{"id":"https://openalex.org/W3004075653","doi":"https://doi.org/10.1109/iscc47284.2019.8969619","title":"BGP Dataset Generation and Feature Extraction for Anomaly Detection","display_name":"BGP Dataset Generation and Feature Extraction for Anomaly Detection","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W3004075653","doi":"https://doi.org/10.1109/iscc47284.2019.8969619","mag":"3004075653"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc47284.2019.8969619","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016130373","display_name":"Paulo Fonseca","orcid":"https://orcid.org/0000-0003-4641-6098"},"institutions":[{"id":"https://openalex.org/I62885914","display_name":"Universidade Federal do Amazonas","ror":"https://ror.org/02263ky35","country_code":"BR","type":"education","lineage":["https://openalex.org/I62885914"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Paulo Fonseca","raw_affiliation_strings":["Institute of Computing, Federal University of Amazonas, Amazonas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing, Federal University of Amazonas, Amazonas, Brazil","institution_ids":["https://openalex.org/I62885914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103194716","display_name":"Edjard Mota","orcid":"https://orcid.org/0000-0002-1313-5276"},"institutions":[{"id":"https://openalex.org/I62885914","display_name":"Universidade Federal do Amazonas","ror":"https://ror.org/02263ky35","country_code":"BR","type":"education","lineage":["https://openalex.org/I62885914"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Edjard S. Mota","raw_affiliation_strings":["Institute of Computing, Federal University of Amazonas, Amazonas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing, Federal University of Amazonas, Amazonas, Brazil","institution_ids":["https://openalex.org/I62885914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041397604","display_name":"Ricardo Bennesby","orcid":null},"institutions":[{"id":"https://openalex.org/I62885914","display_name":"Universidade Federal do Amazonas","ror":"https://ror.org/02263ky35","country_code":"BR","type":"education","lineage":["https://openalex.org/I62885914"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Ricardo Bennesby","raw_affiliation_strings":["Institute of Computing, Federal University of Amazonas, Amazonas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing, Federal University of Amazonas, Amazonas, Brazil","institution_ids":["https://openalex.org/I62885914"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086318392","display_name":"Alexandre Passito","orcid":null},"institutions":[{"id":"https://openalex.org/I62885914","display_name":"Universidade Federal do Amazonas","ror":"https://ror.org/02263ky35","country_code":"BR","type":"education","lineage":["https://openalex.org/I62885914"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Alexandre Passito","raw_affiliation_strings":["Institute of Computing, Federal University of Amazonas, Amazonas, Brazil"],"affiliations":[{"raw_affiliation_string":"Institute of Computing, Federal University of Amazonas, Amazonas, Brazil","institution_ids":["https://openalex.org/I62885914"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.176,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.733418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":92},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.85941195},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.60299134},{"id":"https://openalex.org/keywords/default-free-zone","display_name":"Default-free zone","score":0.4568227},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.454964},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.44953117}],"concepts":[{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.85941195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8097229},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.76532185},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.60299134},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.55938315},{"id":"https://openalex.org/C101396714","wikidata":"https://www.wikidata.org/wiki/Q3021187","display_name":"Default-free