[1] |
REKHER Y,LI T,HARES S.Border gateway protocol4:RFC 4271[R].Fremont,USA:IETF,2006:1-31.
|
[2] |
MURPHY S.BGP security vulnerabilities analysis:RFC 4272[R].Fremont,USA:IETF,2006:1-21.
|
[3] |
Al-MUSAWI B,BRANCH P,ARMITAGE G.BGP anomaly detection techniques:a survey[J].IEEE Communications Surveys and Tutorials,2017,19(1):377-396.
|
[4] |
TOONK A.A BGP leak made in Canada[EB/OL].(2012-08-08)[2018-05-03].http://www.bgpmon.net/a-bgp-leak-made-in-canada.
|
[5] |
TOONK A.Large hijack affects reachability of high traffic destinations[EB/OL].(2016-04-22)[2018-05-03].http://bgpmon.net/large-hijack-affects-reachability-of-high-traffic-destinations/.
|
[6] |
THEODORIDIS G,TSIGKAS O,TZOVARAS D.A novel unsupervised method for securing BGP against routing hijacks[M]//GELENBE E,LENT R.Computer and Information Sciences Ⅲ.Berlin,Germany:Springer,2013:21-29.
|
[7] |
SHI Xingang,XIANG Yang,WANG Zhiliang,et al.Detecting prefix hijackings in the Internet with argus[C]//Proceedings of 2012 Internet Measurement Conference.New York,USA:ACM Press,2012:15-28.
|
[8] |
ZHANG Zheng,ZHANG Ying,HU Y C,et al.iSPY:detecting IP prefix hijacking on my own[J].IEEE/ACM Transactions on Networking,2010,18(6):1815-1828.
|
[9] |
CHENG Min,XU Qian,LÜ Jianming,et al.MS-LSTM:a multi-scale LSTM model for BGP anomaly detection[C]//Proceedings of the 24th International Conference on Network Protocols.Washington D.C.,USA:IEEE Press,2016:1-6.
|
[10] |
张蕾,崔勇,刘静,等.机器学习在网络空间安全研究中的应用[J].计算机学报,2018,41(9):1943-1975.
|
[11] |
AL-ROUSAN N M,TRAJKOVIC' L.Machine learning models for classification of BGP anomalies[C]//Pro-ceedings of IEEE International Conference on High Performance Switching and Routing.Washington D.C.,USA:IEEE Press,2013:103-108.
|
[12] |
LI Yan,XING Hongjie,HUA Qiang,et al.Classification of BGP anomalies using decision trees and fuzzy rough sets[C]//Proceedings of IEEE International Conference on Systems,Man and Cybernetics.Washington D.C.,USA:IEEE Press,2014:1312-1317.
|
[13] |
BATTA P,SINGH M,LI Zhida,et al.Evaluation of support vector machine kernels for detecting network anomalies[C]//Proceedings of IEEE International Symposium on Circuits and Systems.Washington D.C.,USA:IEEE Press,2018:1-7.
|
[14] |
DING Qingye,LI Zhida,BATTA P,et al.Detecting BGP anomalies using machine learning techniques[C]//Proceedings of IEEE International Conference on Systems,Man,and Cybernetics.Washington D.C.,USA:IEEE Press,2017:3352-3355.
|
[15] |
CHENG Qiang,ZHOU Hongbo,CHENG Jie.The Fisher-Markov selector:fast selecting maximally separable feature subset for multiclass classification with applications to high-dimensional data[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,33(6):1217-1233.
|
[16] |
CORTES C,VAPNIK V.Support-vector networks[J].Machine Learning,1995,20(3):273-297.
|
[17] |
KEERTHI S S,LIN C J.Asymptotic behaviors of support vector machines with Gaussian kernel[J].Neural Computation,2003,15(7):1667-1689.
|
[18] |
LIN H T,LIN C J.A study on Sigmoid kernels for SVM and the training of non-PSD kernels by SMO-type methods[J].Neural Computation,2003,15(1):15-23.
|
[19] |
王国胜.核函数的性质及其构造方法[J].计算机科学,2006,33(6):172-174.
|
[20] |
MOORE D,PAXSON V,SAVAGE S,et al.Inside the slammer worm[J].IEEE Security and Privacy,2003,99(4):33-39.
|
[21] |
MACHIE A,ROCULAN J,RUSSELLU R,et al.Nimda worm analysis[EB/OL].[2018-05-03].http://dpnm.postech.ac.kr/research/04/nsri/papers/010919-Analys is-Nimda.pdf.
|
[22] |
MOORE D,SHANNON C.Code-Red:a case study on the spread and victims of an Internet worm[C]//Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement.New York,USA:ACM Press,2002:273-284.
|
[23] |
LibBGPdump[EB/OL].[2018-05-03].http://bitbucket.org/ripenccwiki/.
|
[24] |
MANDERSON T.Multi-threaded routing toolkit Border Gateway Protocol(BGP) routing information export format with geo-location extensions:RFC 6397[R].Fremont,USA:IETF,2018:1-8.
|
[25] |
CHANG C C,LIN C J.LIBSVM:a library for support vector machines[J].ACM Transactions on Intelligent Systems and Technology,2011,2(3):1-27.
|
[26] |
AL-ROUSAN N M,TRAJKOVIC' L.Feature selection for classification of BGP anomalies using Bayesian models[C]//Proceedings of International Conference on High Machine Learning and Cybernetics.Washington D.C.,USA:IEEE Press,2013:103-108.
|
[27] |
AL-ROUSAN N M.Comparison of machine learnig models for classification of BGP anomalies[C]//Proceedings of the 13th International Conference on High Performance Switching and Routing.Washington D.C.,USA:IEEE Press,2012:1-6.
|