Acknowledgement
Part of this work is funded by Universiti Kebangsaan Malaysia (ref: DPK-2023-009). The authors would like to thank the Ministry of Communication (MOC), Iraqi Telecommunication and Post Company (ITPC) for the shared data.
References
- Alotaibi, H. S., Gregory, M. A., Li, S. & Ali, I., 2022. Multidomain SDN-based gateways and Border Gateway Protocol. Journal of Computer Networks and Communications, 2022(1): 1-23. https://doi.org/10.1155/2022/3955800
- Mala, S. & Mallapur, S. V., 2022. A brief analysis of Border Gateway Protocol for Internet controlling and malicious attacks. International Conference on Computing, Communication, Electrical and Biomedical, pp. 561-572.
- Liao, H., Murah, M.Z., Hasan, M.K., Aman, A.H.M., Fang, J., Hu, X. and Khan, A.U.R., 2024. A survey of deep Learning technologies for intrusion detection in Internet of Things. IEEE Access. https://doi.org/10.1109/ACCESS.2023.3349287
- Mousa'B, M.S., Hasan, M.K., Sulaiman, R., Islam, S. and Khan, A.U.R., 2023. An explainable ensemble deep learning approach for intrusion detection in industrial Internet of Things. IEEE Access, 11 :115047-115061. https://doi.org/10.1109/ACCESS.2023.3323573
- Mohamed, M. and Alosman, K., 2024. A comprehensive machine learning framework for robust security management in cloud-based Internet of Things systems. Jurnal Kejuruteraan, 36(3), pp.1055-1065. https://doi.org/10.17576/jkukm-2024-36(3)-18
- Ahmad, Z., Shahid Khan, A., Nisar, K., Haider, I., Hassan, R., Haque, M.R., Tarmizi, S. and Rodrigues, J.J., 2021. Anomaly detection using deep neural network for IoT architecture. Applied Sciences, 11(15), p.7050. https://doi.org/10.3390/app11157050
- Al-Daweri, M.S., Abdullah, S. and Ariffin, K.A.Z., 2021. An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system. Computer Communications, 180, pp.57-76. https://doi.org/10.1016/j.comcom.2021.09.007
- Vafaei Sadr, A., Bassett, B. A. & Kunz, M. 2023. A flexible framework for anomaly detection via dimensionality reduction. Neural Computing and Applications 35(2): 1157-1167. https://doi.org/10.1007/s00521-021-05839-5
- Hoarau, K., Tournoux, P. U. & Razafindralambo, T. 2022. Detecting forged AS paths from BGP graph features using Recurrent Neural Networks. IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), pp. 735-736.
- Chliah, H., Battou, A., Hadj, M. a. E. & Laoufi, A. 2023. Hybrid machine learning-based approach for anomaly detection using Apache Spark. International Journal of Advanced Computer Science and Applications 14(4). https://doi.org/10.14569/IJACSA.2023.0140496
- Ding, Q., Li, Z., Haeri, S. and Trajković, L., 2018. Application of machine learning techniques to detecting anomalies in communication networks: Datasets and feature selection algorithms, pp. 47-70. Springer International Publishing.
- Verma, R.D., Govil, M.C. and Keserwani, P.K., 2023. ELM based ensemble of classifiers for BGP security against network anomalies. 11th International Symposium on Electronic Systems Devices and Computing (ESDC), pp. 1-6.
- Dietterich, T., 2000. Ensemble Methods in Machine Learning. Multiple Classifier Systems, pp.1-15.
- Banda, M., Ngassam, E.K. And Mnkandla, E., 2024. Enhancing Classification and Prediction through the Application of Hybrid Machine Learning Models. IEEE IST Africa Conference (IST-Africa), pp. 1-12.
- Barbir, A., Murphy, S. and Yang, Y., 2006. Generic threats to routing protocols. http://www.ietf.org/rfc/rfc4593.txt
- Ibidunmoye, O., Rezaie, A.R. and Elmroth, E., 2017. Adaptive anomaly detection in performance metric streams. IEEE Transactions on Network and Service Management, 15(1): 217-231. https://doi.org/10.1109/TNSM.2017.2750906
- Poupart, P., Chen, Z., Jaini, P., Fung, F., Susanto, H., Geng, Y., Chen, L., Chen, K. and Jin, H., 2016. Online flow size prediction for improved network routing. IEEE 24th International Conference on Network Protocols (ICNP), pp.1-6.
- Sanchez, O.R., Ferlin, S., Pelsser, C. and Bush, R., 2019. Comparing machine learning algorithms for BGP anomaly detection using graph features. 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, pp. 35-41.
- Karimi, M., Jahanshahi, A., Mazloumi, A. and Sabzi, H.Z., 2019. Border gateway protocol anomaly detection using neural network. IEEE International Conference on Big Data, pp. 6092-6094.
- Al-Musawi, B., Branch, P. & Armitage, G. 2016. BGP anomaly detection techniques: A survey. IEEE Communications Surveys & Tutorials, 19(1): 377-396. https://doi.org/10.1109/COMST.2016.2622240
- Bhatnagar, A., Majumdar, N. and Shukla, S., 2019. BGP anomaly detection using decision tree-based machine learning classifiers. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8: 4015-4020. https://doi.org/10.35940/ijitee.L3622.1081219
- Kalra, H., Singh, A.P. and Sadhya, D., 2021. Anomaly detection in Border Gateway Protocol using supervised machine learning. IEEE Bombay Section Signature Conference (IBSSC), pp. 1-6.
