Papers and Presentations Utilizing RouteViews Data
See also our Web Resources below
The following table shows the abundance of network research that utilizes RouteViews data collected from different locations around the world. This collection of citations is incomplete. If you are aware of a paper in a peer-reviewed journal or conference presentation that’s not listed, please email us at help@route-views.org and we’ll add a citation.
Author | Date | Title | Source | Vol. | No. | pp. | Category | URL |
---|---|---|---|---|---|---|---|---|
M. Maier; J. Ullrich | 2022-08-17 | In the Loop: A Measurement Study of Persistent Routing Loops on the Ipv4/Ipv6 Internet | Social Science Research Network | Peer | ||||
H. Birge-Lee; J. Wanner; G. H. Cimaszewski; J. Kwon; L. Wang; F. Wirz; P. Mittal; A. Perrig; Y. Sun | 2022-08-10 | Creating a Secure Underlay for the Internet | 31st USENIX Security Symposium | Conference | ||||
J. Raynor; T. Crnovrsanin; S. Di Bartolomeo; L. South; D. Saffo; C. Dunne | 2022-08-03 | The State of the Art in BGP Visualization Tools: A Mapping of Visualization Techniques to Cyberattack Types | OSF Preprints | Peer | ||||
Y. Yoshinaka; J. Takemasa; Y. Koizumi; T. Hasegawaq | 2022-08-03 | Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch | 2022 IEEE 8th International Conference on Network Softwarization (NetSoft) | Conference Paper | ||||
A. Altaweel; R. Stoleru; G. Gu; A. K. Maity; S. Bhunia | 2022-07-24 | On Detecting Route Hijacking Attack in Opportunistic Mobile Networks | IEEE Transactions on Dependable and Secure Computing | Conference Paper | ||||
K. Z. Sediqi; L. Prehn; O. Gasser | 2022-07-20 | Hyper-specific prefixes: gotta enjoy the little things in interdomain routing | ACM SIGCOMM Computer Communication Review | 52 | 2 | 20-34 | Conference Paper | |
P. Cong; Y. Zhang; B. Liu; W. Wang; Z. Xiong; K. Xu | 2022-07-18 | A&B: AI and Block-Based TCAM Entries Replacement Scheme for Routers | IEEE Journal on Selected Areas in Communications | 40 | 9 | Conference Paper | ||
Z. Luo; J. Liu; G. Yang; Y. Zhang; Z. Hang | 2022-07-14 | High-Speed Path Probing Method for Large-Scale Network | Sensors | 22 | 15 | Peer | ||
B. Zhou; Y. Lv; J. Wang; J. Zhang; Q. Xuan | 2022-07-13 | Attacking the Core Structure of Complex Network | IEEE Transactions on Computational Social Systems | Conference Peer | ||||
P. Podili; S. R. Cherupally; S. Boga; K. Kataoka | 2022-07-02 | Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing | Journal of Network and Systems Management | Peer | ||||
M. Sosnowski; J. Zirngibl; P. Sattler; G. Carle; C. Gorhnfeldt; M. Russo; D. Sgandurra | 2022-06-27 | Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale | Cornell University | Peer | ||||
M. Syamkumar; Y. Gullapalli; W. Tang; P. Barford; J. Sommers | 2022-06-20 | BigBen: Telemetry Processing for Internet-wide Event Monitoring | IEEE Transactions on Network and Service Management | Conference | ||||
Q. Wang; Y. Tian; X. Yu; L. Ding; X. Zhang | 2022-06-13 | Where is the Traffic Going? a Comparative Study of Clouds Following Different Designs | IEEE Transactions on Services Computing | 1-12 | Conference Paper | |||
G. Baltra; H. Heidmann | 2022-06-11 | What Is The Internet? (Considering Partial Connectivity) | Cornell University | Peer | ||||
S. Zhuang; J. H. Wang; J. Wang; C. An; Y. Xu; T. Wu | 2022-06-09 | Predicting Unseen Links Using Learning-based Matrix Completion | NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
J. Li; V. Giotsas; Y. Wang; S. Zhou | 2022-05-24 | BGP-Multipath Routing in the Internet | IEEE Transactions on Network and Service Management ( Early Access ) | Peer | ||||
Q. Lone; A. Frik; M. Luckie; M. Korczynski; M. van Eeten; C. Ganan | 2022-05-22 | Deployment of Source Address Validation by Network Operators: A Randomized Control Trial | 2022 IEEE Symposium on Security and Privacy (SP) | Conference Paper | ||||
F. Vaca-Ramirez; T. P. Peixoto | 2022-05-18 | Systematic assessment of the quality of fit of the stochastic block model for empirical networks | Peer | |||||
L. Chuat; M. Legner; D. Basin; D. Hausheer; S. Hitz; P. Muller; A. Perrig | 2022-05-17 | Functional Properties and Scalability | The Complete Guide to SCION | 129-156 | Peer | |||
L. Chuat; M. Legner; D. Basin; D. Hausheer; S. Hitz; P. Muller; A. Perrig | 2022-05-17 | SCIONLAB Research Testbed | The Complete Guide to SCION | Peer | ||||
V. Padurean; O. Gasser; R. Bush; A. Feldmann | 2022-05-09 | SRv6: Is There Anybody Out There? | 7th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2022) | Conference Paper | ||||
Y. Li; H. Zou; Y. Chen; Y. Xu; Z. Ma; D. Ma; Y. Hu; G. Xie | 2022-05-02 | The Hanging ROA: A Secure and Scalable Encoding Scheme for Route Origin Authorization | Conference Paper | |||||
KC Claffy; D. Clark | 2022-05-01 | Challenges in Measuring the Internet for the Public Interest | Journal of Information Policy | Peer | ||||
S. Mustafa; P. K. Dey; M. Yuksel | 2022-04-25 | Peer Me Maybe?: A Data-Centric Approach to ISP Peer Selection | NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
B. Du; G. Akiwate; T. Krenc; C. Testart; A. Marder; B. Huffaker; A. C. Snoeren; KC Claffy | 2022-04-22 | IRR Hygiene in the RPKI Era | International Conference on Passive and Active Network Measurement (PAM 2022) | 321-337 | Conference | |||
T. Shapira; Y. Shavitt | 2022-04-22 | BGP2Vec: Unveiling the Latent Characteristics of Autonomous Systems | IEEE Transactions on Network and Service Management | Conference Paper | ||||
D. Saraswat; P. Bhattacharya; S. Bhavssar; H. Dave; K. Patel; S. Punjani; A. Verma; S. Tanwar | 2022-04-20 | Internet eXchange Points: A Systematic Case Study in Indian Context | Emerging Technologies for Computing, Communication and Smart Cities | 731-745 | Peer | |||
F. Douzet; L. Petiniaud; K. Salamatian; J. Samaan | 2022-04-15 | Digital Routes and Borders in the Middle-East: the geopolitical underpinnings of Internet Connectivity | SocArXiv Papers | Conference Paper | ||||
Z. Heszberger | 2022-04-15 | Hyperbolic trees for efficient routing computation | The Journal of Supercomputing | Peer | ||||
T. Ermakova; B. Fabian; D. A. Fradin; S. Gross | 2022-04-12 | A Framework for Internet Connectivity Risk Assessment Based on Graph Models | WI-IAT ’21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology | 576-581 | Conference Paper | |||
T. Shapira; Y. Shavitt | 2022-04-11 | AP2Vec: an Unsupervised Approach for BGP Hijacking Detection | IEEE Transactions on Network and Service Management | Peer | ||||
X. Shao; H. Pishro-Nik; L. Gao | 2022-04-09 | Path-Preserving Anonymization for Inter-domain Routing Policies | International Conference on Risks and Security of Internet and Systems (CRiSIS 2021) | 121-136 | Conference Paper | |||
A. Gamero-Garrido; E. Carisimo; S. Hao; B. Huffaker; A. C. Snoeren | 2022-03-22 | Quantifying Nations’ Exposure to Traffic Observation and Selective Tampering | International Conference on Passive and Active Network Measurement (PAM 2022) | 645-674 | Conference Paper | |||
E. Marechal; P. Merindol; B. Donnet | 2022-03-22 | ISP Probing Reduction with ANAXIMANDER | International Conference on Passive and Active Network Management (PAM 2020) | 441-469 | Conference Paper | |||
F. Mazzola; P. Marcos; I. Castro; M. Luckie; M. Barcellos | 2022-03-22 | On the Latency Impact of Remote Peering | International Conference on Passive and Active Network Measurement | Conference Paper | ||||
F. Zhang; C. Lu; B. Liu; H. Duan; Y. Liu | 2022-03-22 | Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study | International Conference on Passive and Active Network Measurement (PAM 2022) | 247-263 | Conference Paper | |||
J. Saxon; N. Feamster | 2022-03-22 | GPS-Based Geolocation of Consumer IP Addresses | International Conferfence on Passive and Active Network Measurement (PAM 2022) | 121-151 | Conference Paper | |||
L. Prehn; F. Lichtblau; C. Dietzel; A. Feldmann | 2022-03-22 | Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs Today | International Conference on Passive and Active Network Measurement (PAM 2022) | 338-366 | Conference Paper | |||
T. Wu; J. H. Wang; J. Wang; S. Zhuang | 2022-03-22 | RouteInfer: Inferring Interdomain Paths by Capturing ISP Routing Behavior Diversity and Generality | International Conference on Passive and Active Network Measurement (PAM 2022) | Conference Paper | ||||
Y. Nosyk; M. Norcynski; A. Duda | 2022-03-22 | Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks | International Conference on Passive and Active Network Measurement | 629-644 | Conference Paper | |||
A. H. Muosa; A. H. Ali | 2022-03-15 | Internet Routing Anomaly Detection Using LSTM Based Autoencoder | 2022 International Conference on Computer Science and Software Engineering (CSASE) | Conference Paper | ||||
N. H. Hammood; B. Al-Musawi; A. H. Alhilali | 2022-03-11 | A Survey of BGP Anomoly Detection Using Machine Learning Technique | Communications in Computer and Information Science | 1554 | Peer | |||
P. Kumar; R. Dohare | 2022-03-11 | An interaction-based method for detecting overlapping community structure in real-world networks | International Journal of Data Science and Analytics | 14 | 27-44 | Conference Paper | ||
M. Gouel; K. Vermeulen; M. Mouchet; J. P. Rohrer; O. Fourmaux; T. Friedman | 2022-03-01 | Zeph & Iris map the internet: A resilient reinforcement learning approach to distributed IP route tracing | ACM SIGCOMM Computer Communication Review | 52 | 1 | 2-9 | Conference | |
P. Gill; C. Diot; L. Y. Ohlsen; M. Mathis; S. Soltesz | 2022-03-01 | M-Lab: user initiated internet data for the research community | ACM SIGCOMM Computer Communication Review | 52 | 1 | 34-37 | Conference Paper | |
B. A. Silva; P. Mol; O. Fonseca; I. Cunha; R. A. Ferreira; E. Katz-BaSSETT | 2022-02-28 | Automatic Inference of BGP Location Communities | Proceedings of the ACM on Measurement and Analysis of Computing Systems | 6 | 1 | Peer | ||
R. Kientega; M. H. Sidibe; T. Traore | 2022-02-21 | Toward an Enhanced Tool for Internet Exchange Point Detection | 2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC) | Conference Paper | ||||
T. V. Doan; R. van Rijswijk-Deij; O. Hohlfeld; V. Bajpai | 2022-02-12 | An Empirical View on Consolidation of the Web | ACM Transactions on Internet Technology | 22 | 3 | 1-30 | Conference Paper | |
T. Yang; B. Hou; Z. Cai; K. Wu; T. Zhou; C. Wang | 2022-02-11 | 6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning | Computer Networks | Peer | ||||
Q. Li; Y. Wu; J. Duan; J. Yang; Y. Jiang | 2022-02-10 | Weighted NSFIB Aggregation With Generalized Next Hop of Strict Partial Order | IEEE Transactions on Network and Service Management | 19 | 2 | 890-904 | Conference Paper | |
M. Bother; O. Kißig; M. Taraz; S. Cohen; K. Seidel; T. Friedrich | 2022-01-25 | What’s Wrong with Deep Learning in Tree Search for Combinatorial Optimization | Cornell University | Peer | ||||
K. G. Leyba; J. J. Daymude; J. Young; M. E. J. Newman; J. Rexford; S. Forrest | 2022-01-18 | Cutting Through the Noise to Infer Autonomous System Topology | Cornell University | Peer | ||||
S. Talaga; A. Nowak | 2022-01-18 | Measuring Structural Complementarity and Similarity in Networks | University of Warsaw | Peer | ||||
M. Zeng; X. Huang; P. Zhang; D. Li | 2022-01-15 | Understanding the impact of outsourcing mitigation against BGP prefix hijacking | Computer Networks | 202 | Peer | |||
J. Chen; Y. Liu; S. Chen; X. Shi | 2022-01-01 | Research on the derivation of AS hidden links and the Discovery of Critical AS | 2022 IEEE 47th Conference on Local Computer Networks (LCN) | 267-270 | Conference Paper | |||
J. S. Kabala | 2022-01-01 | Understanding the Internet AS Topology and its applications | Iowa State | Peer | ||||
L. Schumann; T. V. Doan; T. Shreedhar; R. Mok; V. Bajpai | 2022-01-01 | Impact of Evolving Protocols and COVID-19 on Internet Traffic Shares | Cornell University | Peer | ||||
MD. I. Islam | 2022-01-01 | An IPv6 Routing Table Lookup Algorithm in Software and ASIC by Designing a High-Level Synthesis System | Kent State University | Conference Paper | ||||
U. Naseer; T. A. Benson | 2022-01-01 | Configanator: A Data-driven Approach to Improving CDN Performance | NSDI ’22 | Conference Paper | ||||
S. Higuchi; Y. Koizumi; J. Takemasa; A. Tagami; T. Hasegawa | 2021-12-28 | Learned FIB: Fast IP Forwarding without Longest Prefix Matching | 2021 IEEE 29th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
T. P. Tran; V. C. Nguyen; L. Vu; Q. U. Nguyen | 2021-12-21 | DeepInsight-Convolutional Neural Network for Intrusion Detection Systems | 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) | Conference Paper | ||||
K. Xu | 2021-12-16 | Graphical Modeling of Network Traffic | Network Behavior Analysis | 46-49 | Peer | |||
K. Xu | 2021-12-16 | Background of Network Behavior Analysis | Network Behavior Analysis | 7-19 | Peer | |||
K. Xu | 2021-12-16 | Research Frontiers of Network Behavior Analysis | Network Behavior Analysis | 119-163 | Peer | |||
T. Garrett; L. C. E. Bona; E. P. Duarte Jr. | 2021-12-09 | A Holistic Approach for Locating Traffic Differentiation in the Internet | Computer Networks | Peer | ||||
K. Ueda; A. Tagami | 2021-12-07 | Internet flattening and consolidation considered useful (for deploying new Internet architecture) | IWCI’21: Proceedings of the Interdisciplinary Workshop on (de) Centralization in the Internet | Conference Paper | ||||
M. Nawrocki; M. Koch; T. C. Schmidt; M. Wahlisch | 2021-12-03 | Transparent forwarders: an unnoticed component of the open DNS infrastructure | CoNEXT ’21: Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies | Conference Paper | ||||
S. Aktar; A. Y. Nur | 2021-12-03 | Hash Based AS Traceback against DoS Attack | 2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet) | Conference Paper | ||||
S. Zhuang; J. H. Wang; J. Wang; Z. Pan; T. Wu; F. Li; Z. Zhang | 2021-12-03 | Discovering obscure looking glass sites on the web to facilitate internet measurement research | CoNEXT ’21: Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies | 426-439 | Conference Paper | |||
T. Holterbach | 2021-12-03 | A Framework To Fast Reroute Traffic Upon Remote Outages | TIK Schriftenreihe | Peer | ||||
A. Y. Nur | 2021-11-25 | Efficient Probabilistic Packet Marking for AS Traceback | 2021 International Symposium on Networks, Computers and Communications (ISNCC) | Conference Paper | ||||
T. B. Paiva; Y. Siqueira; D. M. Batista; R. Hirata; R. Terada | 2021-11-17 | BGP Anomalies Classification using Features based on AS Relationship Graphs | 2021 IEEE Latin-American Conference on Communications (LATINCOM) | Conference Paper | ||||
M. Brandt; H. Shulman; M. Waidner | 2021-11-13 | Evaluating Resilience of Domains in PKI | CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security | 2444-2446 | Conference Paper | |||
T. Dai; H. Shulman; M. Waidner | 2021-11-13 | Let’s Downgrade Let’s Encrypt | CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security | 1421-1440 | Conference Paper | |||
A. Y. Nur | 2021-11-02 | Analysis of Autonomous System Level Internet Topology Graphs and Multigraphs | 2021 International Symposium on Networks, Computers and Communications (ISNCC) | Conference Paper | ||||
E. Carisimo; A. Gamero-Garrido; A. C. Snoeren; A. Dainotti | 2021-11-02 | Identifying ASes of state-owned internet operators | IMC ’21: Proceedings of the 21st ACM Internet Measurement Conference | 687-702 | Conference Paper | |||
E. N. Nemmi; F. Sassi; M. La Morgia; C. Testart; A. Mei; A. Dainotti | 2021-11-02 | The parallel lives of autonomous systems: ASN allocations vs. BGP | IMC ’21: Proceedings of the 21st ACM Internet Measurement Conference | 593-611 | Conference Paper | |||
E. Rye; R. Beverly; KC Claffy | 2021-11-02 | Follow the scent: defeating IPv6 prefix rotation privacy | IMC ’21: Proceedings of the 21st ACM Internet Measurement Conference | 739-752 | Conference Paper | |||
T. Krenc; R. Beverly, G. Smaragdakis | 2021-11-02 | AS-level BGP community usage classification | Proceedings of the 21st ACM Internet Measurement Conference (IMC ’21) | Conference Paper | ||||
C. Mayr; C. Risso; E. Grampin | 2021-11-01 | Crafting optimal and resilient iBGP-IP/MPLS overlays for transit backbone networks | Optical Switching and Networking | 42 | Peer | |||
Y. Dong; Q. Li; R. O. Sinnot; Y. Jiang; S. Xia | 2021-11-01 | ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning | 2021 IEEE 29th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
R. Houser; S. Hao; Z. Li; D. Liu; C. Cotton; H. Wang | 2021-10-20 | A Comprehensive Measurement-based Investigation of DNS Hijacking | 2021 40th International Symposium on Reliable Distributed Systems (SRDS) | Conference Paper | ||||
K. Bekshentayeva; L. Trajkovic | 2021-10-17 | Detection of Denial of Service Attacks Using Echo State Networks | 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC) | Conference Paper | ||||
M. Harayama; T. Kudoh | 2021-10-08 | Detection of Hypergiants in AS-Level Topology Using Machine Learning | 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS) | Conference Paper | ||||
J. Krupp; C. Rossow | 2021-10-06 | BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks | 2021 IEEE European Symposium on Security and Privacy (EuroS&P) | Conference Paper | ||||
M. Vermeer; J. West; A. Cuevas; S. Niu; N. Christin; M. Van Eeten; T. Fiebig; C. Ganan; T. Moore | 2021-10-06 | SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations | 2021 IEEE European Symposium on Security and Privacy (EuroS&P) | Conference Paper | ||||
K. Hoarau; P. U. Tournoux; T. Razafindralambo | 2021-10-04 | Suitability of Graph Representation for BGP Anomaly Detection | 2021 IEEE 46th Conference on Local Computer Networks (LCN) | Conference Paper | ||||
H. Shulman; S. Zhao | 2021-10-02 | Machine Learning Analysis of IP ID Applications | 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S) | Conference Paper | ||||
T. Shapira; Y. Shavitt | 2021-10-01 | SASA: Source-Aware Self-Attention for IP Hijack Detection | IEEE/ACM Transactions on Networking | 30 | 1 | Peer | ||
S. Dhuli; S. Kouachi; A. Chhabra; Y. N. Singh | 2021-09-29 | Network Robustness Analysis for IoT Networks Using Regular Graphs | IEEE Internet of Things Journal | 9 | 11 | 8809-8819 | Conference Paper | |
T. Witono; S. Yazid | 2021-09-24 | A Review of Internet Topology Research at the Autonomous System Level | Proceedings of Sixth International Congress on Information and Communication Technology | 581-598 | Conference Paper | |||
A. Sarabi; K. Jin; M. Liu | 2021-09-21 | Smart Internet Probing: Scanning Using Adaptive Machine Learning | Game Theory and Machine Learning for Cyber Security | Peer | ||||
Y. Wang; M. Xu | 2021-09-14 | Observing BGP route poisoning in the wild | SIGCOMM ’20: Proceedings of the SIGCOMM ’20 Poster and Demo Sessions | 94-96 | Conference Paper | |||
N. Zincir-Heywood; M. Mellia; Y. Diao | 2021-09-03 | Overview of Network and Service Management | Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning | Peer | ||||
T. Pacheco; C. Andrea | 2021-09-01 | Towards Data-Driven Internet Routing Security | Massachusetts Insititute of Technology: Department of Electrical Engineering and Computer Science | Peer | ||||
. Milolidakis; T. Buhler; M. Chiesa | 2021-08-23 | Smart BGP Hijacks that Evade Public Route Collectors | 2021 Special Interest Data Group on Data Communications Conference (SIGCOMM ’21) | Conference Paper | ||||
