Utilizing Duplicate Announcements for BGP Anomaly Detection
Abstract
:1. Introduction
- (1)
- The exponential Moving Average (EMA) algorithm is applied to BGP datasets to identify trends and make informed decisions based on the proper analysis of the data obtained in the time series.
- (2)
- Deep Learning algorithms such as Long Short-Term Memory (LSTM) and Autoencoder are utilized, and a comparison is made for the detection of bursty announcements with the LSTM technique and the detection of duplicate announcements with the proposed autoencoder technique.
- (3)
- The handling of data imbalance is managed by the use of the Temporal-oriented Synthetic Minority Over Sampling Technique (T-SMOTE) technique.
- (4)
- The experimentation is performed when two deep learning approaches are analyzed and compared; the autoencoder has provided the best results in terms of improved performance metrics, i.e., accuracy, precision, recall, and Receiver Operating Characteristic (ROC) curve.
2. Related Work
2.1. Previous Works Nearly Related to the Current Study
2.2. Duplicate Announcements
2.2.1. Effect of Duplicate Announcements
2.2.2. Factors Affecting Duplicate Announcements
3. Proposed Methodology
3.1. Data Collection
3.2. Data Pre-Processing and Feature Extraction
- Duplicated Announcements Removal: In the case of duplicate announcements, we detected them by comparing two consecutive update messages from the same AS and checking if their attributes (prefix, AS-path, next-hop, etc.) are identical within a time window. If yes, one instance was kept, and others were selected for anomaly detection.
- Removing Incomplete or Corrupted Entries: To prevent errors during feature extraction, the entries with missing fields (e.g., AS-paths with NULL values, incorrect timestamps, or incorrectly extended network prefixes) were excluded.
- Outlier Removal: Updates were filtered using Interquartile Range (IQR) filtering to remove extreme outlier values in attributes such as AS-path length or number of announcements per time window.
- The IP Address Standardization: to make IPv4 and IPv6 addresses compatible with machine models, we parsed and formatted them into a common representation.
- Timestamp Synchronization: BGP updates from separate collection points had slightly different timestamps owing to logging latency. Timestamps were standardized to make sure there was no mixture of UTC and local time, and we resampled the ticks to one-minute intervals.
- Min-Max Normalization: Continuous numerical features such as number of announcements, withdrawals, and AS-path lengths were normalized using the following Min-Max scaling:
- 2.
- One-Hot Encoding for Categorical Variables: Features like BGP update types (announcement, withdrawal, implicit withdrawal) were categorical and encoded using one-hot encoding to allow numerical representation while maintaining feature independence.
- 3.
- Time-Stamp Corrections: It is assured that all the lettering and inscriptions are in place and hold actual timestamps. If the timestamps are not placed accurately, then they are converted to a suitable common time zone if the necessity arises.
- 4.
- Time-Series Data Binning: The dataset was segmented into one-minute time intervals, aggregating update messages within each time bin to create structured feature vectors. This ensured consistency across different BGP collectors and provided a more granular time-series representation.
3.3. Split Dataset
3.4. Exponential Moving Average
Algorithm 1. Exponential Moving Average (EMA) Event Detection Algorithm |
# Input: Time-series data yt, Smoothing factor α, Threshold θ, Window Length ω |
# Output: List of detected anomalies |
DEFINE FUNCTION EMA_Event_Detection(): |
# Initialize EMA with first data point |
# Store EMA values |
# Store detected anomaly timestamps |
Anomalies = [] |
# Loop through the time-series data |
FOR t FROM ω TO length(y): |
# Compute EMA using recursive formula |
# Store EMA value |
APPEND TO |
# Compute deviation from EMA |
Deviation = ABS() |
# Compute mean over window |
Window_Mean = AVERAGE() |
# If deviation exceeds threshold θ, classify as anomaly |
IF Deviation > θ × Window_Mean: |
# Store timestamp of anomaly |
APPEND t TO Anomalies |
RETURN Anomalies, µseries |
3.5. Handling Data Imbalance
3.6. Deep Learning Techniques
3.6.1. Long Short-Term Memory (LSTM)
3.6.2. AutoEncoder
3.7. Performance Metrics
4. Result Analysis
4.1. Experimental Setup
4.2. Performance Comparison of DL Models
4.3. Performance Across Different BGP Anomaly Conditions
- Slammer Worm Attack (2003): The slammer worm exploited a flaw in SQL to generate a massive amount of BGP update messages and congested the entire network alarmingly. The proposed approach successfully discovered these bursty duplicate announcements induced by abnormal traffic patterns. The Autoencoder outperformed the traditional detection models, which struggle in real-time event detection, with an accuracy of 88.60% for RIPE datasets and 89.72% for Route Views.