zone","level":5,"score":0.4568227},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.454964},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.44953117},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.4362735},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.41313976},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3790843},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33528793},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.30092615},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17966825},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.16855535},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.090850234},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc47284.2019.8969619","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.42,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1556516382","https://openalex.org/W2093511521","https://openalex.org/W2119665367","https://openalex.org/W2127574017","https://openalex.org/W2131557567","https://openalex.org/W2140590125","https://openalex.org/W2145721479","https://openalex.org/W2156323105","https://openalex.org/W2165126126","https://openalex.org/W2165862485","https://openalex.org/W2471456127","https://openalex.org/W2542543501","https://openalex.org/W2556714538","https://openalex.org/W2567172578","https://openalex.org/W2567615407","https://openalex.org/W2586380145","https://openalex.org/W2737883091","https://openalex.org/W2787099510","https://openalex.org/W2801489456","https://openalex.org/W4285719527","https://openalex.org/W4300490703"],"related_works":["https://openalex.org/W3202068393","https://openalex.org/W2752569328","https://openalex.org/W2536809794","https://openalex.org/W2393962653","https://openalex.org/W2391574262","https://openalex.org/W2385119817","https://openalex.org/W2375534108","https://openalex.org/W2312391375","https://openalex.org/W2159943424","https://openalex.org/W1567526064"],"abstract_inverted_index":{"The":[0,254],"Border":[1],"Gateway":[2],"Protocol":[3],"(BGP)":[4],"is":[5,49,119,154],"the":[6,26,34,114,142,191,194,220,261],"default":[7],"Internet":[8],"routing":[9],"protocol":[10],"that":[11,75,153,177,189,218],"manages":[12],"connectivity":[13],"among":[14],"Autonomous":[15],"Systems":[16],"(ASes).":[17],"Although":[18],"BGP":[19,53,102,138,182,223,278],"disruptions":[20],"are":[21,80,98,105],"rare,":[22],"when":[23],"they":[24],"occur":[25],"consequences":[27],"can":[28,280],"be":[29,65,145,157,281],"very":[30],"damaging.":[31],"Due":[32],"to":[33,64,108,120,133,137,150,156,161,234,283],"importance":[35],"of":[36,82,87,101,116,126,193,222,242,251,260,292],"this":[37,169,232],"problem":[38],"there":[39,97],"has":[40],"been":[41],"a":[42,84,151,173,227,249],"considerable":[43],"effort":[44],"aimed":[45],"at":[46],"understanding":[47],"what":[48],"normal":[50],"and":[51,68,89,147,201,244,257,270,289],"abnormal":[52],"traffic":[54,63,224,286],"and,":[55],"in":[56,91,131,226,277],"doing":[57],"so,":[58],"enable":[59],"potentially":[60],"disruptive":[61],"anomalous":[62],"quickly":[66],"identified":[67],"mitigate":[69],"its":[70],"effects.":[71],"Recent":[72],"efforts":[73],"indicate":[74],"machine":[76],"learning":[77],"(ML)":[78],"techniques":[79],"capable":[81],"achieving":[83],"high":[85],"level":[86],"accuracy":[88],"robustness":[90],"anomaly":[92,195,209,237],"detection.":[93],"However,":[94],"even":[95],"though":[96],"public":[99],"datasets":[100,256],"messages,":[103],"these":[104,117],"not":[106],"suited":[107,155],"feed":[109],"ML":[110,135,162],"models":[111,163],"directly,":[112],"because":[113],"goal":[115],"messages":[118,185],"exchange":[121],"fine-grained":[122],"reachability":[123],"information":[124],"instead":[125],"observe":[127],"network":[128],"behavior.":[129],"Thus,":[130],"order":[132],"apply":[134],"methods":[136],"control":[139,183],"plane":[140,184],"data,":[141],"data":[143],"must":[144],"preprocessed":[146],"features":[148,180,204,217],"extracted":[149],"format":[152],"used":[158,207,231,282],"as":[159,212,214],"input":[160],"(e.g.":[164],"labelled":[165],"tabular":[166],"data).":[167],"In":[168],"work,":[170],"we":[171,273],"implemented":[172],"dataset":[174],"generation":[175],"tool":[176,198,233,263],"extracts":[178,199],"relevant":[179],"from":[181,287],"along":[186],"with":[187,248],"tools":[188],"assist":[190],"labelling":[192],"period.":[196],"Our":[197],"volume":[200],"AS":[202],"path":[203],"most":[205],"commonly":[206],"by":[208],"detection":[210],"techniques,":[211],"well":[213],"novel":[215],"distribution":[216],"allow":[219],"observation":[221,243],"changes":[225],"straightforward":[228],"manner.":[229],"We":[230],"analyze":[235],"9":[236],"events":[238],"through":[239],"27":[240],"points":[241],"generated":[245,255],"81":[246],"datasets,":[247],"total":[250],"86,400":[252],"samples.":[253],"source":[258],"code":[259],"developed":[262],"were":[264],"made":[265],"publicly":[266],"available,":[267],"for":[268],"extension":[269],"reusability.":[271],"Additionally,":[272],"analyzed":[274],"which":[275],"trends":[276],"behavior":[279],"distinguish":[284],"regular":[285],"anomalies":[288],"different":[290],"types":[291],"anomalies.":[293]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3004075653","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4}],"updated_date":"2025-01-05T09:42:19.139678","created_date":"2020-02-07"}