B. Gui; F. Lan; A. Wang | 2021-08-23 | Sarasate: a strong representation system for networking policies | SIGCOMM ’21: Proceedings of the SIGCOMM ’21 Poster and Demo Sessions | 62-64 | Conference Paper | |||
E. Huff; A. Gember-Jacobson | 2021-08-23 | Divesting in Socially (Ir)responsible Internet Service Providers | TAURIN’21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet | Conference Paper | ||||
N. Rodday; L. Kaltenbach; I. Cunha; R. Bush; E. Katz-Bassett; G. D. Rodosek; T. C. Schmidt; M. Wahlisch | 2021-08-23 | On the Deployment of Default Routes in Inter-domain Routing | TAURIN’21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet | 14-20 | Conference Paper | |||
R. Padmanabhan; A. Filasto; M. Xynou; R. S. Raman; K. Middleton; M. Zhang; D. Madory; M. Roberts; A. Dainotti | 2021-08-23 | A multi-perspective view of Internet censorship in Myanmar | FOCI ’21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet | 27-36 | Conference Paper | |||
L. Salamatian; F. Douzet; K. Salamatian; K. Limonier | 2021-08-17 | The geopolitics behind the routes data travel: a case study of Iran | Journal of Cybersecurity | 7 | 1 | Peer | ||
T. Tran; A. Shenoi; M. S. Kang | 2021-08-13 | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin | 30th USENIX Security Symposium | Conference Paper | ||||
T. Dai; P. Jeitner; H. Shulman; M. Waidner | 2021-08-09 | From IP to transport and beyond: cross-layer attacks against applications | SIGCOMM ’21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference | 836-849 | Conference Paper | |||
S. Scherrer; M. Legner; A. Perrig; S. Schmid | 2021-08-06 | Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures | 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | Conference Paper | ||||
C. G. Barrineau | 2021-08-01 | Tarn: Towards a Traffic Analysis Resistant Network | Clemson University | Peer | ||||
I. Piesessa; B. Soewito | 2021-08-01 | Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE | International Journal of Communication Networks and Information Security (IJCNIS) | Peer | ||||
M. Kallitsis; V. Hovavar; R. Prajapati; D. Wu; J. Yen | 2021-07-29 | Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes | Cornell University | Peer | ||||
L. Ziman | 2021-07-28 | Collaborative Filtering Method of Web Service Recommendation Based on Location Aware and Personalized | Converter Magazine | Peer | ||||
S. Peng; X. Shu; Z. Ruan; Z. Huang; Q. Xuan | 2021-07-28 | Inferring Multiple Relationships between ASes using Graph Convolutional Network | Cornell University | Peer | ||||
C. Jung; S. Kim; I. Yeom; H. Woo; Y. Kim | 2021-07-26 | GPU-Ether: GPU-native Packet I/O for GPU Applications on Commodity Ethernet | IEEE INFOCOM 2021 – IEEE Conference on Computer Communications | Conference | ||||
Y. Urimoto; D. Kotani; Y. Okabe | 2021-07-12 | Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet | 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC) | Conference Paper | ||||
K. Subramani; R. Perdisci; M. Konte | 2021-07-09 | Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs | International Conference on Detection of Instrusion and Malware, and Vulnerability Assessment (DIMVA 2021) | 42-67 | Conference Paper | |||
N. H. Hammood; B. Al-Musawi | 2021-07-04 | Using BGP Features Towards Identifying Type of BGP Anomaly | 2021 International Congress of Advanced Technology and Engineering (ICOTEN) | Conference Paper | ||||
R. Singh; D. Tench; P. Gill; A. McGregor | 2021-07-04 | PredictRoute: A Network Path Prediction Toolkit | Proceedings of the ACM on Measurement and Analysis of Computing Systems | 5 | 2 | 1-24 | Conference Paper | |
A. Ulmer; D. Sessler; J. Kohlhammer | 2021-06-29 | ProBGP: Progressive Visual Analytics of Live BGP Updates | Computer Graphics Forum | 40 | 37-48 | Peer | ||
P. Sermpezis; V. Kotronis; K. Arakadakis; A. Vakali | 2021-06-21 | Estimating the Impact of BGP Prefix Hijacking | 2021 IFIP Networking Conference (IFIP Networking) | Conference Paper | ||||
Y. Zhao; Y. Liu; X. Guo; Z. Sui | 2021-06-21 | Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier | ICMLC 2021: 2021 13th International Conference on Machine Learning and Computing | 217-222 | Conference Paper | |||
MD. I. Islam; J. I. Khan | 2021-06-15 | CP-Trie: Cumulative PopCount based Trie for IPv6 Routing Table Lookup in Software and ASIC | 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR) | Conference Paper | ||||
K. Hoarau; P. U. Tournoux; T. Razafindralambo | 2021-06-14 | BML: An Efficient and Versatile Tool for BGP Dataset Collection | 2021 IEEE International Conference on Communications Workshops (ICC Workshops) | Conference Paper | ||||
A. Y. Nur | 2021-06-09 | Combating DDoS Attacks with Fair Rate Throttling | 2021 IEEE International Systems Conference (SysCon) | Conference Paper | ||||
A. Y. Nur; M. E. Tozal | 2021-06-09 | Single Packet AS Traceback against DoS Attacks | 2021 IEEE International Systems Conference (SysCon) | Conference Paper | ||||
S. Wen; D. Qin; T. Lv; L. Ge | 2021-06-06 | An Experimental Study on the Core Autonomous System of Internet | WABD 2021: 2021 Workshop on Algorithm and Big Data | 74-78 | Conference Paper | |||
D. Kim; V. Andalibi; J. Camp | 2021-05-27 | Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things | 2021 IEEE Security and Privacy Workshops (SPW) | Conference Paper | ||||
S. Higuchi; J. Takemasa; Y. Koizumi; A. Tagami; T. Hasegawa | 2021-05-19 | Feasibility of Longest Prefix Matching using Learned Index Structures | ACM SIGMETRICS Performance Evaluation Review | 48 | 4 | 45-48 | Conference Paper | |
H. Zou; D. Ma; Q. Shao; W. Mao | 2021-05-17 | The Horizontal INR Conflict-Detection Algorithm: Revealing INR Reallocation and Reauthorization in RPKI | 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM) | Conference Paper | ||||
L. Ariemma; M. Scazzariello; T. Caiazzi | 2021-05-17 | MRT#: a Fast Multi-Threaded MRT Parser | 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM) | Conference Paper | ||||
Z. Li; A. L. G. Rios; L. Trajkovic | 2021-05-13 | Machine Learning for Detecting Anomalies and Intrusions in Communication Networks | IEEE Journal on Selected Areas in Communications | 39 | 7 | 2254-2264 | Peer | |
M. Brandt; H. Shulman | 2021-05-10 | Optimized BGP Simulator for Evaluation of Internet Hijacks | IEEE INFOCOM 2021 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
M. Zeng; H. Li; J. Lai; X. Huang | 2021-05-07 | A BGP Hijacking Detection Method based on Multi-dimensional Historical Data Analysis | 2021 International Conference on Computer Communication and Artificial Intelligence (CCAI) | Conference Paper | ||||
K. Limonier; F. Douzet; L. Petiniaud; L. Salamatian; K. Salamatian | 2021-05-03 | Mapping the routes of the Internet for geopolitics: The case of Eastern Ukraine | First Monday | 26 | 5 | Peer | ||
H. Bing; S. Hao; Z. Fangwei; Z. Shuai; Q. Tao; Y. Changjiang | 2021-04-09 | Application process of machine learning in cyberspace security | 2021 6th International Conference on Intelligent Computing and Signal Processing (ICSP) | Conference | ||||
P. Moriano; R. Hill; L. J. Camp | 2021-04-07 | Using bursty announcements for detecting BGP routing anomalies | Computer Networks | 188 | Peer | |||
X. Yang; J. Cao; M. Xu | 2021-04-05 | SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags | 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) | Conference Paper | ||||
A. Maghsoudlou; O. Gasser; A. Feldmann | 2021-03-30 | Zeroing in on Port 0 Traffic in the Wild | International Conference on Passive and Active Network Measurement (PAM 2021) | 547-563 | Conference Paper | |||
J. Kristoff; M. Ghasemisharif; C. Kanich; J. Polakis | 2021-03-30 | Plight at the End of the Tunnel | International Conference on Passive and Active Network Measurement (PAM 2022) | 390-405 | Conference Paper | |||
KC Claffy; A. C. Snoeren | 2021-03-30 | Inferring Cloud Interconnections: Validation, Geolocation, and Routing Behavior | International Conference on Passive and Active Network Measurement (PAM 2021) | 230-246 | Conference Paper | |||
L. Ariemma; S. Liotta; M. Candela; G. D. Battista | 2021-03-30 | Long-Lasting Sequences of BGP Updates | International Conference on Passive and Active Network Measurement (PAM 2021) | Conference Paper | ||||
S. Liu; P. Schmitt; F. Bronzino; N. Feamster | 2021-03-30 | Characterizing Service Provider Response to the COVID-19 Pandemic in the United States | International Conference on Passive and Active Network Measurement (PAM 2021) | 20-38 | Conference Paper | |||
V. G. Li; G. Akiwate; K. Levechenko; G. M. Voelker; S. Savage | 2021-03-30 | Clairvoyance: Inferring Blocklist Use on the Internet | International Conference on Passive and Active Network Measurement (PAM 2021) | 57-75 | Conference Paper | |||
Y. Zeng; X. Chen; T. Zang | 2021-03-30 | Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names | International Conference on Passive and Active Measurement (PAM 2021) | 93-107 | Conference Paper | |||
R. Zhuo; B. Huffaker; KC Claffy; S. Greenstein | 2021-03-01 | The impact of the General Data Protection Regulation on internet interconnection | Telecommunications Policy | 45 | 2 | Peer | ||
Y. Jaepil; O. Haengrok; K. Jiwon; S. Dongkyoo; | 2021-02-28 | Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness | KSII Transactions on Internet and Information Systems (TIIS) | 15 | 2 | 749-766 | Peer | |
J. M. Del Fiore; V. Persico; P. Merindol; C. Pelsser; A. Pescape | 2021-02-25 | The Art of Detecting Forwarding Detours | IEEE Transactions on Network and Service Management | 18 | 3 | Conference Paper | ||
O. Fonseca; I. Cunha; E. Fazzion; B. Junior; R. A. Ferreira; E. Katz-Bassett | 2021-02-23 | Identifying Networks Vulnerable to IP Spoofing | IEEE Transactions on Network and Service Management | 18 | 3 | 3170-3183 | Peer | |
A. Kountouras; P. Kintis; A. Avegetidis; T. Papastergiou; C. Lever; Polychronakis; M. Antonakakis | 2021-02-21 | Understanding the Growth and Security Considerations of ECS | Network and Distributed System Security Symposium (NDSS) | Conference Paper | ||||
A. Ficara; G. Fiumara; P. De Meo; A. Liotta | 2021-02-19 | Correlations Among Game of Thieves and Other Centrality Measures in Complex Networks | Data Science and Internet of Things | Peer | ||||
X. Song; J. Heidemann | 2021-02-15 | Measuring the Internet during Covid-19 to Evaluate Work-from-Home | Cornell University | Peer | ||||
A. Saverimoutou | 2021-02-03 | Future internet metrology : characterization, quantification and prediction of web browsing quality | HAL Open Science | Conference Paper | ||||
S. Aghaalizadeh; S. T. Afshord; A. Bouyer; B. Anari | 2021-02-01 | A three-stage algorithm for local community detection based on the high node importance ranking in social networks | Physica A: Statistical Mechanics and its Applications | 563 | Conference Paper | |||
I. A. Gillani; A. Bagchi; S. Ranu | 2021-01-02 | A Group-to-Group Version of Random Walk Betweenness Centrality | CODS COMAD 2021: 8th ACM IKDD CODS and 26th COMAD | Conference Paper | ||||
H. K. Takhar | 2020-12-21 | Machine Learning Techniques for Detecting BGP Anomalies | Simon Fraser University | Master Thesis | ||||
C. Testart; D. D. Clark | 2020-12-17 | A Data-Driven Approach to Understanding the State of Internet Routing Security | TPRC48: The 48th Research Conference on Communication, Information, and Internet Policy | Conference Paper | ||||
F. Brenner; O. Mendizabal; P. Marcos | 2020-12-11 | Which one should I pick?: Helping operators choosing their inbound traffic engineering techniques | CoNEXT’20: Proceedings of the Student Workshop | 7-8 | Conference | |||
L. Muller; M. Luckie; B. Huffaker; KC Claffy; M. Barcellos | 2020-12-09 | Spoofed traffic inference at IXPs: Challenges, methods and analysis | Computer Networks | 182 | Peer | |||
T. Burns | 2020-12-09 | Network Reconnaissance in IPv6-based Residential Broadband Networks | Cornell University | Peer | ||||
N. Rodday; R. van Baaren; L. Hendricks; R. van Rijswijk-Deij; A. Pras; G. Dreo | 2020-11-24 | Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies | CoNEXT ’20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies | Conference Paper | ||||
R. Padmanabhan; J. P. Rula; P. Ritcher; S. D. Strowes; A. Dainotti | 2020-11-24 | DynamIPs: analyzing address assignment practices in IPv4 and IPv6 | CoNEXT ’20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies | 55-70 | Conference Paper | |||
T. Krenc; R. Beverly, G. Smaragdakis | 2020-11-24 | Keep your communities clean; exploring the routing message impact of BGP communities | Proceedings of the 16th International Conference on emerging Networking Experiments and Technologies (CoNEXT ’20) | 433-50 | Conference Paper | |||
A. Putina; D. Rossi | 2020-11-10 | Online Anomaly Detection Leveraging Stream-Based Clustering and Real-Time Telemetry | IEEE Transactions on Network and Service Management | 18 | 1 | Conference Paper | ||
G. Zhang; M. Xu; J. Li | 2020-11-06 | NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security Enhancement | 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) | Conference Paper | ||||
M. Kwon; K. P. Neupane; J. Marshall; M. M. Rafique | 2020-11-02 | CuVPP: Filter-based Longest Prefix Matching in Software Data Planes | 2020 IEEE International Conference on Cluster Computing (CLUSTER) | Conference Paper | ||||
R. Copstein; N. Zincir-Heywood | 2020-11-02 | Temporal Representations for Detecting BGP Blackjack Attacks | 2020 16th International Conference on Network and Service Management (CNSM) | Conference Paper | ||||
C. Gray; C. Mosig; R. Bush; C. Pelsser; M. Roughan; T. C. Schmidt; M. Wahlisch | 2020-10-27 | BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping | IMC ’20: Proceedings of the ACM Internet Measurement Conference | 492-505 | Conference Paper | |||
P. Marcos; L. Prehn; L. Leal; A. Dainotti; A. Feldmann; M. Barcellos | 2020-10-27 | AS-Path Prepending: there is no rose without a thorn | IMC ’20: Proceedings of the ACM Internet Measurement Conference | 506-520 | Conference Paper | |||
T. Arnold; J. He; W. Jiang; M. Calder; I. Cunha; V. Giotsas; E. Katz-Bassett | 2020-10-27 | Cloud Provider Connectivity in the Flat Internet | IMC ’20: Proceedings of the ACM Internet Measurement Conference | 230-246 | Conference Paper | |||
V. Giotsas; T. Koch; E. Fazzion; I. Cunha; M. Calder; H. V. Madhyastha; E. Katz-Basset | 2020-10-27 | Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes | IMC ’20: Proceedings of the ACM Internet Measurement Conference | 247-265 | Conference Paper | |||
Z. Jin; X. Shi; Y. Yang; X. Yin; Z. Wang; J. wu | 2020-10-27 | TopoScope: Recover AS Relationships From Fragmentary Observations | IMC ’20: Proceedings of the ACM Internet Measurement Conference | 266-280 | Conference Paper | |||
S. A. E. Monem; A. Khalafallah; S. I. Shaheen | 2020-10-24 | BGP Route Leaks Detection Using Supervised Machine Learning Technique | 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES) | Conference Paper | ||||
X. Li; Z. Cai; B. Hou; N. Liu; F. Liu; J. Cheng | 2020-10-24 | ProbInfer: Probability-based AS path inference from multigraph perspective | Computer Networks | 180 | Peer | |||
V. Giotsas; G. Nomikos; V. Kotronis; P. Sermpezis; P. Gigis; L. Manassakis; C. Dietzel; S. Konstantaras; X. Dimitropoulos | 2020-10-23 | O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs | IEEE/ACM Transactions on Networking | Peer | ||||
J. Kwon; J. A. Garcia-Pardo; M. Legner; F. Wirz; M. Frei; D. Hausheer; A. Perrig | 2020-10-13 | SCIONLAB: A Next-Generation Internet Testbed | 2020 IEEE 28th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
Z. Li; A. L. G. Rios; L. Trajkovic | 2020-10-11 | Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks | 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC) | Conference Paper | ||||
I. Voitalov | 2020-10-06 | Theory and Applications of Latent Network Geometry | Northeastern University | Peer | ||||
D. Sisodia; J. Li; Lei J | 2020-10-05 | In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection | ASIA CCS ’20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security | 153-164 | Conference Paper | |||
T. Garrett; L. C. E. Bona; E. P. Duarte | 2020-10-02 | Exploiting AS-level Routing Properties to Locate Traffic Differentiation in the Internet | 2020 IEEE Symposium on Computers and Communications (ISCC) | Conference Paper | ||||
A. Ishida; M. Harayama | 2020-10-01 | A Trial for Detection of Change in AS Operation Policies by Use of Machine Learning | 2020 35th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) | Conference Paper | ||||
J. Zhang; J. Zhang; X. Xiong; Y. Wang | 2020-09-25 | Optimal valid path prediction method for inter-domain networks considering commercial relationships* | Science and Artificial Intelligence (CISAI 2020) | Conference Paper | ||||
Y. Wan; K. Xu; F. Wang; G. Xue | 2020-09-25 | Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks | IEEE Transactions on Network Science and Engineering | 8 | 1 | Conference Paper | ||
K. Claffy; M. Luckie | 2020-09-21 | Augment Spoofer Project to Improve Remediation Efforts (ASPIRE) | Peer | |||||
T. Shapira; Y. Shavitt | 2020-08-10 | A Deep Learning Approach for IP Hijack Detection Based on ASN Embedding | Proceedings of the Workshop on Network Meets AI & ML (NetAI ’20) | 35-41 | Conference Paper | |||
O. F. Ozarslan; K. Sarac | 2020-08-03 | ZIDX: A Generic Framework for Random Access to BGP Records in Compressed MRT Datasets | 2020 29th International Conference on Computer Communications and Networks (ICCCN) | Conference Paper | ||||
T. Matcharashvili; A. Elmokashfi; A. Prangishvili | 2020-08-01 | Analysis of the regularity of the Internet Interdomain Routing dynamics | Physica A: Statistical Mechanics and its Applications | 551 | Peer | |||
Y. Li; W. Yu; Z. Li; Z. Yang | 2020-08-01 | Research on the evolution of global internet network interconnection relationship in 21 years | China Communications | 17 | 8 | Peer | ||
I. Livadariu; A. Elmokashfi; A. Dhamdhere | 2020-07-17 | An agent-based model of IPv6 adoption | 2020 IFIP Networking Conference (Networking) | Conference Paper | ||||
R. Fontugne; K. Ermoshina; E. Aben | 2020-07-17 | The Internet in Crimea: a Case Study on Routing Interregnum | 2020 IFP Networking Conference (Networking) | Conference | ||||
K. Vermeulen | 2020-07-16 | lmproved algorithms for capturing Internet maps | HAL Open Science | Peer | ||||
A. Marder; M. Luckie; B. Huffaker; KC Claffy | 2020-07-09 | vrfinder: Finding Outbound Addresses in Traceroute | Proceedings of the ACM on Measurement and Analysis of Computing Systems | 4 | 2 | 1-28 | Conference Paper | |
Q. Wang; S. M. Miller; R. H. Deng | 2020-07-09 | Driving Cybersecurity Policy Insights From Information on the Internet | IEEE Security & Privacy | 18 | 6 | 42-50 | Conference Paper | |
Y. Yang; X. Shi; X. Yin; Z. Wang; X. Zhou | 2020-07-07 | The Understanding and Forecast of AS-Level Anycast Path Inflation | 2020 IEEE Symposium on Computers and Communications (ISCC) | Conference Paper | ||||
Z. Keifer | 2020-07-03 | Routing Data as a Measure of Internet Access | University of Oregon | Peer | ||||
K. Xu; Y. Wan; G. Xue; F. Wang | 2020-06-24 | Multidimensional Behavioral Profiling of Internet-of-Things in Edge Networks | 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS) | Conference Paper | ||||
