{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:49:57Z","timestamp":1730328597367,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3661638.3661640","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T22:28:59Z","timestamp":1717280939000},"page":"6-9","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Classification of BGP Anomalies Using GRU with BGP Update Messages"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0003-0713-7587","authenticated-orcid":false,"given":"Ying","family":"Ji","sequence":"first","affiliation":[{"name":"China Mobile (Suzhou) Software Technology Co., Ltd, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-2610-3338","authenticated-orcid":false,"given":"Jingyu","family":"Huang","sequence":"additional","affiliation":[{"name":"China Mobile (Suzhou) Software Technology Co., Ltd, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-7989-2090","authenticated-orcid":false,"given":"Pengcheng","family":"Jin","sequence":"additional","affiliation":[{"name":"China Mobile (Suzhou) Software Technology Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"volume-title":"2006 Generic threats to routing protocols. Internet Eng. Task Force","author":"Barbir S.","key":"e_1_3_2_1_1_1","unstructured":"A. Barbir, S. Murphy, and Y. Yang. 2006 Generic threats to routing protocols. Internet Eng. Task Force, Fremont, CA, USA, RFC 4593 (Informational), Oct. [Online]. Available: http:\/\/www.ietf.org\/rfc\/rfc4593.txt."},{"volume-title":"Internet Eng. Task Force","author":"Rekhter T.","key":"e_1_3_2_1_2_1","unstructured":"Y. Rekhter, T. Li, and S. Hares. 2006 RFC 4271: A border gateway protocol 4 (BGP-4), Internet Eng. Task Force, Fremont, CA, USA, RFC 4271 (Proposed Standard), [Online]. Available: http:\/\/tools.ietf.org\/html\/rfc4271."},{"key":"e_1_3_2_1_3_1","first-page":"8","volume-title":"Proc. IEEE 34th Int. Perform. Comput. Commun. Conf. (IPCCC)","author":"Al-Musawi P.","unstructured":"B. Al-Musawi, P. Branch, and G. Armitage. 2015 Detecting BGP instability using recurrence quantification analysis (RQA), in Proc. IEEE 34th Int. Perform. Comput. Commun. Conf. (IPCCC), Nanjing, China, pp. 1\u20138."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109129"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565473.3569188"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE Latin-American Conference on Communications (LATINCOM).","author":"Thales P","year":"2021","unstructured":"Thales P, Siqueira Y, Daniel M, 2021 BGP Anomalies Classification using Features based on AS Relationship Graphs. C. IEEE Latin-American Conference on Communications (LATINCOM)."},{"key":"e_1_3_2_1_7_1","unstructured":"Chung J Gulcehre C Cho K 2014 Empirical evaluation of gated recurrent neural networks on sequence modeling. J. arXiv: Neural and Evolutionary Computing."},{"volume-title":"2016 Deep Learning","author":"Goodfellow Y.","key":"e_1_3_2_1_8_1","unstructured":"I. Goodfellow, Y. Bengio, and A. Courville. 2016 Deep Learning. MIT Press http:\/\/www.deeplearningbook.org."},{"volume-title":"2021 AS-level BGP community usage classification Proceedings of the 21st ACM Internet Measurement Conference. 577-592","author":"Krenc T","key":"e_1_3_2_1_9_1","unstructured":"Krenc T, Beverly R, Smaragdakis G. 2021 AS-level BGP community usage classification Proceedings of the 21st ACM Internet Measurement Conference. 577-592."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508023"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700668"},{"key":"e_1_3_2_1_12_1","first-page":"140","article-title":"Feature selection for classification of BGP anomalies using Bayesian models International Conference on Machine Learning and Cybernetics","volume":"1","author":"Al-Rousan N","year":"2012","unstructured":"Al-Rousan N, Haeri S, Trajkovi\u0107 L. 2012 Feature selection for classification of BGP anomalies using Bayesian models International Conference on Machine Learning and Cybernetics. IEEE, 1: 140-147.","journal-title":"IEEE"}],"event":{"name":"AISNS 2023: 2023 International Conference on Artificial Intelligence, Systems and Network Security","acronym":"AISNS 2023","location":"Mianyang China"},"container-title":["Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3661638.3661640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T05:37:12Z","timestamp":1717997832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661638.3661640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":12,"alternative-id":["10.1145\/3661638.3661640","10.1145\/3661638"],"URL":"https:\/\/doi.org\/10.1145\/3661638.3661640","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}