{"id":"https://openalex.org/W7126016471","doi":"https://doi.org/10.1109/comcomap68359.2025.11353180","title":"Detection of BGP Routing Leaks Using Historical Baseline Profiling","display_name":"Detection of BGP Routing Leaks Using Historical Baseline Profiling","publication_year":2025,"publication_date":"2025-12-14","ids":{"openalex":"https://openalex.org/W7126016471","doi":"https://doi.org/10.1109/comcomap68359.2025.11353180"},"language":null,"primary_location":{"id":"doi:10.1109/comcomap68359.2025.11353180","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap68359.2025.11353180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079559769","display_name":"Rifqy Hakimi","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Rifqy Hakimi","raw_affiliation_strings":["University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023354611","display_name":"Martin Reed","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin J. Reed","raw_affiliation_strings":["University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079559769"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63881588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"165","last_page":"170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.49869999289512634,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.49869999289512634,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.11159999668598175,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.09619999676942825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6891999840736389},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.6399999856948853},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6068000197410583},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.5982999801635742},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.48590001463890076},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.4578000009059906},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.39500001072883606},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.38420000672340393},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.3815000057220459}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7631999850273132},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6891999840736389},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.6399999856948853},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6068000197410583},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.5982999801635742},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5688999891281128},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.48590001463890076},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.4578000009059906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4235000014305115},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.38420000672340393},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36970001459121704},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.35199999809265137},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.35199999809265137},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3400999903678894},{"id":"https://openalex.org/C99821215","wikidata":"https://www.wikidata.org/wiki/Q1136583","display_name":"Swap (finance)","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.30000001192092896},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C147494362","wikidata":"https://www.wikidata.org/wiki/Q2078905","display_name":"Troubleshooting","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.2581999897956848},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.2549999952316284},{"id":"https://openalex.org/C52837422","wikidata":"https://www.wikidata.org/wiki/Q431028","display_name":"Interior gateway protocol","level":5,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comcomap68359.2025.11353180","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap68359.2025.11353180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2119665367","https://openalex.org/W2122646361","https://openalex.org/W2127904496","https://openalex.org/W2157757444","https://openalex.org/W2461239771","https://openalex.org/W2567172578","https://openalex.org/W2895447227","https://openalex.org/W3162417966","https://openalex.org/W4226225580","https://openalex.org/W4281655298","https://openalex.org/W4391897208","https://openalex.org/W4403103380","https://openalex.org/W4404645275","https://openalex.org/W4409156471"],"related_works":[],"abstract_inverted_index":{"Border":[0],"Gateway":[1],"Protocol":[2],"(BGP)":[3],"prefix":[4],"hijacking":[5],"and":[6,32,87,114,170],"route":[7],"leaks":[8],"(RFC":[9],"7908":[10],"Type":[11,58,124],"5":[12,59,125],"incidents)":[13],"pose":[14],"critical":[15],"threats":[16],"to":[17,44,72,132,148],"inter-domain":[18],"routing":[19],"stability.":[20],"Despite":[21],"expanding":[22],"RPKI":[23],"deployment":[24,165],"reaching":[25],"56%":[26],"IPv4":[27],"coverage":[28],"by":[29],"July":[30],"2025":[31],"minimal":[33],"BGPsec/Autonomous":[34],"System":[35],"Provider":[36],"Authorization":[37],"(ASPA)":[38],"adoption,":[39],"such":[40],"large-scale":[41],"events":[42],"continue":[43],"bypass":[45],"existing":[46],"cryptographic":[47],"protections.We":[48],"present":[49],"a":[50],"dual-signal":[51],"detection":[52,143],"framework":[53],"addressing":[54],"complementary":[55],"manifestations":[56],"of":[57,153],"incidents.":[60],"Our":[61],"approach":[62,158],"builds":[63],"stable":[64],"baselines":[65],"from":[66,130],"Routing":[67],"Information":[68],"Base":[69],"(RIB)":[70],"snapshots":[71],"generate":[73],"Baseline-Deviation":[74],"(BD)":[75],"signals":[76,90,100],"that":[77,91,141],"identify":[78,92],"incidents":[79,93,126],"through":[80,94],"origin":[81],"AS":[82],"deviations":[83],"on":[84,120,136],"known":[85],"prefixes,":[86],"New-Prefix":[88],"(NP)":[89],"previously":[95],"unseen":[96,138],"address":[97],"space.":[98],"These":[99],"are":[101],"aggregated":[102],"across":[103],"multiple":[104],"vantage":[105],"points":[106],"using":[107],"MAX":[108],"aggregation,":[109],"scored":[110],"with":[111],"Z-score":[112],"thresholds,":[113],"fused":[115],"via":[116],"logical":[117],"disjunction.Cross-incident":[118],"validation":[119],"six":[121],"diverse":[122],"real-world":[123],"achieved":[127],"F1-scores":[128],"ranging":[129],"0.48":[131],"0.88":[133],"(mean":[134],"0.69)":[135],"entirely":[137],"incidents,":[139],"demonstrating":[140],"effective":[142],"requires":[144,159],"both":[145],"signal":[146],"types":[147],"capture":[149],"the":[150],"full":[151],"spectrum":[152],"manifestation":[154],"patterns.":[155],"The":[156],"lightweight":[157],"no":[160],"machine":[161],"learning,":[162],"enabling":[163],"rapid":[164],"in":[166],"resource-constrained":[167],"NOC":[168],"environments":[169],"improving":[171],"interpretability":[172],"for":[173],"incident":[174],"response.":[175]},"counts_by_year":[],"updated_date":"2026-02-01T03:34:12.195049","created_date":"2026-01-30T00:00:00"}