G. Grigoryan; Y. Liu; M. Kwon | 2020-06-23 | Boosting FIB Caching Performance with Aggregation | HPDC ’20: Proceedings of the 29th International Symposium on High-Performance Parallel and Distributed Computing | 221-232 | Conference Paper | |||
K. Subramani; R. Perdisci; M. Konte | 2020-06-22 | IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points | Cornell University | Peer | ||||
M. Trevisan; F. Soro; M. Mellia; I. Drago; R. Morla | 2020-06-22 | Does domain name encryption increase users’ privacy? | ACM SIGCOMM Computer Communication Review | 40 | 3 | 16-22 | Conference Paper | |
T. Matcharashvili; A. Prangishvili | 2020-06-12 | Quantifying regularity of the Internet Interdomain Routing based on Border Gateway Protocol (BGP) data bases | Conference Paper | |||||
S. Goldberg | 2020-06-10 | Anatomy of Multipath BGP Deployment in a Large ISP Network | 4th Network Traffic Measurement and Analysis Conference (TMA 2020) | 12 | 8 | 20-33 | Conference Paper | |
A. Y. Nur | 2020-06-09 | K-Shell Decomposition of AS Level Multigraphs | 2021 IEEE International Systems Conference (SysCon) | Conference Paper | ||||
M. Korczynski; Y. Nosyk; Q. Lone; M. Skwarek; B. Jonglez; A. Duda | 2020-06-09 | The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic | Cornell University | Peer | ||||
W. B. De Vries; S. Aljammaz; R. van Rijswijk-Deij | 2020-06-08 | Global-Scale Anycast Network Management with Verfploeter | NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
B. Al-Musawi; M. F. Hassan; S. M. Alturfi | 2020-06-01 | RDTD: A tool for detecting internet routing disruptions at AS-level | Journal of Telecommunications and the Digital Economy | 18-30 | Peer | |||
F. Douzet; L. Petiniaud; L. Salamatian; K. Limonier; Kave Salamatian | 2020-05-26 | Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis | Conference Paper | |||||
M. Tran; I. Choi; G. J. Moon; A. V. Vu; M. S. Kang | 2020-05-18 | A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network | 2020 IEEE Symposium on Security and Privacy (SP) | Conference Paper | ||||
Z. Zheng; X. Li; M. Tang; F. Xie; M. R. Lyu | 2020-05-18 | Web Service QoS Prediction via Collaborative Filtering: A Survey | IEEE Transactions on Services Computing | 15 | 4 | 2455-2474 | Conference Paper | |
Y. Wu; R. Wang; X. Xu | 2020-05-15 | A Certificate Pin BGP Protocol: CP-BGP | 2020 5th International Conference on Computer and Communication Systems (ICCCS) | Conference Paper | ||||
J. Gedeon; S. Zengerle; S. Alles; F. Brandherm; M. Muhlhauser | 2020-05-11 | Sunstone: Navigating the Way Through the Fog | 2020 IEEE 4th International Conference on Fog and Edge Computing (ICFEC) | Conference Paper | ||||
M. Candela; G. Di Battista; L. Marzialetti | 2020-05-01 | Multi-view routing visualization for the identification of BGP issues | Journal of Computer Languages | 58 | Peer | |||
E. Gujral; R. Pasricha; E. Papalexakis | 2020-04-20 | Beyond Rank-1: Discovering Rich Community Structure in Multi-Aspect Graphs | WWW ’20: Proceedings of The Web Conference 2020 | 452-462 | Conference Paper | |||
M. Jonker; A. Sperotto; A. Pras | 2020-04-20 | DDoS Mitigation: A Measurement-Based Approach | NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
N. Hart; C. Rostos; V. Giotsas; N. Race; D. Hutchison | 2020-04-20 | _BGP: Rethinking BGP programmability | NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
S. S. Tomar; A. Rawat; P. D. Vyavahare; S. Tokekar | 2020-04-18 | Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profiles | International Journal of Information Technology | 12 | 1171-1182 | Peer | ||
S. Kerrache; R. Alharbi; H. Benhidour | 2020-04-14 | A Scalable Similarity-Popularity Link Prediction Method | Sci Rep | 10 | Peer | |||
H. Zhu; H. Qiu; J. Zhu; Q. Wang | 2020-04-13 | DSA-NIE: Double Static Attributes Based Node Importance Evaluation of Inter-Domain Routing System | 2019 IEEE 5th International Conference on Computer and Communications (ICCC) | Conference Paper | ||||
D. A. Vega-Oliveros; L. da Fontoura Costa; F. A. Rodrigues | 2020-04-01 | Influence maximization by rumor spreading on correlated networks through community identification | Communications in Nonlinear Science and Numerical Simulation | 83 | Peer | |||
E. Carisimo; J. M. Del Fiore; D. Dijovne; C. Pelsser; J. I. Alvarez-Hamelin | 2020-03-23 | A first look at the Latin American IXPs | ACM SIGCOMM Computer Communication Review | 50 | 1 | 18-24 | Conference Paper | |
KC Claffy; D. Clark | 2020-03-23 | Workshop on Internet Economics (WIE 2019) report | ACM SIGCOMM Computer Communication Review | 50 | 22 | 53-59 | Conference Paper | |
C. Testart; P. Richter; A. King; A. Dainotti; D. Clark | 2020-03-18 | To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today | International Conference on Passive and Active Network Measurement | Conference Paper | ||||
M. Korczynski; Y. Nosyk; Q. Lone; M. Skwarek; B. Jonglez; A. Duda | 2020-03-18 | Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic | International Conference on Passive and Active Network Measurement (PAM 2020) | 107-121 | Conference Paper | |||
R. Fanou; B. Huffaker; R. Mok; KC Claffy | 2020-03-18 | Unintended Consequences: Effects of Submarine Cable Deployment on Internet Routing | International Conference on Passive and Active Network Measurement (PAM 2020) | 211-227 | Conference Paper | |||
V. Giotsas; I. Livadariu; P. Gigis | 2020-03-18 | A First Look at the Misuse and Abuse of the IPv4 Transfer Market | International Conference on Passive and Active Network Measurement (PAM 2020) | Conference Paper | ||||
T. Lv; D. Qin; L. Ge; S. Wen | 2020-03-12 | A Map-Reduce-Based Relation Inference Algorithm for Autonomous System | 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) | Conference Paper | ||||
G. C. Sankaran; K. M. Sivalingam | 2020-03-09 | Design and Analysis of Fast IP Address-Lookup Schemes based on Cooperation Among Routers | 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) | Conference Paper | ||||
O. S. Alkadi | 2020-03-01 | Defending Against Anomalies in Cloud Services and Live Migration | The University of New South Wales | Peer | ||||
Y. Liu; G. Grigoryan; J. Li; G. Sun; T. Tauber | 2020-02-26 | VeriTable: Fast equivalence verification of multiple large forwarding tables | Computer Networks | 168 | Conference Paper | |||
J. M. Smith; K. Birkeland; T. McDaniel; M. Schuchard | 2020-02-23 | Withdrawing the BGP Re-Routing Curtain | 2020 Network and Distributed System (NDSS 2020) | Conference | ||||
G. Hu; K. Fukuda | 2020-02-19 | Toward Detecting IoT Device Traffic in Transit Networks | 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) | Conference Paper | ||||
K. F. Awe; Y. Malik; P. Zavarsky; F. Jaafar | 2020-02-13 | Validating BGP Update Using Blockchain-Based Infrastructure | Decentralized Internet of Things | 151-165 | Conference Paper | |||
M. Zhang | 2020-02-07 | In-Network Defense Against Distributed Denial-of-Service on the Internet | University of Oregon | Peer | ||||
T. Hlavacek; C. Italo; G. Yossi; A. Herzberg; E. Katz-Bassett; M. Schapira; H. Shulman | 2020-02-06 | DISCO: Sidestepping RPKI’s Deployment Barriers | Network and Distributed System Security Symposium (NDSS) | Conference Paper | ||||
C. Mayr; C. Risso; E. Grampin | 2020-01-03 | Designing an Optimal and Resilient iBGP Overlay with Extended ORRTD | International Conference on Machine Learning, Optimization, and Data Science | 409-421 | Conference Paper | |||
B. Yeganeh; R. Durairajan; R. Rejaie; W. Willinger | 2020-01-01 | A First Comparative Characterization of Multi-cloud Connectivity in Today’s Internet | Passive and Active Measurement (PAM 2020) | Conference Paper | ||||
G. Tich; T. Ermakova; B. Fabian | 2020-01-01 | A Multilayer Graph Model of the Internet Topology | Peer | |||||
H. T. Truong | 2020-01-01 | Software-Defined Network Application for Inter-domain Routing in Transit ISPs | Victoria University of Wellington | Peer | ||||
L. Mingda | 2020-01-01 | Efficient Latent Semantic Extraction from Cross Domain Data with Declarative Language | University of California | Peer | ||||
R. Durairajan | 2020-01-01 | Robustness and the internet | Geographies of the Internet | Conference Paper | ||||
R. Sanger | 2020-01-01 | An algorithmic approach to OpenFlow ruleset transformation | The University of Waikato | Peer | ||||
S. Su; Z. Tian; J. Qiu; Y. Jiang; Y. Sun | 2020-01-01 | Evaluating the Topology Coverage of BGP Monitors | Computers, Material, and Continua | 62 | 3 | 1397-1412 | Peer | |
T. W. Arnold | 2020-01-01 | Understanding Cloud Network Performance | Columbia University | Peer | ||||
T. Witono; S. Yazid | 2020-01-01 | Portrait of Indonesia’s Internet Topology at the Autonomous System Level | Computational Science and Technology | 237-246 | Peer | |||
Y. Sun | 2020-01-01 | Enhancing Anonymity Systems under Network and User Dynamics | Princeton University | Peer | ||||
S. Jia; M. Luckie; B. Huffaker; A. Elmokashfi; E. Aben; K. Claffy; A. Dhamdhere | 2019-12-24 | Tracking the deployment of IPv6: Topology, routing and performance | Computer Networks | 165 | 24 | Peer | ||
R. Fanou; V. Sanchez-Aguero; F. Valera; M. Mwangi; J. Coffin | 2019-12-17 | A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier | International Journal of Network Management | Peer | ||||
Y. Liu; S. Zhang; H. Zhu; P. Wan; L. Gao; Y. Zhang | 2019-12-13 | An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain | International Conference on Security and Privacy in Communication Systems | 63-82 | Conference Paper | |||
C. Phung; B. F. Silva; M. Nogueira; S. Secci | 2019-12-09 | MPTCP robustness against large-scale man-in-the-middle attacks | Computer Networks | 164 | Peer | |||
M. Karimi; A. Jahanshahi; A. Mazloumi; H. Z. Sabzi | 2019-12-09 | Border Gateway Protocol Anomaly Detection Using Neural Network | 2019 IEEE International Conference on Big Data (Big Data) | Conference Paper | ||||
O. Fonseca; I. Cunha; E. Fazzion; B. Junior; R. A. Ferreira; E. Katz-Bassett | 2019-12-09 | Tracking Down Sources of Spoofed IP Packets | CoNEXT ’19 Companion: Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies | 51-53 | Conference Paper | |||
W. Li; D. Li; X. Liu; T. Huang; X. Li; X. Le; W. Le; H. Li | 2019-12-09 | A power-saving pre-classifier for TCAM-based IP lookup | Computer Networks | 164 | Conference Paper | |||
N. Takbiri; X. Shao; L. Gao; H. Pishro-Nik | 2019-12-05 | Improving Privacy in Graphs Through Node Addition | 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton) | Conference Paper | ||||
G. Feng; S. Seshan; P. Steenkiste | 2019-12-03 | UNARI: an uncertainty-aware approach to AS relationships inference | CoNEXT ’19: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies | 272-284 | Conference Paper | |||
KC Claffy; D. Clark | 2019-11-08 | The 11th workshop on active internet measurements (AIMS-11) workshop report | ACM SIGCOMM Computer Communication Review | 49 | 3 | 39-43 | Conference Paper | |
R. Bian; S. Hao; H. Wang; A. Dhamdere; A. Dainotti; C. Cotton | 2019-11-08 | Towards passive analysis of anycast in global routing: unintended impact of remote peering | ACM SIGCOMM Computer Communication Review | 49 | 3 | 18-25 | Peer | |
H. Birge-Lee; L. Wang; J. Rexford; P. Mittal | 2019-11-06 | SICO: Surgical Interception Attacks by Manipulating BGP Communities | Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS ’19) | 431-448 | Conference Paper | |||
M. Luckie; R. Beverly; R. Koga; K. Keys; J. A. Kroll; KC Claffy | 2019-11-06 | Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet | CCS ’19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security | 465-480 | Conference Paper | |||
A. Horn; A. Kheradmand; M. Prasad | 2019-10-31 | A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification | 2019 IEEE 27th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
L. Jin; S. Hao; H. Wang; C. Cotton | 2019-10-31 | Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks | 2019 IEEE 27th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
T. Cui; C. Liu; G. Gou; J. Shi; G. Xiong | 2019-10-29 | A Comprehensive Study of Accelerating IPv6 Deployment | 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC) | Conference Paper | ||||
Y. Yang; X. Yin; X. Shi; Z. Wang; J. He; T. Z. J. Fu; M. Winslett | 2019-10-24 | Inter-domain routing bottlenecks and their aggravation | Computer Networks | 162 | Peer | |||
B. Yeganeh; R. Durairajan; R. Rejaie; W. Willinger | 2019-10-21 | How Cloud Traffic Goes Hiding: A Study of Amazon’s Peering Fabric | IMC ’19: Proceedings of the Internet Measurement Conference | 202-216 | Conference | |||
C. Testart; P. Richter; A. King; A. Dainotti; D. Clark | 2019-10-21 | Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table | Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table | 420-434 | Conference Paper | |||
J. Naab; P. Sattler; J. Jelten; O. Gasser; G. Carle | 2019-10-21 | Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment | IMC ’19: Proceedings of the Internet Measurement Conference | 351-357 | Conference Paper | |||
T. Chung; E. Aben; T. Bruijnzeels; B. Chandrasekaran; D. Choffnes; D. Levin; B. M. Maggs; A. Mislove; R. van Rijswijk-Deij; J. Rula; N. Sullivan | 2019-10-21 | RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins | IMC ’19: Proceedings of the Internet Measurement Conference | 406-419 | Conference Paper | |||
A. Garcia-Martinez; M. Bagnulo; | 2019-10-07 | Measuring BGP Route Propagation Times | IEEE Communications Letters | 23 | 12 | Conference Paper | ||
S. McQuistin; S. P. Uppu; M. Flores | 2019-10-01 | Taming Anycast in the Wild Internet | IMC ’19: Proceedings of the Internet Measurement Conference | 165-178 | Conference Paper | |||
O. S. Alkadi; N. Moustafa; B. Turnbull; K. R. Choo | 2019-09-26 | An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems | IEEE Transactions on Information Forensics and Security | 15 | 1164-1174 | Conference Paper | ||
S. Ahn; Y. Seo; J. Shin | 2019-09-25 | Deep Auto-Deferring Policy for Combinatorial Optimization | ICLR 2020 | Conference Paper | ||||
G. Carofiglio; L. Muscariello; J. Auge; M. Papalilni; M. Sardara; A. Compagno | 2019-09-24 | Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture | ICN ’19: Proceedings of the 6th ACM Conference on Information-Centric Networking | Conference Paper | ||||
L. Ting; D. Qin | 2019-09-13 | Experimental Research on Internet Ecosystem and AS Hierarchy | International Conference of Pioneering Computer Scientists, Engineers, and Educators (ICPCSEE 2019): Data Science | 1058 | 253-263 | Conference Paper | ||
H. S. Joghan; A. Bagheri; M. Azad | 2019-09-03 | Weighted label propagation based on Local Edge Betweenness | The Journal of Supercomputing | 75 | 8094-8114 | Conference Paper | ||
E. Carisimo; C. Selmo; J. I. Alvarez-Hamelin; A. Dhamdhere | 2019-09-01 | Studying the evolution of content providers in IPv4 and IPv6 internet cores | Computer Communications | 145 | 54-56 | Peer | ||
P. Moriano; R. Hill; L. J. Camp | 2019-08-28 | Using Bursty Announcements for Early Detection of BGP Routing Anomalies | Indiana University | Peer | ||||
A. Funel | 2019-08-26 | The Graph Structure of the Internet at the Autonomous Systems Level during Ten Years | Cornell University | Peer | ||||
MD. I. Islam; J. I. Khan | 2019-08-22 | SAIL Based FIB Lookup in a Programmable Pipeline Based Linux Router | 2019 IEEE 20th International Conference on High Performance Switching and Routing (HPSR) | Conference Paper | ||||
K. Bakhshaliyev; M. A. Canbaz; M. H. Gunes | 2019-08-20 | Investigating Characteristics of Internet Paths | ACM Transactions on Modeling and Performance Evaluation of Computing Systems | 4 | 3 | 1-24 | Conference Paper | |
A. Altaweel; R. Stoleru; G. Gu; A. K. Maity | 2019-08-19 | CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks | 2019 IEEE Conference on Communications and Network Security (CNS) | Conference Paper | ||||
W. B. de Vries; R. van Rijswijk-Deij; P. de Boer; A. Pras | 2019-08-19 | Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google | IEEE Transactions on Network and Service Management | 17 | 1 | Conference Paper | ||
Y. Jin; S. Renganathan; G. Ananthanarayanan; J. Jiang; V. N. Padmanabhan; M. Schroder; M. Calder; A. Krishnamurthy | 2019-08-19 | Zooming in on wide-area latencies to a global cloud provider | SIGCOMM ’19: Proceedings of the ACM Special Interest Group on Data Communication | 104-116 | Conference Paper | |||
P. Fika; M. Mitrouli | 2019-08-01 | Fast estimates for the diagonal of the inverse of large scale matrices appearing in applications | Journal of Computational and Applied Mathematics | 355 | 91-105 | Peer | ||
D. Chen; Y. Ba; H. Qui; J. Zhu; Q. Wang | 2019-07-30 | ISRchain: Achieving efficient interdomain secure routing with blockchain | Computers and Electrical Engineering | 83 | Peer | |||
T. Tang; G. Hu | 2019-07-11 | An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet Topology | International Conference on Artificial Intelligence and Security | 510-519 | Conference Paper | |||
Z. Zeng; J. Zhu; H. Qiu; T. Zhou | 2019-07-10 | SM-RC: A New Security Measurement Method for Inter-Domain Routing System | IEEE Access | 7 | Peer | |||
Q. Xiang; J. J. Zhang; X. T. Wang; Y. J. Liu; C. Guok; F. Le; J. MacAuley; H. Newman; Y. Richard | 2019-07-05 | Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource Discovery | IEEE Journal on Selected Areas in Communications | 37 | Conference Paper | |||
K. G. Leyba; B. Edwards; C. Freeman; J. R. Crandall; S. Forrest | 2019-07-03 | Borders and Gateways: Measuring and Analyzing National AS Chokepoints | COMPASS ’19 | Conference Paper | ||||
B. Z. H. Zhao; M. Ikram; H. J. Asghar; M. A. Kaafar; A. Chaabane; K. Thilakarathna | 2019-07-02 | A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists | Asia CCS ’19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security | 193-205 | Conference Paper | |||
L. Dos Santos Leal | 2019-07-01 | A Characterization of the AS-Path prepending usage as a traffic engineering tool on the Internet | Universidade Federal Do Rio Grande Do Sul Instituto De Informatica Curso De Ciencia Da Computacao | Peer | ||||
G. I. Savin; B. M. Shabanov; A. A. Sher; A. P. Ovsyannikov | 2019-06-24 | On the Growth of the Number of Announced Subnets in the Global Routing Table | Lobachevskii Journal of Mathematics | 40 | 574-579 | Peer | ||
H. Asai | 2019-06-24 | Deep Pipelining: Efficient Pipelining of Network Function Chains with Coroutines | 2019 IEEE Conference on Network Softwarization (NetSoft) | Conference Paper | ||||
A. Guillot; R. Fontugne; P. Winter; P. Merindol; A. King; A. Dainotti; C. Pelsser | 2019-06-19 | Chocolatine: Outage Detection for Internet Background Radiation | 2019 Network Traffic Measurement and Analysis Conference (TMA) | Conference Paper | ||||
P. Winter; R. Padmanabhan; A. King; A. Dainotti | 2019-06-19 | Geo-locating BGP prefixes | 2019 Network Traffic Measurement and Analysis Conference (TMA) | Conference Paper | ||||
A. Milolidakis; R. Fontugne; X. Dimitropoulos | 2019-06-17 | Detecting Network Disruptions At Colocation Facilities | IEEE INFOCOM 2019 – IEEE Conference on Computer Communications | Conference | ||||
I. Sfirakis; V. Kotronis | 2019-06-07 | Validating IP Prefixes and AS-Paths with Blockchains | Cornell University | Peer | ||||
M. Tran; M. S. Kang; H. Hsiao; W. Chiang; S. Tung; Y. Wang | 2019-05-19 | On the Feasibility of Rerouting-Based DDoS Defenses | 2019 IEEE Symposium on Security and Privacy (SP) | Conference Paper | ||||