- Moscow Blackout (2005): There were also BGP updates and session resets when the blackout occurred. In contrast to purely statistical anomaly detectors, which generate high false positives in scenarios like this, this model achieved a 95.75% recall, allowing for rapid identification of route instability without excessive alarms.
- WannaCrypt Ransomware Attack (2017): Even though the WannaCrypt Ransomware was not an actual DDoS attack, it caused disruptions all over the world, accompanied by BGP announcements where attack-related traffic spikes can be seen. The Autoencoder effectively distinguished normal routing fluctuations from malicious duplicate announcements with an F1-score of 99.00%, outpacing prevailing threshold-based methodologies by a considerable margin.
4.4. Performance Under Different Network Scales
- Small Number of AS Connectivity: The model performed very well on small networks, where the AS performed very well due to the detection of localized anomalies. The EMA component further filtered fluctuations due to temporary routing delta variances from those being true anomalies; even on sparse data, this combination maintained > 95% accuracy.
- Networks of Large Scale (High AS Connectivity): In high BGP activity global scale networks where constants of legitimate updates are made to the system, traditional anomaly detection models… The Autoencoder model successfully scaled to large datasets and learned features from high-dimensional data that continue to outperform at anomaly detection with a recall as high as 98.31% on one of the Route Views data, even in high traffic environments.
4.5. Validation of EMA Autoencoder Performance over LSTM
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Al-Musawi, B.; Branch, P.; Armitage, G. BGP Anomaly Detection Techniques: A Survey. IEEE Commun. Surv. Tutor. 2017, 19, 377–396. [Google Scholar] [CrossRef]
- Li, Z.; Rios, A.L.G.; Trajković, L. Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks. In Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020; pp. 2165–2172. [Google Scholar]
- Mahajan, R.; Wetherall, D.; Anderson, T. Understanding BGP Misconfiguration. SIGCOMM Comput. Commun. Rev. 2002, 32, 3–16. [Google Scholar] [CrossRef]
- Wang, L.; Zhao, X.; Pei, D.; Bush, R.; Massey, D.; Mankin, A.; Wu, S.F.; Zhang, L. Observation and Analysis of BGP Behavior under Stress. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, Marseille, France, 6–8 November 2002; Association for Computing Machinery: New York, NY, USA, 2002; pp. 183–195. [Google Scholar]
- Deshpande, S.; Thottan, M.; Ho, T.K.; Sikdar, B. An Online Mechanism for BGP Instability Detection and Analysis. IEEE Trans. Comput. 2009, 58, 1470–1484. [Google Scholar] [CrossRef]
- Cowie, J.; Ogielski, A.; Premore, B.; Smith, E.; Underwood, T. Impact of the 2003 Blackouts on Internet Communications: Preliminary Report. Renesys Corporation (updated 1 March 2004). 2003. Available online: https://content.cooperate.com/pdf/blackout2003.pdf (accessed on 27 March 2024).
