The global routing network is the backbone of the Internet. However, it is quite vulnerable to attacks that cause major disruptions or routing manipulations. Prior related works have visualized routing path changes with node link diagrams, but it requires strong domain expertise to understand if a routing change between autonomous systems is suspicious. Geographic visualization has an advantage over conventional node-link diagrams by helping uncover such suspicious routes as the user can immediately see if a path is the shortest path to the target or an unreasonable detour. In this paper, we present ProBGP, a web-based progressive approach to visually analyze BGP update routes. We created a novel progressive data processing algorithm for th...
The Internet is a critical infrastructure in our society. The collection of data about its functioni...
Copyright 2004 ACMThis paper presents a methodology for identifying the autonomous system (or system...
This paper presents a methodology for identifying the autonomous sys-tem (or systems) responsible wh...
The global routing network is the backbone of the Internet. However, it is quite vulnerable to attac...
Some researchers have speculated that Internet’s routing system would experience a collapse in the n...
The Internet is constantly evolving and changing over time. Outages, attacks, upgrades, censorships,...
Failures at the BGP level can have significant impact on the overall Internet. Understanding the beh...
A route leak can be defined as a security gap that occurs due to the infringement of the routing pol...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
Interdomain routing with Border Gateway Protocol (BGP) plays a critical role in the Internet, determ...
Abstract—The control plane of the Internet relies entirely on BGP as inter-domain routing protocol t...
Internet connectivity is defined by a set of routing protocols which let the routers that comprise t...
The security of Internet routing is a major concern because attacks and errors can result in data pa...
This paper presents a methodology for identifying the autonomous system (or systems) responsible whe...
The internet consists of many networks connected by the BGP protocol and can easily be manipulated b...
The Internet is a critical infrastructure in our society. The collection of data about its functioni...
Copyright 2004 ACMThis paper presents a methodology for identifying the autonomous system (or system...
This paper presents a methodology for identifying the autonomous sys-tem (or systems) responsible wh...
The global routing network is the backbone of the Internet. However, it is quite vulnerable to attac...
Some researchers have speculated that Internet’s routing system would experience a collapse in the n...
The Internet is constantly evolving and changing over time. Outages, attacks, upgrades, censorships,...
Failures at the BGP level can have significant impact on the overall Internet. Understanding the beh...
A route leak can be defined as a security gap that occurs due to the infringement of the routing pol...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
Interdomain routing with Border Gateway Protocol (BGP) plays a critical role in the Internet, determ...
Abstract—The control plane of the Internet relies entirely on BGP as inter-domain routing protocol t...
Internet connectivity is defined by a set of routing protocols which let the routers that comprise t...
The security of Internet routing is a major concern because attacks and errors can result in data pa...
This paper presents a methodology for identifying the autonomous system (or systems) responsible whe...
The internet consists of many networks connected by the BGP protocol and can easily be manipulated b...
The Internet is a critical infrastructure in our society. The collection of data about its functioni...
Copyright 2004 ACMThis paper presents a methodology for identifying the autonomous system (or system...
This paper presents a methodology for identifying the autonomous sys-tem (or systems) responsible wh...