T. Liu; J. C. S. Lui; D. Lin; D. Hui | 2019-05-15 | On the Feasibility of Inter-Domain Routing via a Small Broker Set | IEEE Transactions on Parallel and Distributed Systems | 30 | 2 | 415-427 | Conference Paper | |
G. Feng; S. Seshan; P. Steenkiste | 2019-05-07 | PARI: A Probabilistic Approach to AS Relationships Inference | Cornell University | Peer | ||||
C. Seguin; E. Caron; S. Dubus | 2019-05-03 | SeeDep: Deploying Reproducible Application Topologies on Cloud Platform | CLOSER 2019 – 9th International Conference on Cloud Computing and Services Science | 363-370 | Conference Paper | |||
J. Li; H. Luo; S. Zhang; H. Li; F. Yan | 2019-05-01 | Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking | Journal of Network and Computer Applications | 133 | 109-125 | Peer | ||
K. McGlynn; H. B. Acharya; M. Kwon | 2019-04-29 | Detecting BGP Route Anomalies with Deep Learning | IEEE INFOCOM 2019 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
M. Syamkumar; S. K. Mani; R. Durairajan; P. Barford; J. Sommers | 2019-04-25 | Wrinkles in Time: Detecting Internet-wide Events via NTP | 2018 IFIP Networking Conference (IFIP Networking) and Workshops | Conference Paper | ||||
V. Kirilin; S. Gorinsky | 2019-04-25 | A Protocol-Ignorance Perspective on Incremental Deployability of Routing Protocols | 2018 IFIP Networking Conference (IFIP Networking) and Workshops | Conference Paper | ||||
M. D. Bartolomeo; V. D. Donato; M. Pizzonia; C. Squarcella; M. Rimondini | 2019-04-24 | Extracting Routing Events From Traceroutes: A Matter of Empathy | IEEE/ACM Transactions on Networking | 27 | 3 | Conference Paper | ||
B. Jonynas | 2019-04-22 | Compact Routing for Today’s Internet | University of Glasgow | Peer | ||||
J. Holland; J. Smith; M Schuchard | 2019-04-20 | Measuring Irregular Geographic Exposure on the Internet | Cornell University | Peer | ||||
C. Deccio | 2019-04-11 | DNS Diagnostics through the Eye of the Beholder | 2019 International Conference on Computing, Networking and Communications (ICNC) | Conference Paper | ||||
A. Wang; Z Chen; T. Yang; M. Yu | 2019-04-03 | Enabling Policy Innovation in Interdomain Routing: A Software-Defined Approach | Enabling Policy Innovation in Interdomain Routing: A Software-Defined Approach | Conference Paper | ||||
R. Fontugne; E. Bautista; C. Petrie; Y. Nomura; P. Abry; P. Goncalves; K. Fukuda; E. Aben | 2019-03-19 | BGP Zombies: An Analysis of Beacons Stuck Routes | International Conference on Passive and Active Network Measurement | 197-209 | Peer | |||
Q. Xiang; J. J. Zhang; X. T. Wang; Y. J. Liu; C. Guok | 2019-03-14 | Fine-Grained, Multi-Domain Network Resource Abstraction as a Fundamental Primitive to Enable High-Performance, Collaborative Data Sciences | SC18: International Conference for High Performance Computing, Networking, Storage and Analysis | Conference Paper | ||||
B. Teganeh | 2019-03-01 | On Measuring Internet Topology & its Applications | University of Oregon | Peer | ||||
M. Trevisan | 2019-02-28 | Big Data for Traffic Monitoring and Management | Cornell University | Peer | ||||
C. Lui; Q. Kang; H. Kong; W. Li; Y. Kang | 2019-02-20 | An iterated local search algorithm for community detection in complex networks | International Journal of Modern Physics B | 34 | 4 | Peer | ||
N. Elamathi; S. Jarashri; R. Pitchai | 2019-02-20 | Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques | 23 | 2735-2746 | Peer | |||
A. Dwaraki; R. Freedman; S. Zilberstein; T. Wolf | 2019-02-18 | Using Natural Language Constructs and Concepts to Aid Network Management | 2019 International Conference on Computing, Networking and Communications (ICNC) | Conference Paper | ||||
A. Shanghaghi; S. S. Kanhere; M. A. Kaafar; E. Bertino; S. Jha | 2019-02-10 | Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations | 2018 IEEE 43rd Conference on Local Computer Networks (LCN) | Conference Paper | ||||
KC Claffy; D. Clark | 2019-01-28 | The 10th workshop on active internet measurements (AIMS-10) report | ACM SIGCOMM Computer Communication Review | 48 | 5 | 41-47 | Conference Paper | |
C. Zhang; Y. Feng; H. Song; Y. Wan; W. Xu; Y. Wang; H. Dai; Y. Li; B. Lin | 2019-01-24 | OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update Processing | 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS) | Conference Paper | ||||
T. L. M. Brands | 2019-01-15 | Proactive Domain Abuse Warning and Notification System (PaDAWaNS) | Delft University of Technology | Peer | ||||
N. N. R. Suri; N. M. M.; G. Athithan | 2019-01-11 | Mining Anomalies in Graph Data | Outlier Detection: Techniques and Applications | 135-158 | Peer | |||
H. Wang; C. Qian | 2019-01-01 | Enhancing Automated Network Management | UC Santa Cruz | Peer | ||||
L. Zhihao | 2019-01-01 | Diagnosing and Improving the Performance of Internet Anycast | University of Maryland | Peer | ||||
M. Alexander | 2019-01-01 | Sharp Snapshots of the Internet’s Graph with HONE | University of Pennsylvania | Peer | ||||
P. Edwards; L. Cheng; G. Kadam; | 2019-01-01 | Border Gateway Protocol Anomaly Detection Using Machine Learning Techniques | SMU Data Science Review | 2 | 1 | Peer | ||
T. Holterbach; E. C. Molero; M. Apostalaki; S. Vissicchino; L. Vanbever | 2019-01-01 | Blink: Fast Connectivity Recovery Entirely in the Data Plane | NSDI ’19 | Conference Paper | ||||
X. Dai; N. Wang; W. Wang | 2019-01-01 | Application of machine learning in BGP anomaly detection | Journal of Physics: Conference Series | 1176 | 3 | Conference Paper | ||
Y. Jin; C. Scott; A. Dhamdhere; V. Giotsas; A. Krishnamurthy; S. Shenker | 2019-01-01 | Stable and Practical AS Relationship Inference with ProbLink | NSDI ’19 | Conference | ||||
Y. Nomura | 2019-01-01 | Detecting BGP zombies and inferring their source | The University of Tokyo | Master Thesis | ||||
Tony M. Tung; C. Weng | 2018-12-18 | Understanding the Behaviors of BGP-based DDoS Protection Services | International Conference on Network and System Security | Conference Paper | ||||
N. Sun; J. Zhang; P. Rimba; S. Gao; L. Y. Zhang; Y. Xiang | 2018-12-07 | Data-Driven Cybersecurity Incident Prediction: A Survey | IEEE Communications Surveys & Tutorials | 21 | 2 | Peer | ||
Q. Li | 2018-12-07 | Understanding the causal impact of the video delivery throughput on user engagement | Multimedia Tools and Applications | 78 | 15589-15604 | Conference Paper | ||
M. Trevisan; D. Giordano; I. Drago; M. Mellia; M. Munafo | 2018-12-04 | Five years at the edge: watching internet from the ISP network | CoNEXT ’18: Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies | 1-12 | Conference Paper | |||
T. Hoiland-Jorgensen; J. D. Brouer; D. Borkmann; J. Fastabend; T. Herbert; D. Ahern; D. Miller | 2018-12-04 | The eXpress data path: fast programmable packet processing in the operating system kernel | CoNEXT ’18: Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies | 54-66 | Conference Paper | |||
D. Qin; J. Yang; T. Lv | 2018-11-27 | Incentive Driving Multipath Inter-Domain Routing | 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) | Conference paper | ||||
C. Hong; K. Lee; J. Hwang; H. Park; C. Yoo | 2018-11-20 | Kafe: Can OS Kernels Forward Packets Fast Enough for Software Routers? | IEEE/ACM Transactions on Networking | 26 | 6 | Conference Paper | ||
Y. Gilad; T. Hlavacek; A. Herzberg; M. Schapira; H. Shulman | 2018-11-05 | Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security | HotNets ’18: Proceedings of the 17th ACM Workshop on Hot Topics in Networks | 57-63 | Conference Paper | |||
A. Shaghaghi; S. S. Kanhere; M. A. Kaafar; S. Jha | 2018-11-01 | Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems | 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) | Conference Paper | ||||
A. Marder; M. Luckie; A. Dhamdhere; B. Huffaker; KC Claffy; J. M. Smith | 2018-10-31 | Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale | IMC ’18: Proceedings of the Internet Measurement Conference 2018 | 56-69 | Conference Paper | |||
M. Jonker; A. Pras; A. Dainotti; A. Sperotto | 2018-10-31 | A First Joint Look at DoS Attacks and BGP Blackholing in the Wild | Proceedings of the Internet Measurement Conference 2018 (IMC ’18) | 457-463 | Conference Paper | |||
P. Ritcher; R. Padmanabhan; N. Spring; A. Berger; D. Clark | 2018-10-31 | Advancing the Art of Internet Edge Outage Detection | IMC ’18: Proceedings of the Internet Measurement Conference 2018 | 350-363 | Conference Peer | |||
Q. Scheitle; O. Hohlfeld; J. Gamba; J. Jelten; T. Zimmerman; S. D. Strowes; N. Vallina-Rodriguez | 2018-10-31 | A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists | IMC ’18: Proceedings of the Internet Measurement Conference 2018 | Conference Peer | ||||
R. Beverly; R. Drairajan; D. Plonka; J. P. Rohrer | 2018-10-31 | In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery | IMC ’18: Proceedings of the Internet Measurement Conference 2018 | 308-321 | Conference Paper | |||
E. Carisimo; C. Selmo; J. I. Alvarez-Hamelin; A. Dhamdhere | 2018-10-25 | Studying the Evolution of Content Providers in the Internet Core | 2018 Network Traffic Measurement and Analysis Conference (TMA) | Conference Paper | ||||
T. Bottger; G. Antichi; E. L. Frnandes; R. di Lallo; M. Bruyere; S. Uhlig; G. Tyson; I. Castro | 2018-10-25 | Shaping the Internet: 10 Years of IXP Growth | Cornell University | Peer | ||||
D. Qin; J. Yang; L. Ge | 2018-10-11 | User-Customizing Oriented Multipath Inter-Domain Routing | 2018 IEEE International Conference on Networking, Architecture and Storage (NAS) | Conference Paper | ||||
D. Kiedanski; E. Grampin; J. I. Alvarez-Hamelin | 2018-10-03 | The Atlas Vision of IPv6 in Latin America: Topology and Latency | LANC ’18: Proceedings of the 10th Latin America Networking Conference | Conference Paper | ||||
F. Streilbelt; F. Lichtblau; R. Beverly; A. Feldmann; C. Pelsser; G. Smaragdakis; R. Bush | 2018-10-01 | BGP Communities: Even more Worms in the Routing Can | Proceedings of the Internet Measurement Conference 2018 (IMC ’18) | Conference Paper | ||||
T. Bottger; F. Cuadrado; S. Uhlig | 2018-09-07 | Looking for hypergiants in peeringDB | ACM SIGCOMM Computer Communication Review | 48 | 3 | 14–19 | Conference Paper | |
L. Viennot; Y. Boufkhad; L. Linguaglossa; F. Mathieu; D. Perino | 2018-09-06 | Efficient Loop Detection in Forwarding Networks and Representing Atoms in a Field of Sets | Cornell University | Peer | ||||
P. Mell; A. Gueye; C. Schanzle | 2018-09-06 | Quantifying Information Exposure in Internet Routing | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) | Conference Paper | ||||
Y. Boufkhad; L. Linguaglossa; F. Mathieu; D. Perino; L. Viennot | 2018-09-05 | Efficient Loop Detection in Forwarding Networks and Representing Atoms in a Field of Sets | HAL-Inria | Peer | ||||
E. Yuce; A. A. Selcuk | 2018-09-01 | Server notaries: a complementary approach to the web PKI trust model | IET Information Security | 12 | 5 | 455-461 | Peer | |
J. Jin | 2018-08-27 | BGP Route Leak Prevention Based on BGPsec | 2018 IEEE 88th Vehicular Technology Conference (VTC-FALL) | Conference Paper | ||||
I. Livadariu; A. Elmokashfi; A. Dhamdhere | 2018-08-21 | Measuring IPv6 Adoption in Africa | International Conference on e-Infastructure and e-Services for Developing Countries (AFRICOMM 20177) | 345-351 | Conference Paper | |||
D. D. Clark; A. D. Dhamdhere; KC Claffy | 2018-08-15 | Policy Implications of Third-Party Measurement of Interdomain Congestion on the Internet | TPRC 46: The 46th Research Conference on Communication, Information, and Internet Policy 2018 | Conference Paper | ||||
L. Marzialetti; M. Candela; G. D. Battista | 2018-08-13 | Upstream Visibility: A Multi-View Routing Visualization | VINCI ’18: Proceedings of the 11th International Symposium on Visual Information Communication and Interaction | 80-87 | Conference Paper | |||
S. Katkuri | 2018-08-10 | A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements | Cornell University | Peer | ||||
C. Mahmoudi; F. Mourlin | 2018-08-09 | MOCP: An Offloading Protocol for Mobile Cloud and IoT virtualization | 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT) | Conference Paper | ||||
F. Wohlfart; N. Chatzis; C. Dabanoglu; G. Carle; W. Willinger | 2018-08-07 | Leveraging interconnections for performance: the serving infrastructure of a large CDN | SIGCOMM ’18: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication | Conference Paper | ||||
M. Luckie; R. Beverly | 2018-08-07 | The Impact of Router Outages on the AS-level Internet | Proceedings of the Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ’17) | 488-501 | “ | |||
M. A. Canbaz | 2018-08-01 | Internet Topology Mining: From Big Data to Network Science | University of Reno, Nevada | Peer | ||||
D. Hauweele; B. Quoitin; C. Pelsser; R. Bush | 2018-07-27 | What do parrots and BGP routers have in common? | ACM SIGCOMM Computer Communication Review | 46 | 3 | 1-6 | Conference Paper | |
KC Claffy; D. Clark | 2018-07-27 | Workshop on internet economics (WIE2015) report | ACM SIGCOMM Computer Communication Review | 46 | 3 | Conference Paper | ||
G. Grigoryan; Y. Liu | 2018-07-23 | PFCA: a programmable FIB caching architecture | ANCS ’18: Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems | Conference Paper | ||||
L. Jin; S. Hao; H. Wang; C. Cotton | 2018-07-23 | Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services | 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | Conference Paper | ||||
T. Hlavacek; A. Herzberg; H. Shulman; M. Waidner | 2018-07-23 | Practical Experience: Methodologies for Measuring Route Origin Validation | 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | Conference Paper | ||||
B. Fabian; S. Kelkel; T. Ermakova; A. Baumann | 2018-07-13 | Attacking Internet Border Routers – A Graph-Based Analysis of Strategies | Social Science Research Network | Peer | ||||
C. Chen; D. E. Asoni; A. Perrig; D. Barrera; G. Danezis; C. Troncoso | 2018-07-09 | TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer | 2018 IEEE European Symposium on Security and Privacy (EuroS&P) | Conference Paper | ||||
A. Dhamdhere; D. D. Clark; A. Gamero-Garrido; M. Luckie; R. K. P. Mok; G. Akiwate; K. Gogia; V. Bajpai; A. C. Snoeren; KC Claffy | 2018-07-07 | Inferring persistent interdomain congestion | SIGCOMM ’18: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication | 1-15 | Conference Paper | |||
Z. Li; D. Levin; N. Spring; B. Bhattacharjee | 2018-07-07 | Internet anycast: performance, problems, & potential | SIGCOMM ’18: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication | 59-73 | Conference Paper | |||
P. Fika | 2018-07-06 | Extrapolation Methods for Estimating the Trace of the Matrix Inverse | Modern Discrete Mathematics and Analysis | 173-185 | Peer | |||
L. Krohnke; J. Jansen; H. Vranken | 2018-07-05 | Resilience of the Domain Name System: A case study of the .nl-domain | Computer Networks | 139 | 136-150 | Conference Paper | ||
S. Sarkar; S. Sidkar; S. Bhowmick; A. Mukherjee | 2018-07-04 | Using core-periphery structure to predict high centrality nodes in time-varying networks | Data Mining and Knowledge Discovery | 32 | 1368-1396 | Peer | ||
G. Aceto; A. Botta; P. Marchetta; V. Persico; A. Pescape | 2018-07-01 | A comprehensive survey on internet outages | Journal of Network and Computer Applications | 113 | 36-63 | Peer | ||
R. Noro | 2018-06-25 | Master thesis : Revisiting the BGP communities usage | Universite de Liege | Peer | ||||
P. Sermpezis; V. Kotronis; | 2018-06-19 | Inferring Catchment in Internet Routing | Proceedings of the ACM on Measurement and Analysis of Computing Systems | 3 | 2 | 1-31 | Conference Paper | |
D. Gosain; A. Agarwal; S. Shekhawat; H. Acharya; S. Chakravarty | 2018-06-01 | Mending Wall: On the Implementation of Censorship in India | arXiv:1806.06518 | Peer | ||||
H. Acharya; S. Chakravarty; D. Gosain | 2018-06-01 | Few Throats to Choke: On the Current Structure of the Internet | arXiv:1806.07038 | Peer | ||||
R. Dahlberg; T. Pulls; J. Vestin; T. Hoiland-Jorgensen; A. Kassler | 2018-06-01 | Aggregation-Based Gossip for Certificate Transparency | arXiv:1806.08817 | Peer | ||||
P. Batta; M. Singh; Z. Li; Q. Ding; L. Trajkovic | 2018-05-27 | Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies | 2018 IEEE International Symposium on Circuits and Systems (ISCAS) | Conference Paper | ||||
J. P. Diamond | 2018-05-01 | The Effect of Modern Web Content and Caching on The Tor Onion Router | University of Tennessee | Peer | ||||
K. Merahmand; A. Bouyer; N. Samadi | 2018-05-01 | A new centrality measure based on the negative and positive effects of clustering coefficient for identifying influential spreaders in complex networks | Chaos, Solitons & Fractals | 41-54 | Conference Paper | |||
R. Beverly; R. Durairajan; D. Plonka; J. Rohrer | 2018-05-01 | In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery | arXiv:1805.11308 | Peer | ||||
A. Reuter; R. Bush; I. Cunha; E. Katz-Bassett; T. C. Schmidt; M. Wahlisch | 2018-04-27 | Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering | ACM SIGCOMM Computer Communication Review | 48 | 1 | 19-27 | Conference Paper | |
D. Cicalese; D. Rossi | 2018-04-27 | A longitudinal study of IP Anycast | ACM SIGCOMM Computer Communication Review | 48 | 1 | 10-18 | Conference Paper | |
O. Ding; Z. Li; S. Haeri | 2018-04-24 | Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection Algorithms | Cyber Threat Intelligence | 47-70 | Peer | |||
J. Liu; C. Zheng; L. Guo; X. Liu; Q. Lu | 2018-04-20 | Evaluating routing asymmetry by passive flow measurements with spark | 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA) | Conference Paper | ||||
A. Y. Nur; M. E. Tozal | 2018-04-16 | Identifying critical autonomous systems in the Internet | The Journal of Supercomputing | 74 | 4965-4985 (2018) | Peer | ||
I. Livadariu; K. Benson; A. Elmokashfi; A. Dhamdhere; A. Dainotti | 2018-04-16 | Inferring Carrier-Grade NAT Deployment in the Wild | IEEE Infocom 2018 – IEEE Conference on Computer Communications | Conference Paper | ||||
C. Chan; R. Fontugne; K. Cho; S. Goto | 2018-04-15 | Monitoring TLS adoption using backbone and edge traffic | IEEE INFOCOM 2018 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
T. Kitabatake; R. Fontugne; H. Esaki | 2018-04-15 | BLT: A taxonomy and classification tool for mining BGP update messages | IEEE INFOCOM 2018 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
D. Gosain; A. Agarwal; S. Shekhawat; H. B. Acharya; S. Chakravarty | 2018-04-11 | Mending Wall: On the Implementation of Censorship in India | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 238 | Conference | |||
J. R. Mendoza; R. Ocampo; I. Montes; C. A. Festin | 2018-04-09 | Efficient feature extraction for internet data analysis using AS2Vec | SAC ’18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing | 1106-1013 | Conference Paper | |||
J. Huang; P. Wang | 2018-04-02 | TCAM-Based IP Address Lookup Using Longest Suffix Split | IEEE/ACM Transactions on Networking | 26 | 2 | Peer | ||
G. Grigoryan; Y. Liu; M. Leczinsky; J. Li | 2018-04-01 | VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables | arXiv:1804.07374 | Peer | ||||
S. S. Berenguer; F. V. Pintor | 2018-04-01 | Radiography of internet autonomous systems interconnection in Latin America and the Caribbean | Computer Connections | 119 | 15-28 | Peer | ||
T. Hlavacek; A. Herzberg; H. Shulman; M. Waidner | 2018-04-01 | Practical Experience: Methodologies for Measuring Route Origin Validation | Unknown | Peer | ||||