- Ćosović, M.; Obradović, S.; Trajković, L. Performance Evaluation of BGP Anomaly Classifiers. In Proceedings of the 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, Russia, 3–5 February 2015; pp. 115–120. [Google Scholar]
- Nawata, S.; Uchida, M.; Gu, Y.; Tsuru, M.; Oie, Y. Unsupervised Ensemble Anomaly Detection through Time-Periodical Packet Sampling. In Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA, 15–19 March 2010; pp. 1–6. [Google Scholar]
- Ćosović, M.; Obradovió, S.; Trajković, L. Classifying Anomalous Events in BGP Datasets. In Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver, BC, Canada, 15–18 May 2016; pp. 1–4. [Google Scholar]
- Zhang, K.; Yen, A.; Zhao, X.; Massey, D.; Wu, S.F.; Zhang, L. On Detection of Anomalous Routing Dynamics in BGP. In Proceedings of the Networking 2004, Athens, Greece, 9–14 May 2004; Mitrou, N., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 259–270. [Google Scholar]
- Chen, M.; Xu, M.; Li, Q.; Yang, Y. Measurement of Large-Scale BGP Events: Definition, Detection, and Analysis. Comput. Netw. 2016, 110, 31–45. [Google Scholar] [CrossRef]
- Zhang, M.; Li, J.; Brooks, S. I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes. IEEE/ACM Trans. Netw. 2017, 25, 3411–3426. [Google Scholar] [CrossRef]
- Li, J.; Guidero, M.; Wu, Z.; Purpus, E.; Ehrenkranz, T. BGP Routing Dynamics Revisited. SIGCOMM Comput. Commun. Rev. 2007, 37, 5–16. [Google Scholar] [CrossRef]
- Testart, C.; Richter, P.; King, A.; Dainotti, A.; Clark, D. Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. In Proceedings of the Internet Measurement Conference, Amsterdam, The Netherlands, 21–23 October 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 420–434. [Google Scholar]
- Ganiz, M.C.; Kanitkar, S.; Chuah, M.C.; Pottenger, W.M. Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. In Proceedings of the Sixth International Conference on Data Mining (ICDM’06), Hong Kong, China, 18–22 December 2006; pp. 874–879. [Google Scholar]
- Mai, J.; Yuan, L.; Chuah, C.-N. Detecting BGP Anomalies with Wavelet. In Proceedings of the NOMS 2008—2008 IEEE Network Operations and Management Symposium, Salvador, Brazil, 7–11 April 2008; pp. 465–472. [Google Scholar]
- Prakash, B.A.; Valler, N.; Andersen, D.; Faloutsos, M.; Faloutsos, C. BGP-Lens: Patterns and Anomalies in Internet Routing Updates. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 28 June–1 July 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 1315–1324. [Google Scholar]
- Cheng, M.; Xu, Q.; L.V., J.; Liu, W.; Li, Q.; Wang, J. MS-LSTM: A Multi-Scale LSTM Model for BGP Anomaly Detection. In Proceedings of the 2016 IEEE 24th International Conference on Network Protocols (ICNP), Singapore, 8–11 November 2016; pp. 1–6. [Google Scholar]
- Cheng, M.; Li, Q.; Lv, J.; Liu, W.; Wang, J. Multi-Scale LSTM Model for BGP Anomaly Classification. IEEE Trans. Serv. Comput. 2021, 14, 765–778. [Google Scholar] [CrossRef]
- McGlynn, K.; Acharya, H.B.; Kwon, M. Detecting BGP Route Anomalies with Deep Learning. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April–2 May 2019; pp. 1039–1040. [Google Scholar]
- Fonseca, P.; Mota, E.S.; Bennesby, R.; Passito, A. BGP Dataset Generation and Feature Extraction for Anomaly Detection. In Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June–3 July 2019; pp. 1–6. [Google Scholar]
- Lakhina, A.; Crovella, M.; Diot, C. Diagnosing Network-Wide Traffic Anomalies. SIGCOMM Comput. Commun. Rev. 2004, 34, 219–230. [Google Scholar] [CrossRef]
- Li, X.; Bian, F.; Crovella, M.; Diot, C.; Govindan, R.; Iannaccone, G.; Lakhina, A. Detection and Identification of Network Anomalies Using Sketch Subspaces. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, Brazil, 25–27 October 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 147–152. [Google Scholar]
