Login / Signup
Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases.
Hussain Alshamrani
Bogdan V. Ghita
Published in:
DCNET (2016)
Keyphrases
</>
databases
detection method
database
information systems
detection algorithm
false alarms
object detection
data model
anomaly detection
relational databases
event detection
automatic detection
data sources
database applications
data integration
false positives
detection rate
data mining
detection accuracy