D. Dzamic; J. Pei; M. Maric; N. Mladenovic; P. M. Pardalos | 2018-03-26 | Exponential quality function for community detection in complex networks | International Transactions in Operational Research | 27 | 1 | 245-266 | Peer | |
J. Heidemann; Y. Pradkin; G. Baltra | 2018-03-16 | The Policy Potential of Measurements of Internet Outages | TPRC 46: The 46th Research Conference on Communication, Information, and Internet Policy 2018 | Conference Paper | ||||
L. Xue; X. Ma; X. Luo; E. W. W. Chan; T. T. N. Miu; G. Gu | 2018-03-13 | LinkScope: Toward Detecting Target Link Flooding Attacks | IEEE Transactions on Information Forensics and Security | 13 | 10 | Conference Paper | ||
R. Fontugne; A. Shah; E Aben | 2018-03-02 | The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS Hegemony | International Conference on Passive and Active Network Measurement | 10771 | Conference Paper | |||
K. Sriram; O. Borchert; D. Montgomery; J. Snijders | 2018-03-01 | Origin Validation Policy Considerations for Dropping Invalid Route | IETF | Conference | ||||
S. Bano; P. Richter; M. Javed; S. Sundaresan; Z. Durumeric; S. J. Mordoch; R. Mortier; V. Paxson | 2018-03-01 | Scanning the Internet for Liveness | ACM SIGCOMM Computer Communication Review | 48 | 2 | 2-9 | Conference Paper | |
S. Saleh; J. Qadir; M. Ilyas | 2018-03-01 | Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research | arXiv:1803.02816 | Peer | ||||
A. Y. Nur; M. E. Tozal | 2018-02-26 | Cross-AS (X-AS) Internet topology mapping | Computer Networks | 132 | 53-67 | Peer | ||
E. Yuce; A. Selcuk | 2018-02-20 | Server Notaries: A Complementary Approach to the Web PKI Trust Model | Unknown | Peer | ||||
S. Zhang; Y. Liu; D. Pei; B. Liu | 2018-02-15 | Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL) | Tsinghua Science and Technology | 23 | 1 | 22-34 | Peer | |
Y. Jia; Y. Lui; G. Ren | 2018-02-15 | RISP: An RPKI-based inter-AS source protection mechanism | Tsinghua Science and Technology | 23 | 1 | Peer | ||
L. Wei; J. Heidemann | 2018-02-12 | Does Anycast Hang Up on You (UDP and TCP)? | IEEE Transactions on Network and Service Management | 15 | 2 | 707-717 | Conference Paper | |
W. J. A. Silva | 2018-02-06 | An Architecture to Manage Incoming Traffic of Inter-Domain Routing Using OpenFlow Networks | Information | 9 | 4 | 92 | Peer | |
W. Luo; W. P. Tay. P. Sun; Y. Wen | 2018-02-05 | On Distributed Algorithms for Cost-Efficient Data Center Placement in Cloud Computing | Cornell University | Peer | ||||
Y. Jia; Y. Lui; G. Ren; L. He | 2018-02-05 | Revisiting inter-AS IP spoofing let the protection drive source address validation | 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) | Conference Paper | ||||
J. Pickard; M. Angolia; T. Chou | 2018-02-01 | IPv6 Diffusion on the Internet Reaches a Critical Point | The Journal of Technology, Management, and Applied Engineering | 34 | 1 | Peer | ||
S_Zhang; Y. Liu; D. Pei; B. Liu | 2018-02-01 | Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL) | Tsinghua Science and Technology | 23 | 1 | 22-34 | Peer | |
W. Luo; W. Pen. Tay; P. Sun; Y. Wen | 2018-02-01 | On Distributed Algorithms for Cost-Efficient Data Center Placement in Cloud Computing | arXiv:1802.01289 | Peer | ||||
Y. Liu; Z. Wang; N. Li | 2018-02-01 | Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack | Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018) | Conference Paper | ||||
H. Luo; Z. Chen; J. Li; T. Vasilakos | 2018-01-31 | On the Benefits of Keeping Path Identifiers Secret in Future Internet: A DDoS Perspective | IEEE Transactions on Network and Service Management | 15 | 2 | 650-664 | Conference Paper | |
H. Kimiyama; N. Yonezaki; T. Tsutsumi; K. Sano; H. Yamaki; Y. Ueno; R. Sasaki; H. Kobayashi | 2018-01-11 | Autonomous and distributed internet security (AIS) infrastructure for safe internet | 2017 8th International Conference on the Network of the Future (NOF) | Conference Paper | ||||
M. Bienkowski; N. Sarrar; S. Schmid; S. Uhlig | 2018-01-09 | Online Aggregation of the Forwarding Information Base: Accounting for Locality and Churn | IEEE/ACM Transactions on Networking | 26 | 1 | 591-604 | Conference Paper | |
A. Reuter; R. Bush; I. Cunha; E. Katz-Bassett; T. Schmidt; M. Wahlisch | 2018-01-01 | Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation Filtering | ACM SIGCOMM Computer Communication Review | 48 | 1 | 19-27 | Peer | |
A. Shah | 2018-01-01 | Systems for Characterizing Internet Routing | Colorado State University, Department of Computer Science | Peer | ||||
C. Chen | 2018-01-01 | Infrastructure-Based Anonymous Communication Protocols in Future Internet Architectures | Carnegie Melon University | Peer | ||||
D. Ward; C. Metz | 2018-01-01 | Role of Open Source, Standards, and Public Clouds in Autonomous Networks | Artificial Intelligence for Autonomous Networks | Peer | ||||
F. Lan; S. Biswas; B. Gui, J. Wu; A. Wang | 2018-01-01 | Design and Implementation of a Strong Representation System for Network Policies | Temple University | Peer | ||||
G. Huston | 2018-01-01 | BGP in 2017 | The ISP Column | Peer | ||||
J. Ruth; I. Poese; C. Dietzel; O. Hohlfeld | 2018-01-01 | A First Look at QUIC in the Wild | arXiv:1801.05168 | Peer | ||||
M. Calder | 2018-01-01 | Measuring the Impact of CDN Design Decisions | University of Southern California | Peer | ||||
P. Sermpezis; V. Kotronis; A. Dainotti; X. Dimitropoulos | 2018-01-01 | A Survey among Network Operators on BGJ Prefix Hijacking | ACM SIGCOMM Computer Communication Review (CCR) | 48 | 1 | 64-69 | Peer | |
P. Sermpezis; V. Kotronis; P. Gigis; X. Dimitropoulos; D. Cicalese; A. King; A. Dainotti | 2018-01-01 | ARTEMIS: Neutralizing BGP Hijaking within a Minute | Center for Applied Internet Data Analysis (CAIDA) | Peer | ||||
P. Sermpezis; V. Kotronis; P. Gigis; X. Dimitropoulos; D. Cicalese; A. King; A. Dainotti | 2018-01-01 | ARTEMIS: Neutralizing BGP Hijacking within a Minute | arXiv:1801.01085 | Peer | ||||
R. Wails; Y. Sun; A. Johnson; M. Chiang; P. Mittal | 2018-01-01 | Tempest: Temporal Dynamics in Anonymity Systems | arXiv:1801.01932 | Peer | ||||
S. L. Cortes | 2018-01-01 | Jurisdictional Arbitrage: Quantifying and Counteracting the Threat of Government Intelligence Agencies against Tor | Northeastern University | Peer | ||||
V. N. Zadorozhnyi; E. B. Yudin; M. N. Yudina | 2017-12-25 | Graphs with complex stochastic increments | 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics) | Conference Paper | ||||
O. Gasser; Q. Scheitle; C. Denis; N. Schricker; G. Carle | 2017-12-21 | Security Implications of Publicly Reachable Building Automation Systems | 2017 IEEE Security and Privacy Workshops (SPW) | Conference Paper | ||||
Y. Liu; Z. Wang; N. Li | 2017-12-08 | A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet | ICNCC 2017: Proceedings of the 2017 VI International Conference on Network, Communication and Computing | Conference Paper | ||||
D. Gosain; A. Agarwal; S. Chakravarty; H. B. Acharya | 2017-12-04 | The Devil’s in The Details: Placing Decoy Routers in the Internet | ACSAC ’17: Proceedings of the 33rd Annual Computer Security Applications Conference | 577-589 | Conference Paper | |||
F. Wang; Y. Fukushima; K. Fujikawa; A. H. A. Muktadir; V. P. Kafle; X. Shao; H. Harai; L. Gao | 2017-12-04 | Implementation of Location-Based Routing and ID-Based Forwarding Architecture for Internet of Things | GLOBECOM 2017 – 2017 IEEE Global Communications Conference | Conference paper | ||||
J. Mirkobic; E. Kline; P. Reiher | 2017-12-04 | RESECT: Self-Learning Traffic Filters for IP Spoofing Defense | ACSAC ’17: Proceedings of the 33rd Annual Computer Security Applications Conference | Conference Paper | ||||
E. Gregori; A. Improta; L. Sani | 2017-12-01 | On the African peering connectivity revealable via BGP route collectors | Procceedings of International Workshop on Internet Measurements Research in Africa | Conference Paper | ||||
Y. Gilad; O. Sagga; S. Goldberg | 2017-11-28 | MaxLength Considered Harmful to the RPKI | CoNEXT ’17: Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies | 101-107 | Conference Paper | |||
H. Nguyen; C. Phung; S. Secci; B. Felix; M. Nogueira | 2017-11-26 | Can MPTCP secure Internet communications from man-in-the-middle attacks? | 2017 13th International Conference on Network and Service Management (CNSM) | Conference Paper | ||||
A. Ahmed; Z. Shafiq; H. Bedi; A. Khakpour | 2017-11-23 | Peering vs. transit: Performance comparison of peering and transit interconnections | 2017 IEEE 25th International Conference on Network Protocols (ICNP) | Conference Paper | ||||
G. Nomikos; P. Sermpezis; X. Dimitropoulos | 2017-11-23 | Re-mapping the internet: Bring the IXPs into play: www.inspire.edu.gr/ixp-map | 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
B. Al-Musawi; P. Branch; G. Armitage | 2017-11-22 | Recurrence behavior of BGP traffic | 2017 27th International Telecommunications Networks and Applications Conference (ITNAC) | Conference Paper | ||||
S. P. Meenakshi; M. J. S. Raman; V. Kamakoti | 2017-11-20 | Country-Wide Long-term Event Detection and Classification Mechanisms Using Spatiotemporal BGP Prefix Data | IAENG International Journal of Computer Science | 44 | 4 | Peer | ||
R. Fanou; F. Valera; A. Dhamdhere; P. Francois | 2017-11-15 | Reshaping the African Internet: From scattered islands to a connected continent | Computer Communications | 113 | 25-42 | Peer | ||
F. Lichtblau; F. Streibelt; T. Kruger; P. Richter; A. Feldmann | 2017-11-06 | Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | 86-99 | Conference Paper | |||
G. Cakmak; M. N. Aydin | 2017-11-06 | A country-specific analysis on internet interconnection ecosystems | 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) | Conference Paper | ||||
A. Murdock; F. Li; P. Bramsen; Z. Durumeric; V. Paxson | 2017-11-01 | Target generation for internet-wide IPv6 scanning | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | Conference Paper | ||||
B. J. Goodchild; Y. Chiu; R. Hansen; H. Lua; M. Calder; M. Luckie; W. Lloyd; D. Choffnes; E. Katz-Bassett | 2017-11-01 | The record route option is an option! | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | 311-317 | Conference Paper | |||
E. Gregori; L. Lenzini; V. Luconi | 2017-11-01 | AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems | Computer Communications | 47-57 | Conference Paper | |||
G. Cakmak; M. Aydin | 2017-11-01 | A country-specific analysis on internet interconnection ecosystems | 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops | Conference Paper | ||||
H. Zheng; B. Wang; W. Deng; J. Tang | 2017-11-01 | A Prototype for Analyzing the Internet Routing System Based on Spark and Docker | 2017 IEEE 7th International Symposium on Cloud and Service Computing | Conference Paper | ||||
M. Jonker; A. King; J. Krupp; C. Rossow; A. Sperotto; A. Dainotti | 2017-11-01 | Millions of targets under attack: a macroscopic characterization of the DoS ecosystem | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | 100-113 | Conference Paper | |||
R. Fanou; F. Valera; A. Dhamdhere | 2017-11-01 | Investigating the causes of congestion on the African IXP substrate | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | 57-63 | Conference Paper | |||
R. Fanou; F. Valera; P. Francois; A. Dhamdhere | 2017-11-01 | Reshaping the African Internet: From Scattered Islands to a Connected Continent | Elsevier Computer Communications Journal | 113 | 25-42 | Peer | ||
V. Giostas; G. Smaragdakis; C. Dietzel; P. Richter; A. Feldmann; A. Berger | 2017-11-01 | Interring BGP blackholing activity in the internet | 2017 Internet Measurement Conference (IMC ’17) | Conference Paper | ||||
W. B. de Vries; R. de O. Schmidt; W. Hardaker; J. Heidemann; PT de Boer; A. Pras | 2017-11-01 | Broad and load-aware anycast mapping with verfploeter | IMC ’17: Proceedings of the 2017 Internet Measurement Conference | Conference Paper | ||||
D. Kiene-Maksimovic; E. Zinovyeva; B. Fabian; J. Park | 2017-10-27 | CORIA 2.0 – Augmenting a Universal Framework for Connectivity Risk Analysis | Social Science Research Network | Peer | ||||
Y. Guo; J. Yan; L. Zhang; H. Qiu | 2017-10-27 | A routing recovery method based on structure properties and centralized control for inter domain routing system | 2017 IEEE 17th International Conference on Communication Technology (ICCT) | Conference Paper | ||||
S. D. Strowes | 2017-10-23 | Bootstrapping Active IPv6 Measurement with IPv4 and Public DNS | Cornell University | Peer | ||||
V. Solla; G. Jambrina; E. Grampin | 2017-10-23 | Route reflection topology planning in service provider networks | 2017 IEEE URUCON | ` | Conference Paper | |||
J. Xue; J. Wang; S. Liu; X. Ma; H. Wang | 2017-10-18 | Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency | International Journal of Communication Systems | Peer | ||||
H. B. Acharya; S. Chakravarty; D. Gosain | 2017-10-09 | Few Throats to Choke: On the Current Structure of the Internet | 2017 IEEE 42nd Conference on Local Computer Networks (LCN) | Conference Paper | ||||
Q. Li; L. Wang; Y. Jiang; M. Xu; J. Wu | 2017-10-09 | A fast and incremental update scheme for SDN based on a relation graph | Computer Networks | 125 | 41-52 | Conference Paper | ||
J. L. G. Gomez; R. Wang; M. Chen; C. Chou | 2017-10-05 | ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networking | 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) | Conference Paper | ||||
J. Liu; B. Yang; J. Liu; Y. Lu; K. Zhu | 2017-10-02 | Forwarding degree-based AS relationship recognition algorithm | 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) | Conference Paper | ||||
D. Gosain; A. Agarwal; S. Chakravarty; H. Acharya | 2017-10-01 | The Devils in the Details: Placing Decoy Routers in the Internet | arXiv:1710.05527 | Peer | ||||
E. Gregori; B. Guidi; A. Improta; L. Sani | 2017-10-01 | ICE: A memory-efficient BGP route collecting engine | Computer Networks | 126 | 162-173 | Peer | ||
I. Livadariu; A. Dhamdhere; A. Elmokashfi | 2017-10-01 | On IPv4 transfer markets: Analyzing reported transfers and inferring transfers in the wild | Elsevier Computer Communications Journal | 111 | 105-119 | Peer | ||
I. Livadariu; A. Elmokashfi; A. Dhamdhere | 2017-10-01 | On IPv4 transfer markets: Analyzing reported transfers and inferring transfers in the wild | Computer Communications | 111 | 105-119 | Conference Paper | ||
Q. Li; M. Zu; Q. Li; D. Wang; Y. Jiang; S. Xia; Q. Liao | 2017-10-01 | Scale the Internet routing table by generalized next hops of strict partial order | Information Sciences | 412-413 | 101-115 | Peer | ||
V. Kotronis; G. Nomikos; L. Manassakis;D_Mavrommatis; X. Dimitropoulos | 2017-10-01 | Shortcuts through Colocation Facilities | arXiv:1710.04422 | Peer | ||||
Y. Guo; J. Yan; L. Zhang; H. Qui | 2017-10-01 | A routing recovery method based on structure properties and centralized control for inter domain routing system | 2017 IEEE 17th International Conference on Communication Technology | Conference Paper | ||||
P. G. Sun; X. Ma | 2017-09-27 | Understanding control of network spreading from network controllability | Journal of Statistical Mechanics: Theory and Experiment | Peer | ||||
M. Zec; M. Mikuc | 2017-09-21 | Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs | 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) | Conference Paper | ||||
M. Zhang; J. Li; S. Brooks | 2017-09-18 | I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes | IEEE/ACM Transactions on Networking | 25 | 6 | Conference Paper | ||
W. Li; X. Li; H. Li | 2017-09-18 | MEET-IP: Memory and Energy Efficient TCAM-Based IP Lookup | 2017 26th International Conference on Computer Communication and Networks (ICCCN) | Conference Paper | ||||
H. Shulman | 2017-09-15 | Implications of Vulnerable Internet Infrastructure | Digital Marketplaces Unleashed | 921-935 | Peer | |||
W. Shao; J. Rougier; A. Paris; F. Devienne; M. Viste | 2017-09-01 | One-to-One Matching of RTT and Path Changes | arXiv:1709.04819 | Peer | ||||
A. Kolesnikov | 2017-08-22 | Generation of Web Workloads | Loaod Modelling and Generation in IP-based Networking | 214-247 | Peer | |||
K. Berahmand; A. Bouyer | 2017-08-17 | A Link-Based Similarity for Improving Community Detection Based on Label Propagation Algorithm | Journal of Systems Science and Complexity | 32 | 737-758 | Conference Paper | ||
A. Allahdadi; R. Morla; R. Prior | 2017-08-11 | A Framework for BGP Abnormal Events Detection | University of Porto | Peer | ||||
L. Wei; J. Heidemann | 2017-08-07 | Does anycast hang up on you? | 2017 Network Traffic Measurement and Analysis Conference (TMA) | Conference Paper | ||||
T. Holterbach; S. Vissichio; A. Dainotti; L. Vanbever | 2017-08-07 | SWIFT: Predictive Fast Reroute | SIGCOMM ’17: Proceedings of the Conference of the ACM Special Interest Group on Data Communication | 460-473 | Conference Paper | |||
V. N. Zadorozhnyi; E. B. Yudin; M. N. Yudina | 2017-08-03 | Analytical and numerical methods of calibration for preferential attachment randon graphs | 2017 International Siberian Conference on Control and Communications (SIBCON) | Conference Paper | ||||
A. Shaghaghi; M. Kaafar; S. Jha | 2017-08-01 | WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks | arXiv:1708.05477 | Peer | ||||
E. Gregori; A. Improta; L. Sani | 2017-08-01 | On the African peering connectivity revealable via BGP route collectors | National Research Council of Italy | Peer | ||||
M. Luckie; R. Beverly | 2017-08-01 | Impact of Router Outages on the AS-level Internet | ACM SIGCOMM | 488-501 | Conference Paper | |||
T. Holterbach; S. Vissicchio; A. Dainotti; L. Vanbever | 2017-08-01 | SWIFT: Predictive Fast Reroute | ACM SIGCOMM | Conference Paper | ||||
V. Giotsas; C. Dietzel; G. Smaragdakism; A. Feldmann; A. Berger; E. Aben | 2017-08-01 | Detecting Peering Infrastructure Outages in the Wild | ACM SIGCOMM | Conference Paper | ||||
M. Bienknowski; J. Marcinkowski; M. Pacut; S. Schmid; A. Spyra | 2017-07-24 | Online Tree Caching | SPAA ’17: Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures | 329-338 | Conference Paper | |||
R. Fontugne; A. Shah; E Aben | 2017-07-22 | AS Hegemony: A Robust Metric for AS Centrality | Proceedings of SIGCOMM Posters and Demos ‘17 | 48-50 | Conference Paper | |||
R. Hiran; N. Carlsson; N. Shahmehri | 2017-07-20 | Collaborative framework for protection against attacks targeting BGP and edge networks | 122 | 120-137 | Peer | |||
S. Chattopadhyay; N. Sett; S. Nandi; S. Chakraborty | 2017-07-08 | FLIPPER: Fault-tolerant distributed network management and control | 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) | Conference Paper | ||||
B. Chitamba | 2017-07-01 | Visualizing the African Internet Topology from Measurement Data | University of Cape Town | Conference Paper | ||||
G. Hu; W. Chen; Q. Li; Y. Jiang; K. Xu | 2017-07-01 | TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code | Future Generation Computer Systems | 72 | 219-226 | Peer | ||
R. Fanou; P. Francois; E. Aben; M. Mwangi; N. Goburdhan; F. Valera | 2017-07-01 | Four years tracking unrevealed topological changes in the african interdomain | Computer Communications | 106 | 117-135 | Peer | ||
S. Sultana; B Revathi | 2017-07-01 | Personal and Confirmable Inter Domain Routing Decisions | International Journal of Advanced Technology and Innovative Research | 9 | 8 | 1311-1315 | Conference Paper | |