- Liu, D.; Zhao, Y.; Xu, H.; Sun, Y.; Pei, D.; Luo, J.; Jing, X.; Feng, M. Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning. In Proceedings of the 2015 Internet Measurement Conference, Tokyo, Japan, 28–30 October 2015; Association for Computing Machinery: New York, NY, USA, 2015; pp. 211–224. [Google Scholar]
- Zhuo, D.; Ghobadi, M.; Mahajan, R.; Förster, K.-T.; Krishnamurthy, A.; Anderson, T. Understanding and Mitigating Packet Corruption in Data Center Networks. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, Los Angeles, CA, USA, 21–25 August 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 362–375. [Google Scholar]
- Hu, J.; Zhou, Z.; Yang, X.; Malone, J.; Williams, J.W. {CableMon}: Improving the Reliability of Cable Broadband Networks via Proactive Network Maintenance. In Proceedings of the17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), Santa Clara, CA, USA, 25–27 February 2020; USENIX Association: Santa Clara, CA, USA, 2020; pp. 619–632. [Google Scholar]
- Lad, M.; Massey, D.; Pei, D.; Wu, Y.; Zhang, B.; Zhang, L. PHAS: A Prefix Hijack Alert System. In Proceedings of the 15th Conference on USENIX Security Symposium—Volume 15, Vancouver, BC, Canada, 31 July 2006; USENIX Association: Santa Clara, CA, USA, 2006. [Google Scholar]
- Hu, X.; Mao, Z.M. Accurate Real-Time Identification of IP Prefix Hijacking. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA, 20–23 May 2007; pp. 3–17. [Google Scholar]
- Shi, X.; Xiang, Y.; Wang, Z.; Yin, X.; Wu, J. Detecting Prefix Hijackings in the Internet with Argus. In Proceedings of the 2012 Internet Measurement Conference, Boston, MA, USA, 14–16 November 2012; Association for Computing Machinery: New York, NY, USA, 2012; pp. 15–28. [Google Scholar]
- Schlamp, J.; Holz, R.; Jacquemart, Q.; Carle, G.; Biersack, E.W. HEAP: Reliable Assessment of BGP Hijacking Attacks. IEEE J. Sel. Areas Commun. 2016, 34, 1849–1861. [Google Scholar] [CrossRef]
- Sermpezis, P.; Kotronis, V.; Gigis, P.; Dimitropoulos, X.; Cicalese, D.; King, A.; Dainotti, A. ARTEMIS: Neutralizing BGP Hijacking Within a Minute. IEEE/ACM Trans. Netw. 2018, 26, 2471–2486. [Google Scholar] [CrossRef]
- Chen, E.; Bates, T.J.; Chandra, R. BGP Route Reflection: An Alternative to Full Mesh Internal BGP (IBGP); Internet Engineering Task Force. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4456.html (accessed on 27 March 2024).
- Labovitz, C.; Malan, G.R.; Jahanian, F. Origins of Internet Routing Instability. In Proceedings of the IEEE INFOCOM ’99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), New York, NY, USA, 21–25 March 1999; Volume 1, pp. 218–226. [Google Scholar]
- Park, J.H.; Jen, D.; Lad, M.; Amante, S.; McPherson, D.; Zhang, L. Investigating Occurrence of Duplicate Updates in BGP Announcements. In Proceedings of the Passive and Active Measurement, Zurich, Switzerland, 7–9 April 2010; Krishnamurthy, A., Plattner, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 11–20. [Google Scholar]
- Traina, P. RFC1774: BGP-4 Protocol Analysis; RFC Editor: Cambridge, MA, USA, 1995; Available online: https://dl.acm.org/doi/abs/10.17487/RFC1774 (accessed on 27 March 2024).
- Meyer, D. BGP Communities for Data Collection; Internet Engineering Task Force. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4384.html (accessed on 27 March 2024).
- Steenbergen, R.; Scholl, T. BGP Communities: A Guide for Service Provider Networks; NANOG. 2013. Available online: https://archive.nanog.org/meetings/nanog40/presentations/BGPcommunities.pdf (accessed on 27 March 2024).
- Albawi, S.; Mohammed, T.; Al-Zawi, S. Understanding of a Convolutional Neural Network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Patil, A.; Rane, M. Convolutional Neural Networks: An Overview and Its Applications in Pattern Recognition. In Proceedings of the Information and Communication Technology for Intelligent Systems (ICTIS 2020), Ahmedabad, India, 15–16 May 2020; Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A., Eds.; Springer: Singapore, 2021; pp. 21–30. [Google Scholar]
- Hyndman, R.; Koehler, A.B.; Ord, J.K.; Snyder, R.D. Forecasting with Exponential Smoothing: The State Space Approach; Springer Science & Business Media: Berlin, Germany, 2008; ISBN 978-3-540-71918-2. [Google Scholar]
- Müller, U.A. Specially Weighted Moving Averages with Repeated Application of the Ema Operator; Olsen Research Institute Discussion Paper: Zurich, Switzerland, 1991. [Google Scholar]
- Ding, Q.; Li, Z.; Batta, P.; Trajković, L. Detecting BGP Anomalies Using Machine Learning Techniques. In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 9–12 October 2016; pp. 003352–003355. [Google Scholar]
- Al-Rousan, N.M.; Trajković, L. Machine Learning Models for Classification of BGP Anomalies. In Proceedings of the 2012 IEEE 13th International Conference on High Performance Switching and Routing, Belgrade, Serbia, 24–27 June 2012; pp. 103–108. [Google Scholar]
- Bing, H.; Hao, S.; Fangwei, Z.; Shuai, Z.; Tao, Q.; Changjiang, Y. Application Process of Machine Learning in Cyberspace Security. In Proceedings of the 2021 6th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 9–11 April 2021; pp. 865–869. [Google Scholar]
- Zhao, P.; Luo, C.; Qiao, B.; Wang, L.; Rajmohan, S.; Lin, Q.; Zhang, D. T-SMOTE: Temporal-Oriented Synthetic Minority Oversampling Technique for Imbalanced Time Series Classification. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, Vienna, Austria, 23–29 July 2022; International Joint Conferences on Artificial Intelligence Organization: Vienna, Austria, 2022; pp. 2406–2412. [Google Scholar]
- Park, H.; Kim, K.; Shin, D.; Shin, D. BGP Dataset-Based Malicious User Activity Detection Using Machine Learning. Information 2023, 14, 501. [Google Scholar] [CrossRef]
- Deng, A.; Hooi, B. Graph Neural Network-Based Anomaly Detection in Multivariate Time Series. Proc. AAAI Conf. Artif. Intell. 2021, 35, 4027–4035. [Google Scholar] [CrossRef]
- Audibert, J.; Michiardi, P.; Guyard, F.; Marti, S.; Zuluaga, M.A. USAD: UnSupervised Anomaly Detection on Multivariate Time Series. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Virtual Event, CA, USA, 6–10 July 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 3395–3404. [Google Scholar]
- Zhao, H.; Wang, Y.; Duan, J.; Huang, C.; Cao, D.; Tong, Y.; Xu, B.; Bai, J.; Tong, J.; Zhang, Q. Multivariate Time-Series Anomaly Detection via Graph Attention Network. In Proceedings of the 2020 IEEE International Conference on Data Mining (ICDM), Sorrento, Italy, 17–20 November 2020; pp. 841–850. [Google Scholar]
- Zhang, Y.; Chen, Y.; Wang, J.; Pan, Z. Unsupervised Deep Anomaly Detection for Multi-Sensor Time-Series Signals. IEEE Trans. Knowl. Data Eng. 2023, 35, 2118–2132. [Google Scholar] [CrossRef]
Collection Site | Dataset | Regular | Anomaly | Collection Date | |
---|---|---|---|---|---|
(min) | (min) | Start | End | ||
RIPE | WannaCrypt | 5760 | 5760 | 10 May 2017 00:00:00 | 17 May 2017 23:59:59 |
Moscow b/o | 6960 | 240 | 23 January 2005 00:00:00 | 27 January 2005 23:59:59 | |
Slammer | 6331 | 869 | 23 May 2003 00:00:00 | 27 May 2003 23:59:59 | |
Route Views | WannaCrypt | 5760 | 5760 | 10 May 2017 00:00:00 | 17 May 2017 23:59:59 |
Moscow b/o | 6865 | 130 | 23 January 2002 00:00:00 | 27 January 2005 23:59:59 | |
Slammer | 6319 | 869 | 23 May 2003 00:00:00 | 27 May 2003 23:59:59 |
Parameter Name | Parameter Value |
---|---|
Input Layer | 37 neurons (one per extracted feature) |
Encoder Layer 1 | 128 neurons, ReLU activation |
Encoder Layer 2 | 64 neurons, ReLU activation |
Encoder Layer 3 | 32 neurons, ReLU activation |
Encoder Bottleneck Layer | 16 neurons, linear activation |
Decoder Layer 1 | 32 neurons, ReLU activation |
Decoder Layer 2 | 64 neurons, ReLU activation |
Decoder Layer 3 | 128 neurons, ReLU activation |
Decoder Output Layer | 37 neurons, sigmoid activation (for reconstruction) |
Learning rate | 0.001 (tuned via grid search) |
Optimizer | Adam |
Batch size | 32 |
Number of epochs | 30 |
Loss function | Mean Squared Error (MSE) |
Dropout rate | 0.2 (to prevent overfitting) |
Parameter Name | Parameter Value |
---|---|
Input Layer | 37 neurons |
Hidden LSTM Layer 1 | 64 units |
Hidden LSTM Layer 2 | 64 units, dropout rate = 0.2 |
Fully Connected Layer | 32 neurons, ReLU activation |
Output Layer | 1 neuron, sigmoid activation |
Learning rate | 0.001 (tuned via grid search) |
Optimizer | Adam |
Batch size | 32 |
Number of epochs | 30 |
Loss function | Binary Cross-Entropy |
Feature | Definition | Type | Category |
---|---|---|---|
1 | Number of Announcements | Continuous | volume |
2 | Number of Withdrawals | Continuous | volume |
3 | Number of Announced NLRI prefixes | Continuous | volume |
4 | Number of Withdrawn NLRI prefixes | Continuous | volume |
5 | Average AS-PATH Length | Categorical | AS-path |
6 | Maximum AS-PATH Length | Categorical | AS-path |
7 | Average unique AS-PATH Length | Continuous | AS-path |
8 | Number of Duplicate Announcements | Continuous | volume |
9 | Number of Duplicate Withdrawals | Continuous | volume |
10 | Number of Implicit Withdrawals | Continuous | volume |
11 | Average Edit Distance | Categorical | AS-path |
12 | Maximum Edit Distance | Categorical | AS-path |
13 | Inter-Arrival Time | Continuous | volume |
14–24 | Maximum Edit Distance = n, where n = (7, 8, …, 17) | Binary | AS-path |
25–33 | Maximum AS_PATH Length = n, where n = (7, 8, …, 16) | Binary | AS-path |
34 | Number of IGP packets | Continuous | volume |
35 | Number of EGP packets | Continuous | volume |
36 | Number of Incomplete packets | Continuous | volume |
37 | Packet size (B) | Continuous | volume |
Parameter | Value | Best Selection |
---|---|---|
Number of Epochs | 10, 20, 30,50 | RIPE (MB-30, S-50, WC-20) ROUTE MB-30, S-10, WC-30) |
Batch Size | 16, 32 | RIPE (MB-16, S-32, WC-32) ROUTE (MB-32, S-16, WC-32) |
Learning Rate | 0.001, 0.002 | RIPE (MB-0.002, S-0.002, WC-0.001) ROUTE (MB-0.001, S-0.001, WC-0.002) |
Alpha (Calculate EMA) | 0.1, 0.3 0.4 | RIPE (MB-0.3, S-0.1, WC-0.4) ROUTE (MB-0.4, S-0.3, WC-0.4) |
Validation Split | 0.1, 0.2, 0.3 | RIPE (MB-0.2, S-0.1, WC-0.1) ROUTE (MB-0.3, S-0.1, WC-0.1) |
Dataset | Anomalies | Accuracy (%) | |
---|---|---|---|
LSTM | Autoencoder | ||
RIPE | Slammer | 49.00 | 88.60 |
RIPE | Moscow B/o | 51.00 | 92.82 |
RIPE | WannaCrypt | 52.00 | 50.97 |
Avg. Accuracy for RIPE | 50.66 | 77.46 | |
ROUTE | Slammer | 49.00 | 89.72 |
ROUTE | Moscow B/o | 49.00 | 97.97 |
ROUTE | WannaCrypt | 52.00 | 49.79 |
Avg. Accuracy for ROUTE | 50.00 | 79.16 |
Dataset | Anomalies | F1-Score (%) | |
---|---|---|---|
LSTM | Autoencoder | ||
RIPE | Slammer | 66.00 | 94.00 |
RIPE | Moscow B/o | 65.00 | 96.00 |
RIPE | WannaCrypt | 63.00 | 65.00 |
Avg. F1-Score for RIPE | 50.66 | 64.66 | |
ROUTE | Slammer | 66.00 | 94.00 |
ROUTE | Moscow B/o | 67.00 | 99.00 |
ROUTE | WannaCrypt | 65.00 | 66.00 |
Avg. F1-Score for ROUTE | 50.00 | 66.00 |
Dataset | Anomalies | Precision (%) | |
---|---|---|---|
LSTM | Autoencoder | ||
RIPE | Slammer | 49.00 | 88.75 |
RIPE | Moscow B/o | 48.00 | 96.79 |
RIPE | WannaCrypt | 52.00 | 50.53 |
Avg. Precision for RIPE | 50.66 | 49.66 | |
ROUTE | Slammer | 49.00 | 91.48 |
ROUTE | Moscow B/o | 49.00 | 98.14 |
ROUTE | WannaCrypt | 52.00 | 49.89 |
Avg. Precision for ROUTE | 50.00 | 50.00 |
Dataset | Anomalies | Recall (%) | |
---|---|---|---|
LSTM | Autoencoder | ||
RIPE | Slammer | 96.00 | 99.67 |
RIPE | Moscow B/o | 95.00 | 95.75 |
RIPE | WannaCrypt | 91.00 | 92.12 |
Avg. Recall for RIPE | 50.66 | 94.00 | |
ROUTE | Slammer | 99.00 | 97.37 |
ROUTE | Moscow B/o | 94.00 | 99.83 |
ROUTE | WannaCrypt | 96.00 | 97.73 |
Avg. Recall for ROUTE | 50.00 | 96.33 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Verma, R.D.; Keserwani, P.K.; Jain, V.K.; Govil, M.C.; Tilwari, V. Utilizing Duplicate Announcements for BGP Anomaly Detection. Telecom 2025, 6, 11. https://doi.org/10.3390/telecom6010011
Verma RD, Keserwani PK, Jain VK, Govil MC, Tilwari V. Utilizing Duplicate Announcements for BGP Anomaly Detection. Telecom. 2025; 6(1):11. https://doi.org/10.3390/telecom6010011
Chicago/Turabian StyleVerma, Rahul Deo, Pankaj Kumar Keserwani, Vinesh Kumar Jain, Mahesh Chandra Govil, and Valmik Tilwari. 2025. "Utilizing Duplicate Announcements for BGP Anomaly Detection" Telecom 6, no. 1: 11. https://doi.org/10.3390/telecom6010011
APA StyleVerma, R. D., Keserwani, P. K., Jain, V. K., Govil, M. C., & Tilwari, V. (2025). Utilizing Duplicate Announcements for BGP Anomaly Detection. Telecom, 6(1), 11. https://doi.org/10.3390/telecom6010011