reference":[{"issue":"13","key":"17135_CR1","doi-asserted-by":"publisher","first-page":"10205","DOI":"10.1007\/s00500-019-04534-x","volume":"24","author":"R Pradeepa","year":"2020","unstructured":"Pradeepa R, Pushpalatha M (2020) A hybrid OpenFlow with intelligent detection and prediction models for preventing BGP path hijack on SDN. Soft Computing 24(13):10205\u201310214","journal-title":"Soft Computing"},{"issue":"1","key":"17135_CR2","first-page":"5","volume":"2","author":"Lu Cheng","year":"2019","unstructured":"Cheng Lu, Edwards Phil, Kadam Girish (2019) Border Gateway Protocol Anomaly Detection Using Machine Learning Techniques\u201d. SMU Data Sci Rev 2(1):5","journal-title":"SMU Data Sci Rev"},{"key":"17135_CR3","doi-asserted-by":"publisher","unstructured":"McGlynn K, Acharya HB, Kwon M (2019) \"Detecting BGP Route Anomalies with Deep Learning,\" IEEE INFOCOM 2019 - IEEE Conference on Computer CommunicationsWorkshops(INFOCOMWKSHPS), pp.10391040, https:\/\/doi.org\/10.1109\/INFCOMW.2019.8845138","DOI":"10.1109\/INFCOMW.2019.8845138"},{"key":"17135_CR4","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s00500-019-03836-4","volume":"23","author":"N Elamathi","year":"2019","unstructured":"Elamathi N, Jayashri S, Pitchai R (2019) Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques. Soft Computing 23:2735\u20132746","journal-title":"Soft Computing"},{"key":"17135_CR5","doi-asserted-by":"publisher","first-page":"6092","DOI":"10.1109\/BigData47090.2019.9006201","volume":"2019","author":"M Karimi","year":"2019","unstructured":"Karimi M, Jahanshahi A, Mazloumi A, Sabzi HZ (2019) Border Gateway Protocol Anomaly Detection Using Neural Network. IEEE Int Conf Big Data (Big Data) 2019:6092\u20136094. https:\/\/doi.org\/10.1109\/BigData47090.2019.9006201","journal-title":"IEEE Int Conf Big Data (Big Data)"},{"key":"17135_CR6","volume-title":"Detection and mitigation of border gateway protocol spoofing using hybrid bat optimization algorithm and cryptography","author":"P Ganapthi","year":"2021","unstructured":"Ganapthi P (2021) Detection and mitigation of border gateway protocol spoofing using hybrid bat optimization algorithm and cryptography"},{"key":"17135_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24604-6_7","volume-title":"Analysis of BGP update surge during slammer worm attack","author":"Mohit Lad","year":"2003","unstructured":"Lad Mohit et al (2003) Analysis of BGP update surge during slammer worm attack. International Workshop on Distributed Computing Springer, Berlin, Heidelberg"},{"issue":"3","key":"17135_CR8","first-page":"032015","volume":"1176","author":"X Dai","year":"2019","unstructured":"Dai X, Wang N, Wang W (2019) Application of machine learning in BGP anomaly detection. J Phys: Conf Ser 1176(3):032015. IOP Publishing","journal-title":"J Phys: Conf Ser"},{"issue":"6","key":"17135_CR9","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/JSAC.2016.2558978","volume":"34","author":"J Schlamp","year":"2017","unstructured":"Schlamp J, Holz R, Jacquemart Q, Carle G, Biersack EW (June2017) HEAP: Reliable Assessment of BGP Hijacking Attacks. IEEE J Sel Areas Commun 34(6):1849\u20131861. https:\/\/doi.org\/10.1109\/JSAC.2016.2558978","journal-title":"IEEE J Sel Areas Commun"},{"issue":"6","key":"17135_CR10","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1109\/TNET.2018.2869798","volume":"26","author":"P Sermpezis","year":"2018","unstructured":"Sermpezis P et al (Dec.2018) ARTEMIS: Neutralizing BGP Hijacking Within a Minute. IEEE\/ACM Trans Networking 26(6):2471\u20132486. https:\/\/doi.org\/10.1109\/TNET.2018.2869798","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"1","key":"17135_CR11","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","volume":"19","author":"B Al-Musawi","year":"2017","unstructured":"Al-Musawi B, Branch P, Armitage G (2017) BGP Anomaly Detection Techniques: A Survey. IEEE Commun Surv Tutor 19(1):377\u2013396. https:\/\/doi.org\/10.1109\/COMST.2016.2622240","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"17135_CR12","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TDSC.2014.2345381","volume":"12","author":"Q Li","year":"2015","unstructured":"Li Q, Zhang X, Zhang X, Su P (2015) Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans Depend Secure Comput 12(3):298\u2013311. https:\/\/doi.org\/10.1109\/TDSC.2014.2345381","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"17135_CR13","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/TNET.2016.2567600","volume":"25","author":"JL Sobrinho","year":"2017","unstructured":"Sobrinho JL (Feb.2017) Correctness of Routing Vector Protocols as a Property of Network Cycles. IEEE\/ACM Trans Networking 25(1):150\u2013163. https:\/\/doi.org\/10.1109\/TNET.2016.2567600","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"5","key":"17135_CR14","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.1109\/TNET.2015.2503642","volume":"24","author":"Y Song","year":"2016","unstructured":"Song Y, Venkataramani A, Gao L (October 2016) Identifying and Addressing Reachability and Policy Attacks in \u201cSecure\u201d BGP. IEEE\/ACM Trans Network 24(5):2969\u20132982. https:\/\/doi.org\/10.1109\/TNET.2015.2503642","journal-title":"IEEE\/ACM Trans Network"},{"issue":"1","key":"17135_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.26599\/TST.2018.9010008","volume":"23","author":"S Zhang","year":"2018","unstructured":"Zhang S, Liu Y, Pei D, Liu B (2018) Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL). Tsinghua Sci Technol 23(1):22\u201334. https:\/\/doi.org\/10.26599\/TST.2018.9010008","journal-title":"Tsinghua Sci Technol"},{"issue":"11","key":"17135_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1364\/JOCN.7.0000B1","volume":"7","author":"A Giorgetti","year":"2015","unstructured":"Giorgetti A (2015) Proactive H-PCE architecture with BGP-LS update for multidomain elastic optical networks. IEEE\/OSA J Opt Commun Network 7(11):1\u20139. https:\/\/doi.org\/10.1364\/JOCN.7.0000B1","journal-title":"IEEE\/OSA J Opt Commun Network"},{"issue":"4","key":"17135_CR17","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1109\/TNET.2014.2323128","volume":"23","author":"E Gregori","year":"2015","unstructured":"Gregori E, Improta A, Lenzini L, Rossi L, Sani L (2015) A Novel Methodology to Address the Internet AS-Level Data Incompleteness. IEEE\/ACM Trans Network 23(4):1314\u20131327. https:\/\/doi.org\/10.1109\/TNET.2014.2323128","journal-title":"IEEE\/ACM Trans Network"},{"key":"17135_CR18","volume-title":"2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","author":"Z Li","year":"2020","unstructured":"Li Z, Rios ALG, Trajkovi\u0107 L (2020) Detecting internet worms, ransomware, and blackouts using recurrent neural networks. 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE"},{"issue":"4","key":"17135_CR19","doi-asserted-by":"publisher","first-page":"29492984","DOI":"10.1109\/COMST.2017.2722380","volume":"19","author":"RB da Silva","year":"2017","unstructured":"da Silva RB, Souza Mota E (2017) A Survey on Approaches to Reduce BGP Interdomain Routing Convergence Delay on the Internet. IEEE Commun Surv Tutor 19(4):29492984. https:\/\/doi.org\/10.1109\/COMST.2017.2722380","journal-title":"IEEE Commun Surv Tutor"},{"issue":"12","key":"17135_CR20","doi-asserted-by":"publisher","first-page":"B153","DOI":"10.1364\/JOCN.7.00B153","volume":"7","author":"OG de Dios","year":"2015","unstructured":"de Dios OG et al (Dec.2015) Multipartner demonstration of BGP-LS-enabled multidomain EON control and instantiation with H-PCE [Invited]. IEEE\/OSA J Opt Commun Netw 7(12):B153\u2013B162. https:\/\/doi.org\/10.1364\/JOCN.7.00B153","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"issue":"1","key":"17135_CR21","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/TNET.2014.2299795","volume":"23","author":"PB Godfrey","year":"2015","unstructured":"Godfrey PB, Caesar M, Haken I, Singer Y, Shenker S, Stoica I (2015) Stabilizing Route Selection in BGP. IEEE\/ACM Trans Network 23(1):282\u2013299. https:\/\/doi.org\/10.1109\/TNET.2014.2299795","journal-title":"IEEE\/ACM Trans Network"},{"issue":"6","key":"17135_CR22","doi-asserted-by":"publisher","first-page":"34623476","DOI":"10.1109\/TNET.2016.2527842","volume":"24","author":"JL Sobrinho","year":"2016","unstructured":"Sobrinho JL, Vanbever L, Le F, Sousa A, Rexford J (2016) Scaling the Internet Routing System Through Distributed Route Aggregation. IEEE\/ACM Trans Network 24(6):34623476. https:\/\/doi.org\/10.1109\/TNET.2016.2527842","journal-title":"IEEE\/ACM Trans