V. K. Sriram; D. Montgomery | 2017-07-01 | Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols | Computer Connections | 106 | 75-85 | Peer | ||
V. Sriram; D. Montgomery | 2017-07-01 | Design and analysis of optimization alogrithms to minimize cryptographic processing in BGP security protocols | Computer Communications | 106 | 75-85 | Peer | ||
R. Bennesby da Silva; E. S. Mota | 2017-06-30 | A Survey on Approaches to Reduce BGP Interdomain Routing Convergence Delay on the Internet | IEEE Communications Surveys & Tutorials | 19 | 4 | 2949-2984 | Peer | |
P. Sermpezis; G. Nomikos; X. Dimitropoulos | 2017-06-22 | Re-mapping the Internet: Bring the IXPs into Play | Cornell University | Peer | ||||
M. Utsumi; H. Asai; H. Esaki | 2017-06-14 | Spatio-Temporal Modeling of BGP Routing Table Evolution | CFI’17: Proceedings of the 12th International Conference on Future Internet Technologies | Conference Paper | ||||
B. Yang; Y. Lu; K. Zhu; Y. Zhang; J. Liu | 2017-06-03 | Evolution of the Internet and its measures | 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS) | Conference Paper | ||||
A. Reuter; R. Bush; I. Cunha; E. Katz-Bennett; T. Schmidt; M. Wahlisch | 2017-06-01 | Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering | arXiv:1706.04263 | Peer | ||||
B. Yang; Y. Lu; K. Zhu; Y. Zhang; J. Liu | 2017-06-01 | Evolution of the Internet and its measures | 2017 First International Conference on Electronics Instrumentation & Information Systems | Conference Paper | ||||
J. Lui; B. Yang; J. Liu; Y. Lu; K. Zhu | 2017-06-01 | Proceedings of the Advances in Materials, Machinery, Electrical Engineering | AMMEE 2017 | Conference Paper | ||||
M. Utsumi; H. Asai; H. Esaki | 2017-06-01 | Spatio-Temporal Modeling of BGP Routing Table Evolution | CFI ’17 Proceedings of the 12th International Conference on Future Internet Technologies | 8 | Conference Paper | |||
Rawat; Madhur; Chakravarty; Sambuddho | 2017-06-01 | Citadels in cyberspace | MTech | Peer | ||||
B. Fabian; A. Baumann; M. Ehlert; V. Ververis; T. Ermakova | 2017-05-21 | CORIA — Analyzing internet connectivity risks using network graphs | 2017 IEEE International Conference on Communications (ICC) | Conference Paper | ||||
S. Lazfi; S. Lamzabi; A. Rachadi; H. Ez-Zahraouy | 2017-05-17 | The impact of neighboring infection on the computer virus spread in packets on scale-free networks | International Journal of Modern Physics B | 31 | 30 | Peer | ||
J. Gamba; R. Fontugne; C. Pelsser; R. Bush; E. Aben | 2017-05-01 | BGP Table Fragmentation: what & who? | Rencontres Francophones sur la Conception de Protocoles, l’Evaluation de Performance et l’Experimentation des Reseaux de Communication | Conference Paper | ||||
J. Obstfeld; X. Chen; O. Frebourg; P. Sudheendra | 2017-05-01 | Towards Near Real-Time BGP Deep Analysis: A Big-Data Approach | arXiv:1705.08666 | Peer | ||||
M. A. Canbaz; J. Thom; M. H. Gunes | 2017-05-01 | Comparative analysis of internet topology data sets | 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
Y. Wang; J. Bi; K. Zhang | 2017-04-13 | A SDN-Based Framework for Fine-Grained Inter-domain Routing Diversity | Mobile Networks andn Applications | 22 | 906-917 | Peer | ||
A. Shaghagi; M. A. Kaafar; S. Jha | 2017-04-02 | WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks | ASIA CCS ’17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security | 849-861 | Conference Paper | |||
H. Nguyen; C. Phung; S. Secci; B. Felix; M. Nogueira | 2017-04-01 | Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks? | arXiv:1704.07154 | Peer | ||||
Y. Sun; A. Edmundson; N. Feamster; M. Chiang; P. Mittal | 2017-04-01 | Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks | arXiv:1704.00843 | Peer | ||||
A. Horn; A. Kheradmand; M. Prasad | 2017-03-29 | Delta-net: Real-time Network Verification Using Atoms | NSDI ’17 | Conference | ||||
H. Luo; Z. Chen; J. Li; A. V. Vasilakos | 2017-03-28 | Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers | IEEE Transactions on Information Forensics and Security | 12 | 8 | 1801-1815 | Conference Paper | |
M. Apostaolaki; A. Zohar; L. Vanbever | 2017-03-26 | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies | 2017 IEEE Symposium of Security and Privacy (SP) | Conference Paper | ||||
Q. Lone; M. Luckie; M. Korczy_ski; M. va. Eeten | 2017-03-01 | Using Loops Observed in Traceroute to Infer the Ability to Spoof | Passive and Active Measurement Conference (PAM) | Conference Paper | ||||
T. Fiebig; K. Borgolte; S. Hao; C. Kruegel; G. Vigna | 2017-02-17 | Something from Nothing (There): Collecting Global IPv6 Datasets from DNS | International Conference on Passive and Active Network Measurement (PAM 2017) | 30-43 | Conference Paper | |||
J. T. Araujo; R. Landa; R. G. Clegg; G. Pavlou; K. Fukuda | 2017-02-11 | On rate limitation mechanisms for TCP throughput: A longitudinal analysis | Computer Networks | Peer | ||||
L. Bergamaschi; E. Bozzo | 2017-02-06 | Computing the smallest eigenpairs of the graph Laplacian | SeMA Journal | 775 | 1-16 | Peer | ||
A. Al-B aghdadi | 2017-01-01 | Computing Top-K Closeness Centrality In Unweighted Undirected Graphs Revisited | Kent State University | Peer | ||||
A. Davanian | 2017-01-01 | EFFECTIVE GRANULARITY IN INTERNET BADHOOD DETECTION: DETECTION RATE, PRECISION AND IMPLEMENTATION PERFORMANCE | University of Twente | Conference Paper | ||||
A. Ulmer; J. Kohlhammer; H. Shulman | 2017-01-01 | Towards Enhancing the Visual Analysis of Interdomain Routing | International Conference on Information Visualization Theory and Applications | Conference Paper | ||||
B. A-Musawi | 2017-01-01 | Detecting BGP Anomalies Using Recurrence Quantification Analysis | Swinburne University of Technology | Thesis | ||||
C. Chen; A. Perrig | 2017-01-01 | PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer | ETHZurich | Peer | ||||
D. Yu | 2017-01-01 | Access control for network management | University of Cambridge | Peer | ||||
G. Huston | 2017-01-01 | BGP in 2016 | The ISP Column | Self | ||||
H. H. Alshamrani | 2017-01-01 | Detecting IP prefix hijack events using BGP activity and AS connectivity analysis | University of Plymouth | Conference Paper | ||||
J. Croft | 2017-01-01 | Toward predictable control of software-defined networks | University of Illinois | Peer | ||||
J. H. Park | 2017-01-01 | Investigating an Approach for Discovering Second Hop Neighbors in BGP | University of California, San Diego | Thesis | ||||
JM Spring; L. Metcalf; D. Ruef | 2017-01-01 | Open-source Measurement of Fast-flux Networks While Considering Domain-name Parking | Proceedings of the Learning from Authoritative Security Experiment Results (LASER) 2017 workshop. USENIX | Conference Paper | ||||
L. Graser | 2017-01-01 | Design and implementation of an evaluation testbed for fog computing infrastructure and applications | University of Stuttgart | Peer | ||||
N. Rishab | 2017-01-01 | DOCTor: Defending and Opening Communication on Tor | State University of New York | Peer | ||||
P. Moriano; S. Iyer; L. J. Camp | 2017-01-01 | Characterization of Internet Routing Anomalies Through Graph Mining | Indiana University | Peer | ||||
Q. Jiang; H. Hu; G. Hu | 2017-01-01 | Two-Type Information Fusion Based IP-to-AS Mapping Table Refining | Journal of Computer Science and Technology | 32 | 571-584 | Conference Paper | ||
Y. Qu; C. Zhang; C. Wang; F. Liu; H. Xu; Y. Liu | 2017-01-01 | On-demand Interdomain Path Building Protocol | Procedia Computer Science | 112 | 609-616 | Peer | ||
W. Czech; W. Mielczarek; W. Dzwinel | 2016-12-23 | Distributed computing of distance-based graph invariants for analysis and visualization of complex networks | Concurrency and Computation: Practice and Experience | Peer | ||||
A. Chatterjee; A. Chakraborty; S. Pal; A. Mukherjee; M. Naskar | 2016-11-01 | Non-autonomous dynamic network model involving growth and decay | 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems | Conference Paper | ||||
A. Shah; R. Fontugne; C. Cpapdopoulos | 2016-11-01 | Towards characterizing international routing detours | AINTEC ’16 Proceedings of the 12th Asian Internet Engineering Conference | 17-24 | Conference Paper | |||
C. Orsini; A. King; D. Giordano; V. Giostas; A. Dainotti | 2016-11-01 | BGPStream: A Software Framework for Live and Historical BGP Data Analysis | IMC ’16 Proceedings of the 2016 Internet Measurement Conference | 429-444 | Conference Paper | |||
C. Orsini; A. King; D. Giordano; V. Giotsas; A. Dainotti | 2016-11-01 | BGPStream: a software framework for live and historical BGP data analysis | Internet Measurement Conference (IMC) | Conference Paper | ||||
E. Gregori; A. Improta; L. Sani | 2016-11-01 | Isolario: a Do-ut-des Approach to Improve the Appeal of BGP Route Collecting | arXiv | Peer | ||||
M. Chen; M. Xu; Y. Yang; Q. Li | 2016-11-01 | A Measurement Study on the Distribution Disparity of BGP Instabilities | 2016 IEEE 41st Conference on Local Computer Networks | Conference Paper | ||||
M. Luckie; A. Dhamdhere; B. Huffaker; D. Clark; K. Claffy | 2016-11-01 | bdrmap: Interference of Borders Between IP Networks | Internet Measurement Conference (IMC) | 381-396 | Conference Paper | |||
R. Kloti; B. Ager; V. Kotronis; G. Nomikos; X. Dimitropoulos | 2016-11-01 | A Comparative Look into Public IXP Datasets | arXiv:1611.02624 | Peer | ||||
R. Kloti; V. Kotronis; B. Ager; X. Dimitropoulos | 2016-11-01 | Policy-Compliant Path Diversity and Bisection Bandwidth | arXiv:1611.02842 | Peer | ||||
R. Padmanabhan; A. Dhamdhere; E. Aben; K. Claffy; N. Spring | 2016-11-01 | Reasons Dynamic Addresses Change | Internet Measurement Conference (IMC) | Conference Paper | ||||
V. Kotronis; R. Kloti; M. Rost; P. Georgopoulos; B. Ager; S. Schmid; X. Dimitropoulos | 2016-11-01 | Stitching Inter-Domain Paths over IXPs | arXiv:1611.02642 | Peer | ||||
C. Chen; D. Barrera; A. Perrig | 2016-10-01 | Modeling Data-Plane Power Consumption of Future Internet Architectures | arXiv:1610.01511 | Peer | ||||
K. Benton; L. Camp | 2016-10-01 | Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies | SafeConfig ’16 Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense | 31-36 | Conference Paper | |||
W. Ma; J. Zhang; F. Teng | 2016-10-01 | A hybrid scheme for routing lookup with fast updates based on TCAMs | 2016 2nd IEEE International Conference on Computer and Communications | Conference Paper | ||||
A. Chin; T. Goodrich; M. O’Brien; F. Reidl; B. Sullivan; A. va. de. Poel | 2016-09-01 | Asymptotic Analysis of Equivalences and Core-Structures in Kronecker-Style Graph Models | arXiv:1609.05081 | Peer | ||||
P. Sermpezis; G. Chaviaras; P. Gigis; X. Dimitropoulos | 2016-09-01 | Monitor, Detect, Mitigate: Combating BGP Prefix Hijacking in Real-Time with ARTEMIS | Proceedings of the ACM SIGCOMM 2016 Conference | 625-626 | Conference Paper | |||
G. Chaviaras; P. Gigis; P. Sermpezis; X. Dimitropoulos | 2016-08-01 | ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking | SIGCOMM ’16 Proceedings of the 2016 ACM SIGCOMM Conference | 625-626 | Conference Paper | |||
A. Dainotti; E. Katz-Bassett; X. Dimitropoulos | 2016-07-01 | The BGP Hackathon 2016 Report | ACM SIGCOMM Computer Communication Review (CCR) | Peer | ||||
J. Rohrer; B. LaFever; R. Beverly | 2016-07-01 | Empirical Study of Router IPv6 Interface Address Distribution | IEEE Internet Computing | 20 | 4 | 36-45 | Peer | |
L. Trajkovic | 2016-07-01 | Mining Network Traffic Data | Presentation at University | Self | ||||
O. Gasser; Q. Scheitle; S. Gebhard; G. Carle | 2016-07-01 | Scanning the IPv6 Internet: Towards a Comprehensive Hitlist | arXiv:1607.05179 | Peer | ||||
M. Masoud; Y. Jaradat; I. Jannoud; H. Huang | 2016-06-22 | The Impact of 16-bit and 32-bit ASNs Coexistence on the Accuracy of Internet AS Graph | Journal of Network and Systems Management | 25 | 253-268 | Peer | ||
A. Dainotti; K. Benson; A. King; B. Huffaker; E. Glatz; X. Dimitopoulos; P. Richter; A. Finamore; A. Snoeren | 2016-06-01 | Lost in Space: Improving Inference of IPv4 Address Space Utilization | IEEE Journal on Selected Areas in Communications (JSAC) | 34 | 6 | 1862-1876 | Peer | |
J. Pickard; J. Southworth | 2016-06-01 | The State of IPv6: Measuring Global Adoption | 2016 ASEE Annual Conference and Exposition | Conference Paper | ||||
J. Schlamp; R. Holz; Q. Jacquemart; G. Carle; E. Bersack | 2016-06-01 | HEAP: Reliable Assessment of BGP Hijacking Attacks | arXiv:1607.00096 | Peer | ||||
M. Schuchard; N. Hopper | 2016-06-01 | E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives | arXiv:1606.08536 | Peer | ||||
P. Richter; G. Smaragdakis; D. Plonka; A. Berger | 2016-06-01 | Beyond Counting: New Perspectives on the Active IPv4 Address Space | arXiv:1606.00360 | Peer | ||||
D. Hauweele; B. Quoitin; C. Pelsser; R. Bush | 2016-05-01 | The Origin of BGP Duplicates | CoRes 2016 | Conference Paper | ||||
J. Klick; S. Lau; M. Wahlisch; V. Roth | 2016-05-01 | Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection | arXiv:1605.05856 | Peer | ||||
J. Schlamp; M. Wahlisch; T. Schmidt; G. Carle; E. Biersack | 2016-05-01 | CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP | arXiv:1605.00618 | Peer | ||||
M. Apostolaki; A. Zohar; L. Vanbever | 2016-05-01 | Hijacking Bitcoin: Routing Attacks on Cryptocurrencies | arXiv:1605.07524 | Peer | ||||
M. _osovi_; S. Obradovió; L. Trajkovi_ | 2016-05-01 | Classifying anomalous events in BGP datasets | 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) | Conference Paper | ||||
R. Beverly | 2016-05-01 | Yarrp’ing the Internet: Randomized High-Speed Active Topology Discovery | arXiv:1605.03999 | Peer | ||||
R. Nithyanand; R. Singh; S. Cho; P. Gill | 2016-05-01 | Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design | arXiv:1605.03596 | Peer | ||||
A. Akella | 2016-04-01 | ACM SIGCOMM Student Mentoring Column: On Testbeds and Datasets | ACM SIGCOMM Computer Communication Review | 46 | 2 | 40-42 | Peer | |
E. Rye; J. Roher; R. Beverly | 2016-04-01 | Revisiting AS-Level graph reduction | 2016 IEEE Conference on Computer Communications Workshops | Conference Paper | ||||
I. Livadariu; A. Elmokashfi; A. Dhamdhere | 2016-04-01 | Characterizing IPv6 control and data plane stability | IEEE Conference on Computer Communications (INFOCOM) | Conference Paper | ||||
S. Kirkpatrick | 2016-03-06 | Once the internet can measure itself | Philosophical Transactions: Mathematical, Physical, and Engineering Sciences | 374 | 2062 | 1-10 | Peer | |
B. Jones; N. Feamster; V. Paxson; N. Weaver; M. Allman | 2016-03-01 | Detecting DNS Root Manipulation | International Conference on Passive and Active Network Measurement | 276-288 | Conference Paper | |||
G. Nomikos; X. Dimitropoulos | 2016-03-01 | traIXroute: Detecting IXPs in traceroutepaths | International Conference on Passive and Active Network Measurement | 346-358 | Conference Paper | |||
Í._Cunha; P. Marchetta; M. Calder; Y. Chiu; B. Schlinker; B. Machado; A. Pescapè; V. Giotsas; H. Madhyastha; E. Katz-Bassett | 2016-03-01 | Sibyl: A Practical Internet Route Oracle | USENIX Symposium on Networked Systems Design and Implementation (NSDI) | Conference Paper | ||||
V. Giotsas; A. Dhamdhere; K. Claffy | 2016-03-01 | Periscope: Unifying Looking Glass Querying | Passive and Active Network Management Workshop (PAM) | Conference Paper | ||||
J. Czyz; M. Luckie; M. Allman; M. Bailey | 2016-02-01 | Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy | Network and Distributed Systems Security (NDSS) | Conference Paper | ||||
Q. Gao; F. Wang; L. Gao | 2016-01-01 | Quantifying AS Path Inflation by Routing Policies | International Journal of Future Generation Communication and Networking | Peer | ||||
R. Fanou; V. Sanchez; F. Valera; M. Mwangi; J. Coffin | 2016-01-01 | African Route Collectors Data Analyzer: a compass to support peering growth in the region | Presentation at Conference | Conference Paper | ||||
Y. Wang; J. Bi; K. Zhang | 2015-12-30 | A tool for tracing network data plane via SDN/OpenFlow | Science China Information Sciences | 60 | Peer | |||
B. Al-Musawi; P. Branch; G. Armitage | 2015-12-01 | Detecting BGP instability using Recurrence Quantification Analysis (RQA) | 2015 IEEE 34th International Performance Computing and Communications Conference | Conference Paper | ||||
B. Chandrasekaran; G. Smaragdakis; A. Berger; M. Luckie; K. Ng | 2015-12-01 | A Server-to-Server View of the Internet | ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNEXT) | Conference Paper | ||||
V. Giotsas; G. Smaragdakis; B. Huffaker; M. Luckie; K. Claffy | 2015-12-01 | Mapping Peering Interconnections to a Facility | ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNEXT) | Conference Paper | ||||
A. Johnson; R. Jansen; A. Jaggard; J. Feigenbaum; P. Syverson | 2015-11-01 | Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection | arXiv:1511.05453 | Peer | ||||
A. Shah; C. Papadopoulos | 2015-11-01 | Characterizing International BGP Detours | Computer Science Technical Report – Colorado State University | Peer | ||||
M. Kitsak; A. Elmokashfi; S. Havlin; D. Krioukov | 2015-11-01 | Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing | PLOS ONE | 01-Dec | Peer | |||
C. Orsini; A. King; A. Dainotti | 2015-10-01 | BGPStream: a software for live and historical BGP data analysis | Center for Applied Internet Data Analysis (CAIDA) | Peer | ||||
P. Barucca; D. Tantari; F. Lillo | 2015-10-01 | Centrality metrics and localization in core-periphery networks | arXiv:1510.01116 | Peer | ||||
A. Dainotti; K. Benson; A. King; B. Huffaker; E. Glatz; X. Dimitropoulos; P. Richter; A. Finamore; A. Snoeren | 2015-09-01 | Lost in Space: Improving Inference of IPv4 Address Space Utilization | Center for Applied Internet Data Analysis (CAIDA) | Peer | ||||
H. Alshamrani; B. Ghita; D. Lancaster | 2015-09-01 | Detecting IP Prefix hijacking using data reduction-based and Binary Search Algorithm | 2015 Internet Technologies and Applications | Conference Paper | ||||
A. Faggiani; E. Gregori; L. Lenzini; V. Luconi | 2015-08-01 | Measuring the Internet Topology with Smartphones | C2B(1)D ’15 Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data | 45-50 | Conference Paper | |||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2015-08-01 | A Novel Methodology to Address the Internet AS-level Data Incompleteness | IEEE/ACM Transactions on Networking (TON) | 23 | 4 | 1314-1327 | Peer | |
M. Raj; M. Mirzargar; R. Ricci; R. M. Kirby; R. T. Whitaker | 2015-06-01 | Path Boxplots: A Method for Characterizing Uncertainty in Path Ensembles on a Graph | Journal of Computational and Graphical Studies | Peer | ||||
Q. Zhang; X. Xu; Y. Zhu; T. Zhou | 2015-06-01 | Measuring multiple evolution mechanisms of complex networks | Scientific Reports | 5 | Peer | |||
C. Dietzel | 2015-05-17 | Improving Security and Resilience Capabilities of the Internet Infastructure | Technische Universitat Berlin | Peer | ||||
E. Carisimo; H. Galperin; J. Ignaci. Alvarez-Hamelin | 2015-05-01 | A new intrinsic way to measure IXP performance: an experience in Bolivia | arXiv:1505.00837 | Peer | ||||
F. Coras; J. Domingo-Pascual; A. Cabellos-Aparicio | 2015-04-01 | On the Scalability of LISP Mappings Caches | arXiv:1504.03004 | Peer | ||||
I. Livadariu; S. Ferlin;Ö._Alay; T. Dreibholz; A. Dhamdhere; A. Elmokashfi | 2015-04-01 | Leveraging the IPv4/IPv6 Identity Duality by using Multi-Path Transport | IEEE Global Internet Symposium (GI) | Conference Paper | ||||