- Paiva, T.B., Siqueira, Y., Batista, D.M., Hirata, R. and Terada, R., 2021. BGP anomalies classification using features based on as relationship graphs. IEEE Latin-American Conference on Communications (LATINCOM), pp. 1-6.
- Al-Rousan, N.M. and Trajković, L., 2012. Machine learning models for classification of BGP anomalies. IEEE 13th International Conference on High Performance Switching and Routing, pp. 103-108.
- Lutu, A., Bagnulo, M., Cid-Sueiro, J. and Maennel, O., 2014. Separating wheat from chaff: Winnowing unintended prefixes using machine learning. IEEE Conference on Computer Communications (INFOCOM), pp. 943-951.
- Allahdadi, A., Morla, R. and Prior, R., 2017. A framework for BGP abnormal events detection. arXiv preprint: 1708.03453.
- Cheng, M., Li, Q., Lv, J., Liu, W. & Wang, J., 2021. Multiscale LSTM model for BGP anomaly classification. IEEE Transactions on Services Computing 14(3): 765-778. https://doi.org/10.1109/TSC.2018.2824809
- Dai, X., Wang, N. and Wang, W., 2019, March. Application of machine learning in BGP anomaly detection. Journal of Physics: Conference Series, 1176(3): 032015. https://doi.org/10.1088/1742-6596/1176/3/032015
- Cosovic, M., Obradovic, S. and Junuz, E., 2018. Deep learning for detection of BGP anomalies. Time Series Analysis and Forecasting: Selected Contributions from ITISE 2017, pp. 95-113. Springer International Publishing.
- Li, Z., Rios, A.L.G. and Trajković, L., 2020. Detecting internet worms, ransomware, and blackouts using recurrent neural networks. IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2165-2172.
- Hoarau, K., Tournoux, P.U. and Razafindralambo, T., 2021, June. BML: an efficient and versatile tool for BGP dataset collection. IEEE International Conference on Communications (ICC) Workshops, pp. 1-6.
- Park, H., Kim, K., Shin, D. and Shin, D., 2023. BGP dataset based malicious user activity detection using machine learning. Information, 14(9): 501. https://doi.org/10.3390/info14090501
- Butler, K., Farley, T. R., McDaniel, P. & Rexford, J., 2009. A survey of BGP security issues and solutions. Proceedings of the IEEE, 98(1): 100-122. https://doi.org/10.1109/JPROC.2009.2034031
- Hoarau, K., Tournoux, P. U.& Razafindralambo, T., 2021. Suitability of graph representation for BGP anomaly detection. IEEE 46th Conference on Local Computer Networks (LCN), pp.305-310.
- Edgar, T.W. and Manz, D.O., 2017. Research methods for cyber security. Syngress.
- Ali, J., Khan, R., Ahmad, N. and Maqsood, I., 2012. Random forests and decision trees. International Journal of Computer Science Issues (IJCSI), 9(5): 272.
- Muneer, A., Mohd Taib, S., Mohamed Fati, S., O. Balogun, A. & Abdul Aziz, I., 2022. A hybrid deep learning-based unsupervised anomaly detection in high dimensional data. Computers, Materials & Continua 70(3): 5363-5381. https://doi.org/10.32604/cmc.2022.021113
- Bernieri, G., Conti, M. and Turrin, F., 2019. Evaluation of machine learning algorithms for anomaly detection in industrial networks. IEEE International Symposium on Measurements & Networking (M&N), pp. 1-6.
- Rodríguez, M., Alesanco, Á., Mehavilla, L. and García, J., 2022. Evaluation of machine learning techniques for traffic flow-based intrusion detection. Sensors, 22(23): 9326. https://doi.org/10.3390/s22239326
- Kubat, M., 2017. An introduction to machine learning. Springer, Cham.
- Bognár, L. & Fauszt, T., 2022. Factors and conditions that affect the goodness of machine learning models for predicting the success of learning. Computers and Education: Artificial Intelligence 3: 100100. https://doi.org/10.1016/j.caeai.2022.100100
- Ray, S,. 2024. 8 Ways to Improve Accuracy of Machine Learning Models. Available at: https://www.analyticsvidhya.com/blog/2015/12/improvemachine-learning-results/ (Accessed: 25 October 2024).
- Ridwan, M.A., Radzi, N.A.M., Azmi, K.H.M., Abdullah, F. & Ahmad, W.S.H.M.W. 2023. A new machine learning based hybrid intrusion detection system and intelligent routing algorithm for MPLS network. International Journal of Advanced Computer Science and Applications 14(4): 94-107. https://doi.org/10.14569/IJACSA.2023.0140412
- Yu, Y., Lv, P., Tong, X. and Dong, J., 2020. Anomaly detection in high-dimensional data based on autoregressive flow. Database Systems for Advanced Applications: 25th International Conference (DASFAA), pp. 125-140.
- Kadhim, N.S., Chellappan, K. & Abdullah, N.F.,2024. BGP security analysis using network simulation: An impact study ofcyber attacks. Jurnal Kejuruteraan.