Skip to main content

On Knowledge-Based Classification of Abnormal BGP Events

  • Conference paper
Information Systems Security (ICISS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4812))

Included in the following conference series:

Abstract

One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In today’s Internet, the de facto standard inter-domain routing protocol is the Border Gateway Protocol, or BGP, that keeps every BGP router updated about which BGP router is the next hop in reaching a particular network and which autonomous systems (AS), in order, it has to cross. Unfortunately, various abnormal events-such as fast-spreading worms or large-scale power outages-can affect the normal operation of BGP. Not only can these events cause routers or BGP sessions between routers to go down-a denial-of-service attack, but they can also create havoc as the scale of damage rises.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, J., Dou, D., Wu, Z., Kim, S., Agarwal, V.: An Internet routing forensics framework for discovering rules of abnormal BGP events. ACM SIGCOMM Computer Communication Review 35(5), 55–66 (2005)

    Article  Google Scholar 

  2. Dou, D., Li, J., Qin, H., Kim, S., Zhong, S.: Understanding and utilizing the hierarchy of abnormal BGP events. In: SIAM International Conference on Data Mining, Minneapolis, Minnesota, pp. 457–462 (April 2007) (short paper)

    Google Scholar 

  3. University of Oregon Route Views Project, http://antc.uoregon.edu/route-views/

  4. RIPE NCC, RIPE routing information service raw data, http://data.ris.ripe.net/

  5. Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Patrick McDaniel Shyam K. Gupta

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, J., Dou, D., Kim, S., Qin, H., Wang, Y. (2007). On Knowledge-Based Classification of Abnormal BGP Events. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77086-2_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77085-5

  • Online ISBN: 978-3-540-77086-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics