{"id":"https://openalex.org/W4386214508","doi":"https://doi.org/10.1109/iscc58397.2023.10218104","title":"Metis: Detecting Fake AS-PATHs Based on Link Prediction","display_name":"Metis: Detecting Fake AS-PATHs Based on Link Prediction","publication_year":2023,"publication_date":"2023-07-09","ids":{"openalex":"https://openalex.org/W4386214508","doi":"https://doi.org/10.1109/iscc58397.2023.10218104"},"language":"en","primary_location":{"id":"doi:10.1109/iscc58397.2023.10218104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120839653","display_name":"Chengwan Zhang","orcid":"https://orcid.org/0000-0001-7405-9644"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengwan Zhang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027623536","display_name":"Congcong Miao","orcid":"https://orcid.org/0000-0003-3265-049X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Congcong Miao","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102860856","display_name":"Changqing An","orcid":"https://orcid.org/0000-0002-2299-0135"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqing An","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112988741","display_name":"Anlun Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anlun Hong","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100387221","display_name":"Ning Wang","orcid":"https://orcid.org/0000-0003-3053-0515"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ning Wang","raw_affiliation_strings":["Institute for Communication Systems, University of Surrey,UK","Institute for Communication Systems, University of Surrey, UK"],"affiliations":[{"raw_affiliation_string":"Institute for Communication Systems, University of Surrey,UK","institution_ids":["https://openalex.org/I28290843"]},{"raw_affiliation_string":"Institute for Communication Systems, University of Surrey, UK","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhiquan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100660344","display_name":"Jilong Wang","orcid":"https://orcid.org/0000-0002-4493-5145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilong Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University,China","Institute for Network Sciences and Cyberspace, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5120839653"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.1976,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50506294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"656","last_page":"662"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8382113575935364},{"id":"https://openalex.org/keywords/metis","display_name":"Metis","score":0.815611720085144},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5617598295211792},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5503215789794922},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5141132473945618},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4991440773010254},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.47724008560180664},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.4769921898841858},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.47502025961875916},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4538414180278778},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4095749855041504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4040347635746002},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23653864860534668},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.13692700862884521},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12208962440490723}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8382113575935364},{"id":"https://openalex.org/C2780705272","wikidata":"https://www.wikidata.org/wiki/Q19903554","display_name":"Metis","level":2,"score":0.815611720085144},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5617598295211792},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5503215789794922},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5141132473945618},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4991440773010254},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.47724008560180664},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.4769921898841858},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.47502025961875916},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4538414180278778},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4095749855041504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4040347635746002},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23653864860534668},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.13692700862884521},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12208962440490723},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iscc58397.2023.10218104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/8d442a62-11be-458d-82c5-e76b57c8dd8d","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/8d442a62-11be-458d-82c5-e76b57c8dd8d","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Zhang, C, Miao, C, An, C, Hong, A, Wang, N, Wang, Z & Wang, J 2023, Metis : Detecting Fake AS-PATHs Based on Link Prediction. in ISCC 2023 - 28th IEEE Symposium on Computers and Communications : Computers and Communications for the Benefits of Humanity. IEEE Symposium on Computers and Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 656-662. https://doi.org/10.1109/ISCC58397.2023.10218104","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/8d442a62-11be-458d-82c5-e76b57c8dd8d","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/8d442a62-11be-458d-82c5-e76b57c8dd8d","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Zhang, C, Miao, C, An, C, Hong, A, Wang, N, Wang, Z & Wang, J 2023, Metis : Detecting Fake AS-PATHs Based on Link Prediction. in ISCC 2023 - 28th IEEE Symposium on Computers and Communications : Computers and Communications for the Benefits of Humanity. IEEE Symposium on Computers and Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 656-662. https://doi.org/10.1109/ISCC58397.2023.10218104","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1937741266","https://openalex.org/W1979104937","https://openalex.org/W2069222612","https://openalex.org/W2149482504","https://openalex.org/W2151972741","https://openalex.org/W2162877415","https://openalex.org/W2556714538","https://openalex.org/W2788919350","https://openalex.org/W2895447227","https://openalex.org/W2963283811","https://openalex.org/W2963757395","https://openalex.org/W3007409674","https://openalex.org/W3162417966","https://openalex.org/W4282922476","https://openalex.org/W4283213705","https://openalex.org/W4299301436","https://openalex.org/W6638037704","https://openalex.org/W6748856961"],"related_works":["https://openalex.org/W2946613364","https://openalex.org/W2807886874","https://openalex.org/W2802231781","https://openalex.org/W228884174","https://openalex.org/W2617272570","https://openalex.org/W1697346018","https://openalex.org/W2113326855","https://openalex.org/W2599308209","https://openalex.org/W4393527151","https://openalex.org/W611259847"],"abstract_inverted_index":{"BGP":[0],"route":[1],"hijacking":[2,14],"is":[3,84],"a":[4,28,59,71,92,97],"critical":[5],"threat":[6],"to":[7,62,77,95,142],"the":[8,18,21,32,101,108,113],"Internet.":[9],"Existing":[10],"works":[11],"on":[12,100],"path":[13],"detection":[15],"firstly":[16],"monitor":[17],"routes":[19],"of":[20,107,128],"whole":[22],"network":[23,94],"and":[24,48,110,126],"then":[25],"directly":[26],"trigger":[27],"suspicious":[29,80],"alarm":[30],"if":[31,82],"link":[33,109],"has":[34],"not":[35],"been":[36],"seen":[37],"before.":[38],"However,":[39],"these":[40],"naive":[41],"approaches":[42],"will":[43],"cause":[44],"false":[45],"positive":[46],"identification":[47],"introduce":[49],"unnecessary":[50],"verification":[51],"overhead.":[52,149],"In":[53],"this":[54],"work,":[55],"we":[56,89],"propose":[57,90],"Metis,":[58],"matching-and-prediction":[60],"system":[61],"filter":[63],"out":[64,79],"normal":[65],"unseen":[66,86],"links.":[67],"We":[68],"first":[69],"use":[70],"matching":[72],"method":[73],"with":[74],"three":[75],"rules":[76],"find":[78],"links":[81],"there":[83],"an":[85],"AS.":[87],"Otherwise,":[88],"using":[91],"neural":[93],"make":[96],"prediction":[98],"based":[99],"AS":[102],"information":[103],"at":[104],"each":[105],"end":[106],"further":[111],"quantify":[112],"suspicion":[114],"level.":[115],"Our":[116],"large-scale":[117],"simulation":[118],"results":[119],"show":[120,139],"that":[121,140],"Metis":[122,145],"can":[123,146],"achieve":[124],"precision":[125],"recall":[127],"over":[129],"80%":[130,148],"for":[131],"detecting":[132],"fake":[133],"AS-PATHs.":[134],"Moreover,":[135],"our":[136],"deployment":[137],"experiences":[138],"compared":[141],"state-of-the-art":[143],"system,":[144],"save":[147]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