Network"},{"issue":"1","key":"17135_CR23","doi-asserted-by":"publisher","first-page":"227240","DOI":"10.1109\/TNET.2013.2296330","volume":"23","author":"S Vissicchio","year":"2015","unstructured":"Vissicchio S, Cittadini L, Di Battista G (2015) On iBGP Routing Policies. IEEE\/ACM Trans Network 23(1):227240. https:\/\/doi.org\/10.1109\/TNET.2013.2296330","journal-title":"IEEE\/ACM Trans Network"},{"key":"17135_CR24","doi-asserted-by":"publisher","first-page":"132384132394","DOI":"10.1109\/ACCESS.2019.2941006","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li D, Zhao B (2019) A Prefix Hijacking Detection Model Based on the Immune Network Theory. IEEE Access 7:132384132394. https:\/\/doi.org\/10.1109\/ACCESS.2019.2941006","journal-title":"IEEE Access"},{"key":"17135_CR25","volume-title":"2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","author":"Z Li","year":"2021","unstructured":"Li Z, Rios ALG, Trajkovi\u0107 L (2021) Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms. 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE"},{"key":"17135_CR26","doi-asserted-by":"publisher","unstructured":"Cheng M Li Q, Lv J Liu W, Wang J \"Multi-Scale LSTM Model for BGP Anomaly Classification,\" IEEE Trans ServComput https:\/\/doi.org\/10.1109\/TSC.2018.2824809","DOI":"10.1109\/TSC.2018.2824809"},{"issue":"1","key":"17135_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2787419","volume":"26","author":"M Bienkowski","year":"2018","unstructured":"Bienkowski M, Sarrar N, Schmid S, Uhlig S (Feb.2018) Online Aggregation of the Forwarding Information Base: Accounting for Locality and Churn. IEEE\/ACM Transact Network 26(1):591604. https:\/\/doi.org\/10.1109\/TNET.2017.2787419","journal-title":"IEEE\/ACM Transact Network"},{"issue":"7","key":"17135_CR28","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/JSAC.2021.3078497","volume":"39","author":"Z Li","year":"2021","unstructured":"Li Z, Rios ALG, Trajkovi\u0107 L (2021) Machine learning for detecting anomalies and intrusions in communication networks. IEEE J Sel Areas Commun 39(7):2254\u20132264","journal-title":"IEEE J Sel Areas Commun"},{"key":"17135_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3274-5_4","volume-title":"Malware detection using higher order statistical parameters","author":"E Arul","year":"2016","unstructured":"Arul E, Manikandan V (2016) Malware detection using higher order statistical parameters. Annual convention of the computer society of India, Springer, Singapore"},{"key":"17135_CR30","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.knosys.2015.07.006","volume":"89","author":"Seyedali Mirjalili","year":"2015","unstructured":"Mirjalili Seyedali (2015) Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm\". Knowl-Based Syst 89:228\u2013249","journal-title":"Knowl-Based Syst"},{"key":"17135_CR31","volume-title":"2019 IEEE international symposium on circuits and systems (ISCAS)","author":"L Zhida","year":"2019","unstructured":"Zhida L et al (2019) Machine learning techniques for classifying network anomalies and intrusions. 2019 IEEE international symposium on circuits and systems (ISCAS). IEEE"},{"key":"17135_CR32","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s12065-019-00238-1","volume":"12","author":"F Chakraborty","year":"2019","unstructured":"Chakraborty F, Roy PK, Nandi D (2019) Oppositional elephant herding optimization with dynamic Cauchy mutation for multilevel image thresholding. Evolutionary Intelligence 12:445\u2013467","journal-title":"Evolutionary Intelligence"},{"key":"17135_CR33","unstructured":"\u201chttp:\/\/www.sfu.ca\/~ljilja\/cnl\/projects\/BGP_datasets\/index.html [Access Date: 2021\u201304\u201327]\u201d"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17135-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17135-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17135-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:33:22Z","timestamp":1715758402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17135-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":33,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17135"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17135-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,9]]},"assertion":[{"value":"2 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}