We use machine learning techniques to build predictive models for anomaly detection in the Border Gateway Protocol (BGP). Imbalanced datasets of network anomalies pose limitations to building predictive models for anomaly detection. In order to achieve better classification performance measures, we use resampling methods to balance classes in the datasets. We use undersampling, oversampling and combination techniques to change class distributions of the datasets. In this paper we build predictive models based on preprocessed network anomaly datasets of known Internet network anomalies and observe improvement in classifier performance measures compared to those reported in our previous work. We propose to use resampling combination technique...
BCP, the de facto inter-domain routing protocol, is the core component of current Internet infrastru...
Abstract—Border Gateway Protocol (BGP) is the core compo-nent of the Internet’s routing infrastructu...
In recent years, the volume and the complexity of data in Building Automation System networks have i...
We use machine learning techniques to build predictive models for anomaly detection in the Border Ga...
As the primary protocol used to exchange routing information between network domains, Border Gateway...
Worms such as Slammer, Nimda, and Code Red~I are anomalies that affect performance of the global Int...
The Border Gateway Protocol (BGP) coordinates the connectivity and reachability among Autonomous Sys...
Detecting, analyzing, and defending against cyber threats is an important topic in cyber security. A...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
Abstract — A number of events such as hurricanes, earthquakes, power outages can cause large-scale f...
We present an evaluation methodology for comparison of existing and proposed new algorithms for Bord...
Boarder Gateway Protocol is an Exterior Gateway Protocol used between Autonomous Systems (ASes) to s...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
BCP, the de facto inter-domain routing protocol, is the core component of current Internet infrastru...
Abstract—Border Gateway Protocol (BGP) is the core compo-nent of the Internet’s routing infrastructu...
In recent years, the volume and the complexity of data in Building Automation System networks have i...
We use machine learning techniques to build predictive models for anomaly detection in the Border Ga...
As the primary protocol used to exchange routing information between network domains, Border Gateway...
Worms such as Slammer, Nimda, and Code Red~I are anomalies that affect performance of the global Int...
The Border Gateway Protocol (BGP) coordinates the connectivity and reachability among Autonomous Sys...
Detecting, analyzing, and defending against cyber threats is an important topic in cyber security. A...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
This paper outlines the problem of detecting and visualising Border Gateway Protocol (BGP) update an...
Abstract — A number of events such as hurricanes, earthquakes, power outages can cause large-scale f...
We present an evaluation methodology for comparison of existing and proposed new algorithms for Bord...
Boarder Gateway Protocol is an Exterior Gateway Protocol used between Autonomous Systems (ASes) to s...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
BCP, the de facto inter-domain routing protocol, is the core component of current Internet infrastru...
Abstract—Border Gateway Protocol (BGP) is the core compo-nent of the Internet’s routing infrastructu...
In recent years, the volume and the complexity of data in Building Automation System networks have i...