{"id":"https://openalex.org/W2475479115","doi":"https://doi.org/10.1109/hpsr.2016.7525636","title":"IP prefix hijack detection using BGP connectivity monitoring","display_name":"IP prefix hijack detection using BGP connectivity monitoring","publication_year":2016,"publication_date":"2016-06-01","ids":{"openalex":"https://openalex.org/W2475479115","doi":"https://doi.org/10.1109/hpsr.2016.7525636","mag":"2475479115"},"language":"en","primary_location":{"id":"doi:10.1109/hpsr.2016.7525636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpsr.2016.7525636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070561745","display_name":"Hussain Alshamrani","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Hussain Alshamrani","raw_affiliation_strings":["Centre for security, Communications and Network Research, (CSCAN) Plymouth University, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Centre for security, Communications and Network Research, (CSCAN) Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["Centre for security, Communications and Network Research, (CSCAN) Plymouth University, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Centre for security, Communications and Network Research, (CSCAN) Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070561745"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":1.4477,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83928259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8487100005149841},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.6042078137397766},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.6034586429595947},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5725675821304321},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4543028771877289},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4473711848258972},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4345965087413788},{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.4272571802139282},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38460850715637207},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2664783000946045},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.23371079564094543},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.181627094745636},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.1787186563014984},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.12668141722679138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8487100005149841},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.6042078137397766},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.6034586429595947},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5725675821304321},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4543028771877289},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4473711848258972},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4345965087413788},{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.4272571802139282},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38460850715637207},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2664783000946045},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.23371079564094543},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.181627094745636},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.1787186563014984},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.12668141722679138},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/hpsr.2016.7525636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpsr.2016.7525636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/21527","is_oa":false,"landing_page_url":"https://pearl.plymouth.ac.uk/handle/10026.1/21527","pdf_url":null,"source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1490321836","https://openalex.org/W1509056624","https://openalex.org/W1528741018","https://openalex.org/W1967241827","https://openalex.org/W1973489837","https://openalex.org/W2003590000","https://openalex.org/W2043409701","https://openalex.org/W2098712026","https://openalex.org/W2106525823","https://openalex.org/W2124554851","https://openalex.org/W2133396782","https://openalex.org/W2140695747","https://openalex.org/W2142827986","https://openalex.org/W2168505680","https://openalex.org/W2998768810","https://openalex.org/W3099035940","https://openalex.org/W3137303952","https://openalex.org/W4285719527","https://openalex.org/W4380197260"],"related_works":["https://openalex.org/W2410714809","https://openalex.org/W2129457258","https://openalex.org/W4394984040","https://openalex.org/W38301456","https://openalex.org/W2056564612","https://openalex.org/W2056847431","https://openalex.org/W4319706337","https://openalex.org/W2416496489","https://openalex.org/W2769420692","https://openalex.org/W2467582704"],"abstract_inverted_index":{"In":[0,27],"spite":[1],"of":[2,20,32,56,80,133,161,171,175,195],"significant":[3],"on-going":[4],"research,":[5],"the":[6,18,54,78,81,86,103,121,131,140,150,158,172,187,193,205,217,224],"Border":[7],"gateway":[8],"protocol":[9],"(BGP)":[10],"still":[11],"encompasses":[12],"conceptual":[13],"vulnerability":[14],"issues":[15],"regarding":[16],"impersonating":[17],"ownership":[19],"IP":[21,66,109],"prefixes":[22],"for":[23,149],"ASes":[24],"(Autonomous":[25],"Systems).":[26],"this":[28,201],"context,":[29],"a":[30,48,63,137,169],"number":[31],"research":[33],"studies":[34,85],"focused":[35],"on":[36,52,113],"securing":[37],"BGP":[38],"through":[39],"historical-based":[40],"and":[41,84,88,92,125,190,214],"statistical-based":[42],"behavioural":[43,173],"models.":[44],"This":[45],"paper":[46,71,202],"suggests":[47],"novel":[49],"method":[50,83,144,219],"based":[51],"tracking":[53],"connectivity":[55,176],"suspicious":[57,163],"ASes,":[58],"which":[59],"are":[60,97,145,155,167],"received":[61],"from":[62,142,157],"program":[64],"tracing":[65],"prefix":[67,110],"hijacking":[68],"signature.":[69],"The":[70,152,165,179],"uses":[72],"Full":[73],"Cross-Validation":[74],"test":[75],"to":[76,106,119,129,203,222],"investigate":[77],"accuracy":[79],"invented":[82],"similarity":[87],"differences":[89],"between":[90],"malicious":[91],"benign":[93],"observations":[94],"before":[95],"they":[96],"classified.":[98],"Classification":[99],"might":[100],"not":[101],"be":[102,198],"appropriate":[104],"technique":[105],"deal":[107],"with":[108,192,226],"hijack":[111],"detection":[112,206,218],"its":[114],"own;":[115],"therefore":[116],"we":[117],"propose":[118],"combine":[120],"two":[122],"methods":[123],"(signature":[124],"classification-based)":[126],"in":[127,186,200],"order":[128],"cover":[130],"limitations":[132],"both":[134],"techniques.":[135],"From":[136],"processing":[138],"perspective,":[139],"outputs":[141],"signature-based":[143],"used":[146,185,199],"as":[147],"inputs":[148],"classification-based.":[151],"main":[153],"features":[154,166],"extracted":[156],"ASpath":[159],"attributes":[160],"potentially":[162],"ASes.":[164],"considered":[168],"mixture":[170],"characteristics":[174,194],"among":[177],"routers.":[178],"best":[180],"five":[181],"supervised":[182],"classifiers":[183],"were":[184],"previous":[188],"researches":[189],"go":[191],"dataset":[196],"will":[197],"evaluate":[204],"method.":[207],"Under":[208],"different":[209],"learning":[210],"algorithms,":[211],"Random":[212],"Forest":[213],"J48":[215],"classifiers,":[216],"is":[220],"able":[221],"detect":[223],"hijacks":[225],"81%":[227],"accuracy.":[228]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
