{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T23:40:12Z","timestamp":1732923612608,"version":"3.30.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004586","name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","doi-asserted-by":"publisher","award":["150.134\/2010"],"id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s12243-024-01045-1","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T06:01:35Z","timestamp":1718690495000},"page":"901-912","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inferring the confidence level of BGP-based distributed intrusion detection systems alarms"],"prefix":"10.1007","volume":"79","author":[{"given":"Renato S.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Felipe M. F.","family":"de Assis","sequence":"additional","affiliation":[]},{"given":"Evandro L. C.","family":"Macedo","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds Felipe M.","family":"de Moraes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"1045_CR1","unstructured":"Jabloner P (2015) A brief guide to recreational pyromania. Accessed on https:\/\/computerhistory.org\/blog\/the-two-napkin-protocol\/"},{"key":"1045_CR2","doi-asserted-by":"crossref","unstructured":"Bates TJ, Chandra R, Rekhter Y, Katz D (2007) Multiprotocol extensions for BGP-4. RFC Editor","DOI":"10.17487\/rfc4760"},{"key":"1045_CR3","doi-asserted-by":"crossref","unstructured":"Loibl C, Hares S, Raszuk R, McPherson D, Bacher M (2020) RFC 8955: Dissemination of flow specification rules, no. 8955. RFC Editor, p 36","DOI":"10.17487\/RFC8955"},{"issue":"2","key":"1045_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/SURV.2011.041010.00041","volume":"13","author":"G Huston","year":"2010","unstructured":"Huston G, Rossi M, Armitage G (2010) Securing BGP\u2014a literature survey. IEEE Comm Surveys 13(2):199\u2013222","journal-title":"IEEE Comm Surveys"},{"issue":"3","key":"1045_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s12243-018-0672-1","volume":"74","author":"RS Silva","year":"2019","unstructured":"Silva RS, Moraes LF (2019) A cooperative approach with improved performance for a global intrusion detection systems for internet service providers. Annals of Telecom 74(3):167\u2013173","journal-title":"Annals of Telecom"},{"key":"1045_CR6","doi-asserted-by":"crossref","unstructured":"Bush R, Austein R (2017) The resource public key infrastructure (RPKI) to router protocol, Version 1. RFC Editor","DOI":"10.17487\/RFC8210"},{"key":"1045_CR7","doi-asserted-by":"crossref","unstructured":"McPherson D, Amante S, Osterweil E, Blunk L, Mitchell D (2015) Considerations for internet routing registries (IRRs) and routing policy configuration, no. 7682. RFC Editor, p 18","DOI":"10.17487\/RFC7682"},{"key":"1045_CR8","doi-asserted-by":"crossref","unstructured":"Chung T et al. (2019) RPKI is coming of age: a longitudinal study of RPKI deployment and invalid route origins. In: Proceedings of the internet measurement conference - ACM, pp 406\u2013419","DOI":"10.1145\/3355369.3355596"},{"issue":"8","key":"1045_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/3469287","volume":"64","author":"K Kirkpatrick","year":"2021","unstructured":"Kirkpatrick K (2021) Fixing the internet. Commun ACM 64(8):16\u201317","journal-title":"Commun ACM"},{"issue":"10","key":"1045_CR10","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C-F Tsai","year":"2009","unstructured":"Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994\u201312000","journal-title":"Expert Syst Appl"},{"key":"1045_CR11","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Claffy K (2002) Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2nd ACM SIGCOMM workshop on internet measurment. Marseille, France, IMW \u201902. ACM, 12, pp 273\u2013284","DOI":"10.1145\/637201.637244"},{"key":"1045_CR12","unstructured":"Chindipha S, Irwin B (2017) An analysis on the re-emergence of SQL Slammer worm using network telescope data"},{"key":"1045_CR13","doi-asserted-by":"publisher","unstructured":"Silva RS, Assis FMF, Macedo ELC, Moraes LFM (2023) Inferring the confidence level of BGP-based distributed intrusion detection systems alarms. In: 2023 7th Cyber security in networking conference (CSNet), pp 157\u2013162. https:\/\/doi.org\/10.1109\/CSNet59123.2023.10339702","DOI":"10.1109\/CSNet59123.2023.10339702"},{"key":"1045_CR14","unstructured":"REDERIO (2023) Rede-Rio\/FAPERJ. Available at https:\/\/rederio.br\/. Accessed Jan 2024"},{"key":"1045_CR15","doi-asserted-by":"publisher","unstructured":"Assis F, Coutinho M, Filho JS, Macedo E, Moraes L (2021) IPTraf: coleta e Detec\u00e7\u00e3o de Anomalias em Fluxos de Rede. In: Anais do XXVI Workshop de Ger\u00eancia e Opera\u00e7\u00e3o de Redes e Servi\u00e7os. SBC, Porto Alegre, RS, Brasil, pp 96\u2013109. https:\/\/doi.org\/10.5753\/wgrs.2021.17188. https:\/\/sol.sbc.org.br\/index.php\/wgrs\/article\/view\/17188","DOI":"10.5753\/wgrs.2021.17188"},{"key":"1045_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/997150.997152","volume":"34","author":"O Nordstr\u00f6m","year":"2004","unstructured":"Nordstr\u00f6m O, Dovrolis C (2004) Beware of BGP attacks. Comput Commun Rev 34:1\u20138","journal-title":"Comput Commun Rev"},{"issue":"1","key":"1045_CR17","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","volume":"19","author":"B Al-Musawi","year":"2017","unstructured":"Al-Musawi B, Branch P, Armitage G (2017) BGP anomaly detection techniques: a survey. IEEE Commun Surv Tutor 19(1):377\u2013396","journal-title":"IEEE Commun Surv Tutor"},{"key":"1045_CR18","doi-asserted-by":"crossref","unstructured":"Fonseca P, Mota ES, Bennesby R, Passito A (2019) BGP dataset generation and feature extraction for anomaly detection. In: 2019 IEEE ISCC, pp 1\u20136","DOI":"10.1109\/ISCC47284.2019.8969619"},{"key":"1045_CR19","doi-asserted-by":"crossref","unstructured":"Urbina Cazenave IO, K\u00f6\u015fl\u00fck E, Ganiz MC (2011) An anomaly detection framework for BGP. In: 2011 International symposium on innovations in intelligent systems and applications, pp 107\u2013111","DOI":"10.1109\/INISTA.2011.5946083"},{"key":"1045_CR20","doi-asserted-by":"crossref","unstructured":"McGlynn K, Acharya HB, Kwon M (2019) Detecting BGP route anomalies with deep learning. In: IEEE INFOCOM workshops, pp 1039\u20131040","DOI":"10.1109\/INFCOMW.2019.8845138"},{"key":"1045_CR21","doi-asserted-by":"crossref","unstructured":"Kruegel C, Mutz D, Robertson W, Valeur F (2003) Topology-based detection of anomalous BGP messages, vol 2820","DOI":"10.1007\/978-3-540-45248-5_2"},{"issue":"1","key":"1045_CR22","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TNET.2011.2157699","volume":"20","author":"CA Shue","year":"2012","unstructured":"Shue CA, Kalafut AJ, Gupta M (2012) Abnormally malicious autonomous systems and their internet connectivity. IEEE\/ACM Trans Networking 20(1):220\u2013230","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1045_CR23","doi-asserted-by":"publisher","unstructured":"Fung C, Boutaba R (2013) Intrusion detection networks: a key to collaborative security. 11(9780429099922):1\u2013237. https:\/\/doi.org\/10.1201\/b16048","DOI":"10.1201\/b16048"},{"issue":"4","key":"1045_CR24","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TKDE.2019.2946162","volume":"33","author":"Y Roh","year":"2019","unstructured":"Roh Y, Heo G, Whang SE (2019) A survey on data collection for machine learning: a big data-AI integration perspective. IEEE Trans Knowl Data Eng 33(4):1328\u20131347","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1045_CR25","doi-asserted-by":"crossref","unstructured":"Murphy SL (2006) BGP security vulnerabilities analysis. RFC Editor","DOI":"10.17487\/rfc4272"},{"key":"1045_CR26","doi-asserted-by":"crossref","unstructured":"Wang C, Li Z, Huang X, Zhang P (2016) Inferring the average as path length of the internet. In: 2016 IEEE IC-NIDC, pp 391\u2013395","DOI":"10.1109\/ICNIDC.2016.7974603"},{"issue":"3","key":"1045_CR27","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645\u2013678","journal-title":"IEEE Trans Neural Netw"},{"key":"1045_CR28","unstructured":"RIPE NCC (2021) RIS raw data. Acessed on http:\/\/data.ris.ripe.net\/rrc04\/. Accessed 13 Sep 2021, 16:17:11"},{"key":"1045_CR29","unstructured":"Rocha Fonseca PC (2020) A deep learning framework for BGP anomaly detection and classification. Phd thesis, Federal University of Amazonas, Manaus, Amazonas, Brazil"},{"key":"1045_CR30","volume":"1176","author":"X Dai","year":"2019","unstructured":"Dai X, Wang N, Wang W (2019) Application of machine learning in BGP anomaly detection. J Phys: Conf Ser 1176:032015","journal-title":"J Phys: Conf Ser"},{"key":"1045_CR31","doi-asserted-by":"crossref","unstructured":"Ding Q, Li Z, Batta P, Trajkovi\u0107 L (2016) Detecting BGP anomalies using machine learning techniques. In: 2016 IEEE SMC, pp 003352\u2013003355","DOI":"10.1109\/SMC.2016.7844751"},{"key":"1045_CR32","doi-asserted-by":"crossref","unstructured":"Paiva TBea (2021) BGP anomalies classification using features based on AS relationship graphs. In: 2021 IEEE LATINCOM. IEEE, pp 1\u20136","DOI":"10.1109\/LATINCOM53176.2021.9647824"},{"key":"1045_CR33","doi-asserted-by":"crossref","unstructured":"Peng S, Nie J, Shu X, Ruan Z, Wang L, Sheng Y, Xuan Q (2021) A multi-view framework for BGP anomaly detection via graph attention network. CoRR abs\/2112.12793","DOI":"10.2139\/ssrn.4000330"},{"key":"1045_CR34","doi-asserted-by":"publisher","unstructured":"Claise B (2004) Cisco systems NetFlow services export version 9. RFC Editor. https:\/\/doi.org\/10.17487\/RFC3954. https:\/\/www.rfc-editor.org\/info\/rfc3954","DOI":"10.17487\/RFC3954"},{"key":"1045_CR35","unstructured":"Sourceforge (2023) NfSen - Netflow sensor. Available at https:\/\/nfsen.sourceforge.net\/. Accessed Jan 2024"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01045-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-024-01045-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01045-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T23:04:24Z","timestamp":1732921464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-024-01045-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":35,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1045"],"URL":"https:\/\/doi.org\/10.1007\/s12243-024-01045-1","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"8 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}