{"id":"https://openalex.org/W2509720438","doi":"https://doi.org/10.5220/0005934200570063","title":"Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases","display_name":"Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2509720438","doi":"https://doi.org/10.5220/0005934200570063","mag":"2509720438"},"language":"en","primary_location":{"id":"doi:10.5220/0005934200570063","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005934200570063","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005934200570063","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070561745","display_name":"Hussain Alshamrani","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Hussain Alshamrani","raw_affiliation_strings":["Plymouth University , United Kingdom"],"affiliations":[{"raw_affiliation_string":"Plymouth University , United Kingdom","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["Plymouth University , United Kingdom"],"affiliations":[{"raw_affiliation_string":"Plymouth University , United Kingdom","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070561745"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04867233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9466000199317932,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.8207628726959229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8114460110664368},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6845295429229736},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6666483283042908},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5560509562492371},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5215275883674622},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.49036645889282227},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4840044677257538},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.442921906709671},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38784295320510864},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3259241580963135},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29248419404029846},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23289695382118225},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17747235298156738},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.10994470119476318},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.10069891810417175}],"concepts":[{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.8207628726959229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8114460110664368},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6845295429229736},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6666483283042908},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5560509562492371},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5215275883674622},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.49036645889282227},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4840044677257538},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.442921906709671},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38784295320510864},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3259241580963135},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29248419404029846},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23289695382118225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17747235298156738},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.10994470119476318},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.10069891810417175},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005934200570063","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005934200570063","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005934200570063","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005934200570063","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3172840274","https://openalex.org/W50122730","https://openalex.org/W2245533262","https://openalex.org/W2410714809","https://openalex.org/W2056564612","https://openalex.org/W2056847431","https://openalex.org/W2416496489","https://openalex.org/W2769420692","https://openalex.org/W2467582704","https://openalex.org/W3185630782"],"abstract_inverted_index":{"In":[0,27],"spite":[1],"of":[2,20,32,214],"significant":[3],"on-going":[4],"research,":[5],"the":[6,18,48,69,93,100,105,124,138,141,148,151,175,187,192,199,203,207,212,216,222],"Border":[7],"Gateway":[8],"Protocol":[9],"(BGP)":[10],"still":[11],"encompasses":[12],"conceptual":[13],"vulnerability":[14],"issues":[15],"regarding":[16],"impersonating":[17],"ownership":[19],"IP":[21,50,127,169,217],"prefixes":[22],"for":[23],"ASes":[24],"(Autonomous":[25,76],"Systems).":[26],"this":[28,85],"context,":[29],"a":[30,89,159],"number":[31],"research":[33],"studies":[34],"focused":[35],"on":[36],"securing":[37],"BGP":[38,149],"through":[39],"historical-based":[40],"and":[41,110,117,155,198],"statistical-based":[42],"behavioural":[43],"models.":[44],"This":[45],"paper":[46],"improves":[47],"earlier":[49],"prefix":[51,170,218],"hijack":[52,171,196,201],"detection":[53,96,172],"method":[54,97,103],"presented":[55],"in":[56,134,147,174,181],"(Alshamrani":[57,182],"et":[58,183],"al.":[59,184],"2015)":[60],"by":[61],"identifying":[62],"false":[63,167,223],"positives":[64],"showing":[65],"up":[66],"due":[67],"to":[68,79,92,98,136,157],"organisations":[70],"that":[71,206],"may":[72],"use":[73],"multiple":[74],"ASNs":[75,112],"System":[77],"Numbers)":[78],"advertise":[80],"their":[81],"routes.":[82],"To":[83],"solve":[84],"issue,":[86],"we":[87],"link":[88],"Verification":[90],"Database":[91],"previously":[94],"proposed":[95],"improve":[99],"accuracy.":[101],"The":[102,164],"extracts":[104],"organisation":[106,142],"names":[107],"(unique":[108],"code)":[109],"associated":[111],"from":[113],"different":[114],"ASN":[115],"delegators":[116],"RIRs":[118],"(Regional":[119],"Internet":[120],"Registries),":[121],"more":[122],"specifically":[123,220],"RIPE":[125],"(Reseaux":[126],"Europeans)":[128],"dump":[129],"database":[130,161],"(John":[131],"Stamatakis":[132],"2014)":[133],"order":[135],"evaluate":[137],"method.":[139],"Since":[140],"name":[143],"is":[144,189],"not":[145],"available":[146],"updates,":[150],"data":[152],"are":[153],"extracted":[154],"processed":[156],"produce":[158],"structured":[160],"(Verification":[162],"DB).":[163],"algorithm":[165,188,209],"excludes":[166],"positive":[168],"events":[173],"SFL":[176],"(Suspicious":[177],"Findings":[178],"List)":[179],"introduced":[180],"2015).":[185],"Finally,":[186],"validated":[190],"using":[191],"2008":[193],"YouTube":[194],"Pakistan":[195],"event":[197],"Con-Edison":[200],"(2006);":[202],"analysis":[204],"demonstrates":[205],"improved":[208],"qualitatively":[210],"increases":[211],"accuracy":[213],"detecting":[215],"hijacks,":[219],"reducing":[221],"positives.":[224]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