D. Iamartino; C. Pelsser; R. Bush | 2015-03-01 | Measuring BGP Route Origin Registration and Validation | Passive and Active Measurement Workshop (PAM) | 8995 | 28-40 | Conference Paper | ||
E. Rye; J. Rohrer | 2015-03-01 | Graph reduction for emulated network experimentation | Unknown | Peer | ||||
R. Beverly; M. Luckie; L. Mosley; K. Claffy | 2015-03-01 | Measuring and Characterizing IPv6 Router Availability | Passive and Active Network Management Workshop (PAM) | 123-135 | Conference Paper | |||
R. Mazloum; J. Auge; D. Rossi; T. Friedman | 2015-03-01 | Errors announcing 32-bit ASNs in BGP routes | 2015 11th International Conference on the Design of Reliable Communication Networks | Conference Paper | ||||
V. Giotsas; M. Luckie; B. Huffaker; K. Claffy | 2015-03-01 | IPv6 AS Relationships, Clique, and Congruence | Passive and Active Network Management Workshop (PAM) | 111-122 | Conference Paper | |||
C. James; N. Carlsson | 2015-01-01 | Green Domino Incentives: Impact of Energy-aware Adaptive Link Rate Policies | ICPE ’15 Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering | 211-221 | Conference Paper | |||
Y. Lee; Y. Lee | 2015-01-01 | Yet Another BGP Archive Forensic Analysis Tool Using Hadoop and Hive | Journal of Korean Institute of Information Scientists and Engineers | 42 | 4 | 541-549 | Peer | |
A. Dainotti; C. Squarcella; E. Aben; K. Claffy; M. Chiesa; M. Russo; A. Pescapè | 2014-12-01 | Analysis of Country-wide Internet Outages Caused by Censorship | IEEE/ACM Transactions on Networking | 22 | 6 | 1964-1977 | Peer | |
J. Schlamp; J. Gustafsson; M. Wahlisch; T. Schmidt; G. Carle | 2014-12-01 | The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire | arXiv:1412.5052 | Peer | ||||
V. Giotsas; M. Luckie; B. Huffaker; K. Claffy | 2014-11-01 | Inferring Complex AS Relationships | Internet Measurement Conference (IMC) | 23-30 | Conference Paper | |||
A. Dainotti; K. Benson; A. King; K. Claffy; E. Glatz; X. Dimitropoulos; P. Richter; A. Finamore; A. Snoeren | 2014-10-01 | Lost in Space: Improving Inference of IPv4 Address Space Utilization | Center for Applied Internet Data Analysis (CAIDA) | Peer | ||||
H. Kim; D. Kwon; H. Ju | 2014-09-01 | Analysis of ICMP Policy for Edge Firewalls Using Active Probing | The 16th Asia-Pacific Network Operations and Management Symposium | Peer | ||||
A. Alwabel; M. Yu; Y. Zhang; J. Mirkovic | 2014-08-01 | SENSS: observe and control your own traffic in the internet | SIGCOMM ’14 Proceeding of the 2014 ACM Conference on SIGCOMM | 349-350 | Conference Paper | |||
A. Alwabel; M. Yu; Y. Zhang; J. Mirkovic | 2014-08-01 | SENSS: observe and control your own traffic in the internet | ACM SIGCOMM Computer Communication Review | 44 | 4 | 349-350 | Peer | |
S. Zhang; Y. Liu; D. Pei | 2014-08-01 | A Measurement study on BGP AS path looping (BAPL) behavior | 2014 23rd International Conference on Computer Communication and Networks | Conference Paper | ||||
L. Sani | 2014-07-01 | An Analysis of the Completeness of the Internet AS-Level Topology Discovered by Route Collectors | Ph.D. thesis, IMT – Institute for Advanced Studies | Self | ||||
M. Luckie | 2014-07-01 | Spurious Routes in public BGP Data | ACM SIGCOMM Computer Communication Review | 44 | 3 | 14-21 | Peer | |
M. Wubbeling | 2014-07-01 | Improved Routing Anomaly Detection to Protect End Users | GI FG SIDAR Graduierten-Workshop uber Reaktive Sicherheit | 6 | Self | |||
A. Faggiani; E. Gregori; L. Lenzini; V. Luconi; L. Sani; A. Improta | 2014-06-01 | A Study on Traceroute Potentiality in Revealing the Internet AS-Level Topology | Proceedings of IFIP TC-6 Networking | 01-Sep | Conference Paper | |||
A. Jaggard; A. Johnson; P. Syverson; J. Feigenbaum | 2014-06-01 | Representing Network Trust and Using It to Improve Anonymous Communication | arXiv:1406.3583 | Peer | ||||
M. Luckie | 2014-06-01 | Spurious Routes in BGP Data | ACM SIGCOMM Computer Communication Review (CCR) | 44 | 3 | 15-21 | Self | |
T. Griffin; Z. Mao | 2014-05-26 | Interdomain Routing Streams | Unknown | “ | ||||
A. Lutu; M. Bagnulo; J. Cid-Sueiro; O. Maennel | 2014-05-01 | Separating wheat from chaff: Winnowing unintended prefixes using machine learning | IEEE INFOCOM 2014 – IEEE Conference on Computer Communications | Conference Paper | ||||
P. Gutierrez | 2014-04-21 | BGP-4 Protocol Patterns and Their Impact on QoS Behavior | Self-Published | Self | ||||
A. Baumann; B. Fabian | 2014-04-01 | Who Runs the Internet? Classifying Autonomous Systems into Industries | Unknown | Conference Paper | ||||
A. Lodhi; A. Dhamdhere; C. Dovrolis | 2014-04-01 | Open Peering by Internet Transit Providers: Peer Preference or Peer Pressure? | IEEE Conference on Computer Communications (INFOCOM) | Conference Paper | ||||
A. Lodhi; N. Larson; A. Dhamdhere; C. Dovrolis; K. Claffy | 2014-04-01 | Using PeeringDB to Understand the Peering Ecosystem | ACM SIGCOMM Computer Communication Review (CCR) | 44 | 2 | 21-27 | Peer | |
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2014-04-01 | Improving the Reliability of Inter-AS Economic Inferences Through a Hygiene Phase on BGP Data | Computer Networks | 62 | 197-207 | Peer | ||
A. Gupta; M. Calder; N. Feamster; M. Chetty; E. Calandro; E. Katz-Bassett | 2014-03-01 | Peering at the Internet’s Frontier: A First Look at ISP Interconnectivity in Africa | Passive and Active Network Management Workshop (PAM) | 204-213 | Conference Paper | |||
M. Luckie; K. Claffy | 2014-03-01 | A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option | Passive and Active Network Measurement Workshop (PAM) | 8362 | 46-55 | Conference Paper | ||
M. Luckie; K. Claffy | 2014-03-01 | A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option | International Conference on Passive and Active Network Measurement | 46-55 | Conference Paper | |||
N. Brownlee | 2014-03-01 | On Searching for Patterns in Traceroute Responses | International Conference on Passive and Active Network Measurement | Conference Paper | ||||
G. Retvari; J. Tapolcai; A. Korosi;A.Majdan; Z. Heszberger | 2014-02-01 | Compressing IP Forwarding Tables: Towards Entropy Bounds and Beyond | arXiv:1402.1194 | Peer | ||||
J. Kim; N. Sarrar; A. Feldmann | 2014-02-01 | Watching the IPv6 Takeoff from an IXP’s Viewpoint | arXiv:1402.3982 | Peer | ||||
A. Elmokashfi; A. Dhamdhere | 2014-01-01 | Revisiting BGP Churn Growth | ACM SIGCOMM Computer Communictation Review (CCR) | 44 | 1 | 05-Dec | Peer | |
A. Elmokashfi; A. Dhamdhere | 2014-01-01 | Revisting BGP churn growth | ACM SIGCOMM Computer Communication Review | 44 | 1 | 05-Dec | Peer | |
E. Blanton; M. Tozal; K. Sarac; S. Fahmy | 2013-12-01 | Location matters: Eliciting responses to direct probes | 2013 IEEE 32nd International Performance Computing and Communications Conference | Conference Paper | ||||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2013-12-01 | Discovering the geographic properties of the Internet AS-level topology | Networking Science | 3 | 1 | 34-42 | Peer | |
F. Coras; J. Domingo-Pascual; D. Lewis; A. Cabellos-Aparicio | 2013-12-01 | An Analytical Model for Loc/ID Mappings Caches | arXiv:1312.1378 | Peer | ||||
I. Livadariu; A. Elmokashfi; A. Dahamdhere; K. Claffy | 2013-12-01 | A first look at IPv4 transfer markets | CoNEXT ’13 Proceedings of the ninth ACM Conference on Emerging Network Experiments and Technologies | 07-Dec | Conference Paper | |||
I. Livadariu; A. Elmokashfi; A. Dhamdhere; K. Claffy | 2013-12-01 | A First Look at IPv4 Transfer Markets | ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNEXT) | 07-Dec | Conference Paper | |||
M. Masoud; X. Hei; W. Cheng | 2013-12-01 | A graph-theoretic study of the flattening Internet AS topology | 2013 19th IEEE International Conference on Networks | Conference Paper | ||||
V. Giotsas; S. Zhou; M. Luckie; K. Claffy | 2013-12-01 | Interferring Multilateral Peering | ACM SIGCOMM Conference on emerging Networking EXperiments and Technologies (CoNEXT) | 247-258 | Conference Paper | |||
C. Olschanowsky; M. Lawrenc. Weikum; J. Smith; C. Papadopoulus; D. Massey | 2013-11-01 | Delivering diverse BGP data in real-time and through multi-format archiving | 2013 IEEE International Conference on Technologies for Homeland Security (HST) | Conference Paper | ||||
A. Khan; T. Kwon;H-c. Kim; Y. Choi | 2013-10-01 | AS-level topology collection through looking glass servers | Proceedings of the 2013 conference on Internet measurement | 235-242 | Conference Paper | |||
B. Kuerbis; H. Asghari; M. Mueller | 2013-10-01 | In the Eye of the Beholder: The Role of Needs-Based Assessment in the IP Address Market | GigaNet: Global Internet Governance Academic Network, Annual Symposium 2013 | Conference Paper | ||||
M. Luckie; B. Huffaker; K. Claffy; A. Dhamdhere; V. Giotsas | 2013-10-01 | AS Relationships, Customer Cones, and Validation | Internet Measurement Conference (IMC) | 243-256 | Conference Paper | |||
M. Luckie; R. Beverley; W. Brinkmeyer; K. Claffy | 2013-10-01 | Speedtrap: Internet-Scale IPv6 Alias Resolution | Internet Measurement Conference (IMC) | 119-126 | Conference Paper | |||
M. Xiao-yang; C. Yue-xin; D. Yue-hua; Z. Hui | 2013-10-01 | A novel algorithm for AS path inference based on BGP routing tables | Proceedings of the 2013 3rd International Conference on Computer Science and Network Technology | Conference Paper | ||||
G. Wang; C. Zhang; X. Qiu; Z. Zeng | 2013-07-01 | Replacing Network Coordinate System with Internet Delay Matrix Service (IDMS): A Case Study in Chinese Internet | arXiv:1307.0349 | Peer | ||||
H. Xu; B. Li | 2013-07-01 | Reducing Electricity Demand Charge for Data Centers with Partial Execution | arXiv:1307.5442 | Peer | ||||
Z. Zhao; J. Bi | 2013-07-01 | Characterizing and analysis of the flattening Internet topology | 2013 IEEE Symposium on Computers and Communications (ISCC) | 219-225 | Conference Paper | |||
C. Sowmyashree | 2013-06-01 | A Heuristic Approach for Detection of Malicious Activity at Autonomous System | International Journal of Scientific and Research Publications | 3 | 6 | Peer | ||
S. Meenakshi; S. Raghavan | 2013-06-01 | Forecasting and Event Detection in Internet Resource Dynamics using Time Series Models | CoRR | Peer | ||||
S. Meenakshi; S. Raghavan | 2013-06-01 | Internet Control Plane Event Identification using Model Based Change Point Detection Techniques | arXiv:1306.6428 | Peer | ||||
A. Improta | 2013-05-01 | On the Analysis of the Internet from a Geographic and Economic Perspective via BGP Raw Data | Ph.D. thesis | Self | ||||
R. Rossi; S. Fahmy; N. Talukder | 2013-05-01 | A multi-level approach for evaluating internet topology generators | 2013 IFIP Networking Conference | Conference Paper | ||||
D. Miyamoto; T. Miyachi | 2013-03-01 | COSMO – emulation of internet traffic: poster abstract | SimuTools ’13 Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques | Conference Paper | ||||
D. Papadimitriou; D. Careglio; F. Tarissan; P. Demeester | 2013-03-01 | Internet routing paths stability model and relation to forwarding paths | 2013 9th International Conference on the Design of Reliable Communication Networks | Conference Paper | ||||
R. Beverly; W. Brinkmeyer; M. Luckie; J. Roher | 2013-03-01 | IPv6 Alias Resolution via Induced Fragmentation | Passive and Active Network Measurement Workshop (PAM) | 158-167 | Conference Paper | |||
R. Clegg; R. Landa; H. Haddadi; M. Rio | 2013-03-01 | Measuring the likelihood of models for network evolution | arXiv:1303.6784 | Peer | ||||
R. Clegg; R. Landa; U. Harder; M. Rio | 2013-03-01 | A likelihood based framework for assessing network evolution models tested on real network data | arXiv:1303.6794 | Peer | ||||
R. Hiran; N. Carlsson; P. Gill | 2013-03-01 | Characterizing Large-Scale Routing Anomalies: A Case Study of the China Telecom Incident | International Conference on Passive and Active Network Measurement | 7799 | 229-238 | Conference Paper | ||
L. Howard; K. Brooks | 2013-01-01 | Assessing the Supply Curve in the IPv4 Address Market | Unknown | Peer? | ||||
S. Feld; N. Pohlmann; M. Sparenberg; B. Wichmann | 2012-12-01 | Analyzing G-20’s Key Autonomous Systems and their Intermeshing using AS-Analyzer | ISSE 2012 Securing Electronic Business Processes | 228-242 | Peer | |||
A. Dhamdere; M. Luckie; B. Huffaker; K. Claffy; A. Elmokashfi; E. Aben | 2012-11-01 | Measuring and Deployment of IPv6: Topology, Routing and Performance | Internet Measurement Conference (IMC) | 537-550 | Conference Paper | |||
A. Dhamdhere; M. Luckie; B. Huffaker; K. Claffy; A. Elmokashfi; E. Aben | 2012-11-01 | Measuring the deployment of IPv6: topology, routing, and performance | IMC ’12 Proceedings of the 2012 Internet Measurement Conference | 537-550 | Conference Paper | |||
A. Improta; E. Gregori; L. Lenzini; L. Rossi; L. Sani | 2012-11-01 | On the Incompleteness of the AS-Level graph: a Novel Methodology for BGP Route Collector Placement | Internet Measurement Conference (IMC) | Conference Paper | ||||
D. Krioukov; M. Kitsak; R. Sinkovits; D. Rideout; D. Meyer; M. Boguñá | 2012-11-01 | Network Cosmology | Nature Scientific Reports | 2 | 793 | Peer | ||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2012-11-01 | On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement | IMC ’12 Proceedings of the 2012 Internet Measurement Conference | 253-264 | Conference Paper | |||
V. Khare; Q. Ju; B. Zhang | 2012-11-01 | Concurrent prefix hijacks: occurrence and impacts | Proceedings of the 2012 Internet Measurement Conference | 29-36 | Conference Paper | |||
J. Li; T. Ehrenkranz; P. Elliot | 2012-10-01 | Buddyguard: A buddy system for fast and reliable detection of IP prex anomalies | 20th IEEE International Conference on Network Protocols | Conference Paper | ||||
M. Wachs; C. Grothoff; R. Thurimella | 2012-10-01 | Partitioning the Internet | 2012 7th International Conference on Risks and Security of Internet and System | Conference Paper | ||||
R. Rossi; D. Gleich; A. Gebremedhin; M. Patwary | 2012-10-01 | What if CLIQUE were fast? Maximum Cliques in Information Networks and Strong Components in Temporal Networks | arXiv:1210.5802 | Peer | ||||
A. Khurshid; W. Zhou; M. Caesar; P. Brighto. Godfrey | 2012-08-01 | VeriFlow: verifying network-wide invariants in real-time | Proceedings of the first workshop on Hot topics in software defined networks | 49-54 | Conference Paper | |||
M. Wählisch; O. Maennel | 2012-08-01 | Toward detecting BGP route hijacking using the RPKI | ACM SIGCOMM Computer Communication Review | 103-104 | Peer | |||
Y. Wang; J. Bi; J. Wang | 2012-07-01 | Towards an Aggregation-Aware Internet Routing | 2012 21st International Conference on Computer Communications and Networks (ICCCN) | Conference Paper | ||||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2012-06-01 | Selecting new BGP Feeders to Address the Incompleteness of the Internet AS-level graph | Proceedings of Informatica Quantitativa (InfQ) Workshop | Conference Paper | ||||
H. Yin; H. Chang; F. Liu; T. Zhan; Y. Zhan; B. Li | 2012-06-01 | Discovering a Large Scale Internet Topology: Complementary and Contrast View | 2012 IEEE 11th International Conference on Trust, Security, and Privacy in Computing and Communications | Conference Paper | ||||
H. Yin; H. Chang; F. Liu; T. Zhan; Y. Zhang; B. Li | 2012-06-01 | Discovering a Large Scale Internet Topology: Complementary and Contrast View | 2012 IEEE 11th International Conference on Trust, Security, and Privacy in Computing and Communications | Conference Paper | ||||
M. Tang; Y. Jiang; J. Liu; X. Liu | 2012-06-01 | Location-Aware Collaborative Filtering for QoS-Based Service Recommendation | 2012 IEEE 19th International Conference on Web Services | Conference Paper | ||||
P. Cheng; J. Park; K. Patel; S. Amante; L. Zhang | 2012-06-01 | Explaining BGP Slow Table Transfers | 2012 IEEE 32nd International Conference on Distributed Computing Systems | Conference Paper | ||||
V. Giotsas; S. Zhou | 2012-06-01 | Valley-free violation in Internet routing – Analysis based on BGP Community data | 2012 IEEE International Conference on Communications (ICC) | Conference Paper | ||||
A. Dhamdhere; H. Cherukuru; C. Dovrolis; K. Claffy | 2012-05-01 | Measuring the Evolution of Internet Peering Agreements | IFIP Networking | 7290 | 136-148 | Conference Paper | ||
D. Saucez; B. Donnet | 2012-05-01 | On the Dynamics of Locators in LISP | International Conference on Research in Networking | 385-396 | Conference Paper | |||
Y. Liu; X. Luo; R. Chang; J. Su | 2012-05-01 | Characterizing Inter-domain Rerouting after Japan Earthquake | International Conference on Research in Networking | 124-135 | Conference Paper | |||
K. Wehmuth; A. Ziviani | 2012-04-01 | Distributed assessment of the closeness centrality ranking in complex networks | SIMPLEX ’12 Proceedings of the Fourth Annual Workshop on Simplifying Complex Networks for Practitioners | 43-48 | Conference Paper | |||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2012-03-01 | Inferring Geography from BGP Raw Data | Proceedings of IEEE INFOCOM NetSciCom | 208-213 | Conference Paper | |||
L. Chen; X. Shi; D. Chiu | 2012-03-01 | From ISP Address Announcement Patterns to Routing Scalability | International Workshop on Traffic Monitoring and Analysis | 43-47 | Conference Paper | |||
Y. Tian; R. Dey; Y. Liu; K. Ross | 2012-03-01 | China’s Internet: Topology mapping and geolocating | 2012 Proceedings IEEE INFOCOM | Conference Paper | ||||
R. Vaidyanathan; A. Ghosh; Y. Sawaya; A. Kubota | 2012-02-01 | On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic | 2012 International Conference on Computing, Networking and Communications (ICNC) | Conference Paper | ||||
A. Dainotti; R. Amman; E. Aben; K. Claffy | 2012-01-01 | Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the Internet | ACM SIGCOMM Computer Communications Review (CCR) | 42 | 1 | 31-39 | Peer | |
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2012-01-01 | Selecting new BGP Feeders to Address the Incompleteness of the Internet AS-level Graph | http://ceur-ws.org | Peer | ||||
M. Motiwala; A. Dhamdhere; N. Feamster; A. Lakhina | 2012-01-01 | Towards a Cost Model for Network Traffic | ACM SIGCOMM Computer Communication Review (CCR) | 42 | 1 | 54-60 | Peer | |
P. Dimitri; C. Albert | 2012-01-01 | Analysis of Path-vector Routing Stability | CoRR | Peer | ||||
R. Motamedi; R. Rejaie; R. Cuevas | 2012-01-01 | Understanding the effect of streaming overlay construction on AS level traffic | Unknown | Peer | ||||
S. Feld; T. Perrei; N. Pohlmann; M. Schupp | 2012-01-01 | Objectives and Added Value of an Internet Key Figure System for Germany | ISSE 2011 Securing Electronic Business Processes | 340 | Conference | |||
M. Saiprasad; A. Srinivas; T. Mahesh; R. Saty. Teja | 2011-12-01 | A Framework for Modeling Internet Topology Dynamics and Discovering Missing Links in the Internet Topology | International Journal of Engineering Research and Applications | 1 | 4 | 2118-2123 | Peer | |
Z. Uzmi; M. Nebel; A. Tariq; S. Jawad; R. Chen; A. Shaikh; J. Wang; P. Francis | 2011-12-01 | SMALTA: practical and near-optimal FIB aggregation | CoNEXT ’11 Proceedings of the Seventh Conference on emerging Network Experiments and Technology | 29 | Conference Paper | |||
A. Dainotti; C. Squarcella; E. Aben; K. Claffy; M. Chiesa; M. Russo; A. Pescape | 2011-11-01 | Analysis of country-wide internet outages caused by censorship | IMC ’11 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement | Jan-18 | Conference Paper | |||
A. Dainotti; C. Squarcella; E. Aben; K. Claffy; M. Chiesa; M. Russo; A. Pescapè | 2011-11-01 | Analysis of Country-wide Internet Outages Caused by Censorship | Internet Measurement Conference (IMC) | Jan-18 | Conference Paper | |||
K. Chen; C. Hu | 2011-11-01 | Border gateway protocol monitoring system can be cost effective | IET Communications | 5 | 15 | 2231-2240 | Peer | |
R. Vaidyanathan; A. Ghosh; A. Naidu; A. Yamada; A. Kubota; Y. Sawaya; Y. Miyake | 2011-11-01 | Method, apparatus and program for detecting spoofed network traffic | Patent Proposal | “ | ||||
A. Elmokashfi; A. Kvalbein; C. Dovrolis | 2011-10-01 | BGP Churn Evolution: A Perspective From the Core | IEEE/ACM Transactions on Networking (TON) | 20 | 2 | 571-584 | Peer | |
P. Mittal; D. Kim; Y. Hu; M. Caesar | 2011-10-01 | Mirage: Towards Deployable DDoS Defense for Web Applications | arXiv:1110.1060 | Peer | ||||
Y. Wang; J. Bi; J. Wu | 2011-10-01 | AIDR: Aggregation of BGP routing table with AS path stretch | 2011 19th IEEE International Conference on Network Protocols | Conference Paper | ||||
S. Hong; J. Hong; H. Ju | 2011-09-01 | IP prefix hijacking detection using the collection of AS characteristics | 2011 13th Asia-Pacific Network Operations and Management Symposium | Conference Paper | ||||
T. Kim; H. Ju | 2011-09-01 | Effective DNS server fingerprinting method | 2011 13th Asia-Pacific Network Operations and Management Symposium | Conference Paper | ||||
M. Konte; N. Feamster | 2011-08-01 | Wide-area routing dynamics of malicious networks | Proceedings of the ACM SIGCOMM 2011 conference | 432-433 | Conference Paper | |||
S. Lally; T. Farah; R. Gill; R. Paul; N. Al-Rousan; L. Trajkovic | 2011-08-01 | Collection and characterization of BCNET BGP traffic | Proceedings of the 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing | Conference Paper | ||||
V. Giotsas; S. Zhou | 2011-08-01 | Detecting and assessing the hybrid IPv4/IPv6 as relationships | SIGCOMM ’11 Proceedings of the ACM SIGCOMM 2011 conference | 424-425 | Conference Paper | |||
G. Ausiello; D. Firmani; L. Laura | 2011-07-01 | Real-Time anomalies detection and analysis of network structure, with application to the Autonomous System network | 2011 7th International Wireless Communications and Mobile Computing Conference | Conference Paper | ||||
A. Elmokasfi; A. Kvalbein; T. Cicic | 2011-06-01 | On Update Rate-Limiting in BGP | 2011 IEEE International Conference on Communications | Conference Paper | ||||
G. Vasileios; Z. Shi | 2011-06-01 | Inferring AS Relationships from BGP attributes | Unknown | Peer | ||||
V. Giotsas; S. Zhou | 2011-06-01 | Inferring Internet AS Relationships Based on BGP Routing Policies | arXiv:1106.2417 | Peer | ||||
W. Zhou; Q. Fei; S. Sun; T. Tao; A. Haeberlen; Z. Ives; B. Loo; M. Sherr | 2011-06-01 | NetTrails: a declarative platform for maintaining and querying provenance in distributed systems | SIGMOD ’11 Proceedings of the 2011 ACM SIGMOD International Conference on Management of data | 1323-1326 | Conference Paper | |||
Y. Xiang; X. Yin; Z. Wang; J. Wu | 2011-06-01 | Internet Flattening: Monitoring and Analysis of Inter-Domain Routing | 2011 IEEE International Conference on Communications (ICC) | Conference Paper | ||||
E. Gregori; A. Improta; L. Lenzini; L. Rossi; L. Sani | 2011-05-01 | BGP and Inter-AS Economic Relationships | Proceedings of IFIP TC-6 Networking | 2 | 54-67 | Conference Paper | ||
Y. He; G. Siganos; M. Faloutsos; S. Krishnamurthy | 2011-04-11 | A Systematic Framework for Unearthing the Missing Links: Measurements and Impact | 4th USENIX Symposium on Network Systems Design & Implementation | 187-200 | Conference Paper | |||
G. Zhang; B. Quoitin; S. Zhou | 2011-04-01 | Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet topologies | Computer Communications | 34 | 5 | 649-657 | Peer | |
Q. Li; D. Wang; M. Xu; J. Yang | 2011-04-01 | On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation | 2011 Proceedings IEEE INFOCOM | Conference Paper | ||||
X. Wang; O. Bonaventure; P. Zhu | 2011-04-01 | Stabilizing BGP routing without harming convergence | 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Conference Paper | ||||
Y. Chen; S. Jain; V. Adhikari; Z. Zhang; K. Xu | 2011-04-01 | A first look at inter-data center traffic characteristics via Yahoo! datasets | 2011 Proceedings IEEE INFOCOM | Conference Paper | ||||
A. Dhamdhere; C. Dovrolis | 2011-03-01 | Twelve Years in the Evolution of the Internet Ecosystem | IEEE/ACM Transactions on Networking (TON) | 19 | 5 | 1420-1433 | Peer | |
C. Pelsser; O. Maennel; P. Mohapatra; R. Bush; K. Patel | 2011-03-01 | Route Flap Damping Made Usable | Passive and Active Measurement | Conference Paper | ||||
K. Gadkari; S. DiBenedetto; D. Massey; C. Papadopoulos | 2011-03-01 | Dynamics of RIB Usage at An Edge Router | Unknown | Peer | ||||
M. Watari; A. Tachibana; S. Ano | 2011-03-01 | Inferring the Origin of Routing Changes Based on Preferred Path Changes | Passive and Active Measurement Workshop | 6579 | 163-172 | Conference Paper | ||
X. Xu; Z. Mao; J. Halderman | 2011-03-01 | Internet Censorship in China: Where Does the Filtering Occur? | International Conference on Passive and Active Network Measurement | 133-142 | Conference Paper | |||
I. Daubechies; K. Drakakis; T. Khovanova | 2011-01-01 | A Detailed Study of the Attachment Strategies of New Autonomous Systems in the AS Connectivity Graph | Internet Mathematics Journal | 2 | 2 | 185-246 | Peer | |
M. Cazares; J. Bartlett; C. Olschanowsky; D. Massey | 2011-01-01 | BGPmon: Towards a More Robust, Fault-Tolerant Border Gateway Protocol (BGP) Monitoring System and Preliminary Ipv6 Reachability Results | Unknown | Peer | ||||
R. Vaidyanathan; A. Ghosh;Y-H. Cheng; A. Yamada; Y. Miyake | 2010-12-01 | On the use of BGP AS Numbers to detect spoofing | 2010 IEEE Globecom Workshops | Conference Paper | ||||
W. Wu; D. Ji; Y. Lan; T. Wu | 2010-12-01 | Power-Aware TCAMs for Routing Table Lookup | GREENCOM-CPSCOM ’10 Proceedings of the 2010 IEEE/ACM International Conference on Green Computing and Communications & International Conference on Cyber, Physical, and Social Computing | 425-429 | Conference Paper | |||
Y. Wang; J. Bi; J. Wu | 2010-12-01 | Empirical Analysis of Core-Edge Separation by Decomposing Internet Topology Graph | 2010 IEEE Gobal Telecommunications Conference GLOBECOM 2010 | Conference Paper | ||||
A. Dhamdhere; C. Dovrolis; P. Francois | 2010-10-01 | A Value-based Framework for Internet Peering Agreements | International Teletraffic Congress (ITC) | Conference Paper | ||||
G. Huston; M. Rossi; G. Armitage | 2010-10-01 | A Technique for Reducing BGP Update Announcements through Path Exploration Damping | IEEE Journal on Selected Areas in Communications (JSAC) | 28 | 8 | 1271-1286 | Peer | |
M. Ahmad; R. Guha | 2010-10-01 | Impact of Internet exchange points on Internet topology evolution | IEEE Local Computer Network Conference | Conference Paper | ||||
L. Zhang | 2010-09-01 | 6Watch: Gauging the Global Rollout of IPv6 | Presentation at University | Self | ||||
L. Trajkovic | 2010-08-01 | Analysis of Internet Topologies | IEEE Circuits and Systems Magazine | 10 | 3 | 48-54 | Peer | |
W. Zhang; X. Yin; J. Wu; W. Zhang; S. Huang | 2010-08-01 | Real Aggregation for Reducing Routing Information Base Size | Journal of Convergence Information Technology | 5 | 6 | Peer | ||
K. Sriram; P. Gleichmann;Y-T. Kim; D. Montgomery | 2010-07-01 | Enhanced Efficiency of Mapping Distribution Protocols in Scalable Routing and Addressing Architecture | ICCCN | Peer | ||||
NIS. BG. Securit. Team | 2010-07-01 | Measurement Data on A. SET and AGGREGATOR: Implications for {Prefix, Origin} Validation Algorithms | Presentation at National Institute of Standards and Technology | Peer | ||||
L. Subedi; L. Trajkovic | 2010-06-01 | Spectral analysis of Internet topology graphs | IEEE International Symposium on Circuits and Systems | Conference Paper | ||||
A. Khan | 2010-04-01 | Inter-domain Routing (BGP) Security [IP Prefix Hijacking] | Presentation | Self | ||||
B. Huffaker; A. Dhamdhere; M. Fomenkov; K. Claffy | 2010-04-01 | Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers | Passive and Active Network Management Workshop (PAM) | Conference Paper | ||||
P-c. Cheng; X. Zhao; B. Zhang; L. Zhang | 2010-04-01 | Longitudinal study of BGP monitor session failures | ACM SIGCOMM Computer Communications Review (CCR) | 40 | 2 | 34-42 | Peer | |
P-C. Cheng; X. Zhao; B. Zhang; L. Zhang | 2010-04-01 | Longitudinal study of BGP monitor session failures | ACM SIGCOMM Computer Communication Review | 40 | 2 | 34-42 | Peer | |
A. Kalafut; C. Shue; M. Gupta | 2010-03-01 | Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems | 2010 Proceedings IEEE INFOCOM | Conference Paper | ||||
F. Papdopoulos; D. Krioukov; M. Boguñá; A. Vahdat | 2010-03-01 | Greedy Forward in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces | IEEE Conference on Computer Communications (INFOCOM) | Conference Paper | ||||
R. Khosla; S. Fahmy; Y. Hu; J. Neville | 2010-03-01 | Predicting Prefix Availability in the Internet | 2010 Proceedings IEEE INFOCOM | Conference Paper | ||||
S. DiBenedetto; A. Stone; M. Strout; D. Massey | 2010-03-01 | Simulating Internet Scale Topologies with Metarouting | Colorado State University – Technical Report | Peer | ||||
S. Shakkottai; M. Fomenkov; R. Koga; D. Krioukov; K. Claffy | 2010-03-01 | Evolution of the Internet AS-Level Ecosystem | European Physical Journal B | 74 | 2 | 271-278 | Peer | |
X. Zhao; Y. Liu; L. Wang; B. Zhang | 2010-03-01 | On the Aggregatability of Router Forwarding Tables | 2010 Proceedings IEEE INFOCOM | Conference Paper | ||||
Y. Wang; J. Bi; J. Wu | 2010-03-01 | Empirical Evaluation for the Impact of Core-Edge Separation on Internet Routing Scalability | 2010 INFOCOM IEEE Conference on Computer Communications Workshops | Conference Paper | ||||
Y. Wang; J. Bi; J. Wu | 2010-03-01 | Empirical Evaluation for the Impact of Core-Edge Separation on Internet Routing Scalability | 2010 INFOCOM IEEE Conference on Computer Communications Workshops | Conference Paper | ||||
R. Beverly; A. Berger | 2010-02-01 | Directed Probing for Efficient and Accurate Active Measurements | AIMS-2 Workshop on Active Internet Measurements | Conference Paper | ||||
M. Guidry; Y. Shankar | 2010-01-01 | BGP Behavior through Analysis of Prefix Beacons Presentation | Self-Published | Self | ||||
M. Guidry; Y. Shankar | 2010-01-01 | BGP Behavior through Analysis of Prefix Beacons Paper | Self-Published | Self | ||||
M. Wahlisch | 2010-01-01 | Modeling the Network Topology | Modeling and Tools for Network Simulation | Peer | ||||
T. Huang; C. Hong | 2010-01-01 | Mining NANOG Mailing List | Unknown | Peer | ||||
X-Z. Jiang;M-W. Xu; | 2010-01-01 | Distributed Control Plane: Adaptive Load Balancing for Parallel BGP Route Computing | Chinese Journal of Computers | 9 | 1591-1601 | Peer | ||
C. McArthur; M. Guirguis | 2009-12-01 | Stealthy IP Prefix Hijacking: Don’t Bite Off More Than You Can Chew | GLOBECOM 2009 – 2009 IEEE Global Telecommunications Conference | Conference Paper | ||||
J. Muir; P. va. Oorschot | 2009-12-01 | Internet Geolocation: Evasion and counterevasion | ACM Computing Surveys (CSUR) | 42 | 4 | Peer | ||
K. Chen; C. Hu; W. Zhang; Y. Chen; B. Liu | 2009-12-01 | On the Eyeshots of BGP Vantage Points | GLOBECOM 2009 – 2009 IEEE Global Telecommunications Conference | Conference Paper | ||||
P. Arjona-Villicana; C. Constantinou; A. Stpanenko | 2009-12-01 | The Internet’s unexploited path diversity | arXiv:0912.5218 | Peer | ||||
S. Strowes; C. Perkins | 2009-12-01 | Deterministic, reduced-visibility inter-domain forwarding | Co-Next Student Workshop ’09 Proceedings of the 5th international workshop on Emerging networking experiments and technologies | 09-Oct | Conference Paper | |||
D. Krioukov; F. Papdopoulos; A. Vahdat; M. Boguñá | 2009-11-01 | On Curvature and Temperature of Complex Networks | Physical Review E | 80 | 35101 | Peer | ||
P. Dong; H. Wang; Y. Qin; H. Zhang;S-Y. Kuo | 2009-11-01 | Evaluation of Scalable Routing Architecture Based on Locator/Identifier Separation | 2009 IEEE Globecom Workshops | Conference Paper | ||||
P. Merindol; V. Va. de. Schreick; B. Donnet; O. Bonaventure;J-J. Pansiot | 2009-11-01 | Quantifying ases multiconnectivity using multicast information | IMC ’09 Proceedings of the ninth ACM SIGCOMM conference on Internet measurement | 370-376 | Conference Paper | |||
R. Beverly; A. Berger; Y. Hyun; K. Claffy | 2009-11-01 | Understanding the Efficacy of Deployed Internet Source Address Validation Filtering | Internet Measurement Conference (IMC) | Conference Paper | ||||
R. Clegg; C. D. Cairano-Gilfedder; S. Zhou | 2009-10-01 | A critical look at power law modelling of the Internet | arXiv:0910.2140 | Peer | ||||
S. Rao; V. Rao; V. Rao; D. Kumar; G. Anuradha; D. Rao; P. Chandra; K. Chaitanya; T. Anand | 2009-10-01 | Autonomous Systems from the View of Multiple Vantage Points | International Journal of Computer Science and Network Security | 9 | 10 | Peer | ||
H. Haddadi; D. Fay; A. Jamakovic; O. Maennel; A. Moore; R. Mortier; S. Uhlig | 2009-09-01 | On the importance of local connectivity for Internet topology models | 2009 21st International Teletraffic Congress | Conference Paper | ||||
F. Papdopoulos; D. Krioukov; M. Boguñá; A. Vahdat | 2009-07-01 | Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces: Technical Report | Cooperative Association for Internet Data Analysis (CAIDA) | Peer | ||||
R. Clegg; R. Landa; M. Rio; U. Harder | 2009-07-01 | A likelihood based framework for assessing network evolution models tested on real network data | Proceedings of the 1st Annual Workshop on Simplifying Complex Network for Practictioners | Conference Paper | ||||
Y. Shavitt; E. Shir; U. Weinsberg | 2009-06-08 | Near-Deterministic Inference of AS Relationships | Presentation | Peer | ||||
A. Khan; T. Kwon; H. Kim | 2009-06-01 | Probabilistic IP prefix authentication (PIPA) for prefix hijacking | CFI ’09 Proceedings of the 4th International Conference on Future Internet Technologies | 52-55 | Conference Paper | |||
X. Yin; X. Wu; Z. Wang | 2009-06-01 | Measuring IP Address Fragmentation from BGP Routing Dynamics | International Conference on Scalable Information Systems | 46-57 | Conference Paper | |||
Y. Shavitt; E. Shir; U. Weinsberg | 2009-06-01 | Near-Deterministic inference of AS relationships | 2009 10th International Conference on Telecommunications | Conference Paper | ||||
B. Donnet | 2009-05-01 | Incentives fo BGP Guided IP-Level Topology Discovery | International Workshop on Traffic Monitoring and Analysis | Conference Paper | ||||
C. Magnien; F. Ouédraogo; G. Valadon; M. Latapy | 2009-05-01 | Fast Dynamics in Internet Topology: Observations and First Explanations | 2009 Fourth International Conference on Internet Monitoring and Protection | Conference Paper | ||||
M. Najiminaini; L. Subedi; L. Trajkovic | 2009-05-01 | Analysis of Internet topologies: A historical view | IEEE International Symposium on Circuits and Systems | Conference Paper | ||||
C. Lumezanu; R. Baden; N. Spring; B. Bhattacharjee | 2009-04-01 | Triangle Inequality and Routing Policy Violations in the Internet | International Conference on Passive and Active Network Measurement | 5448 | 45-54 | Conference Paper | ||
E. Karpilovsky; A. Gerber; D. Pei; J. Rexford; A. Shaikh | 2009-04-01 | Quantifying the Extent of IPv6 Deployment | International Conference on Passive and Active Network Measurement | 13-22 | Conference Paper | |||
R. Clegg; R. Landa; U. Harder; M. Rio | 2009-04-01 | Evaluating and Optimising Models of Network Growth | arXiv:0904.0785 | Peer | ||||
Y. Shavitt; U. Weinsberg | 2009-04-01 | Quantifying the Importance of Vantage Points Distribution in Internet Topology Measurements | IEEE INFOCOMM 2009 | Conference Paper | ||||
H. Yan; R. Oliveira; K. Burnett; D. Matthews; L. Zhang; D. Massey | 2009-03-01 | BGPmon: A Real-Time, Scalable, Extensible Monitoring System | 2009 Cybersecurity Applications & Technology Conference for Homeland Security | Conference Paper | ||||
J. Karlin; S. Forrest; J. Rexford | 2009-03-01 | Nation-State Routing: Censorship, Wiretapping, and BGP | arXiv:0903.3218 | Peer | ||||
K. Claffy; Y. Hyun;K_Keys; M. Fomenkov; D. Krioukov | 2009-03-01 | Internet Mapping: From Art to Science | 2009 Cybersecurity Applications & Technology Conference for Homeland Security | Conference Paper | ||||
K. Sriram; O. Borchert; O. Kim; P. Gleichmann; D. Montgomery | 2009-03-01 | A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms | 2009 Cybersecurity Applications & Technology Conference for Homeland Security | Conference Paper | ||||
X. Wu; X. Yin; Z. Wang; M. Tang | 2009-03-01 | A three-step dynamic threshold method to cluster BGP updates into routing events | 2009 International Symposium on Autonomous Decentralized Systems | Conference Paper | ||||
S. Shakkottai; M. Fomenkov; R. Koga; D. Krioukov; K. Claffy | 2009-02-01 | Evolution of the Internet AS-Level Ecosystem | International Conference on Complex Sciences (Complex) | Conference Paper | ||||
S. Zhou | 2009-02-01 | Power Law Modeling of Internet Topology | International Conference on Complex Sciences | Conference Paper | ||||
Y. Hyun | 2009-02-01 | Archipelago: Measurement Infrastructure | ISMA 2009 AIMS Workshop | Conference Paper | ||||
A. Rasti | 2009-01-01 | P2P Overlay, Internet Underlay, and Their Mutual Impact | Unknown | Peer | ||||
G. Zhang | 2009-01-01 | Measuring the Impacts of Sampling Bias on Internet AS-Level Topology Inference | 2009 WRI International Conference on Communications and Mobile Computing | Conference Paper | ||||
H. Yan; D. Massey; E. McCracken; L. Wang | 2009-01-01 | BGPMon and NetVews: Real-Time BGP Monitoring System | IEEE INFOCOM, demo | Conference Paper | ||||
S. Strowes; C. Perkins | 2009-01-01 | Randomness for Reduced-State Inter-Domain Forwarding | Unpublished | Self | ||||
W. Li; J. Yang | 2009-01-01 | Comparing Networks from a Data-Analysis Perspective | International Conference on Complex Sciences | 1907-1916 | Conference Paper | |||
J. Leskovec; D. Chakrabarty; J. Kleinberg; C. Faloutsos; Z. Ghahramani | 2008-12-01 | Kronecker Graphs: An Approach to Modeling Networks | arXiv:0812.4905 | Peer | ||||
J. Li; D. Dou; S. Kim; H. Qin; Y. Wang | 2008-12-01 | On Knowledge-Based Classification of Abnormal BGP Events | International Conference on Information Systems Security | 267-271 | Conference Paper | |||
K. _Jang; D. _Lee; S. _Moon; G. _Iannaccone | 2008-12-01 | Internet Sibilla: utilizing DNS for delay estimation service | CoNEXT ’08 Proceedings of the 2008 ACM CoNext Conference | 54 | Conference Paper | |||
N. Wang; B. Wang | 2008-12-01 | A Secure Inter-Domain Routing Protocol | 2008 Second International Symposium on Intelligent Information Technology Application | Conference Paper | ||||
S. L. Blond; A. Legout; W. Dabbous | 2008-12-01 | Pushing BitTorrent Locality to the Limit | arXiv:0812.0581 | Peer | ||||
T. McGregor | 2008-12-01 | Case Studies in Computer Network Measurement | 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies | Conference Paper | ||||
W. Eddy | 2008-12-01 | Basics properties of the IPv6 AS-level topology | ACM SIGMETRICS Performance Evaluation Review | 36 | 3 | 50-57 | Peer | |
K. Levanti; H. Kim | 2008-11-01 | P2P-Based Internet-Wide Management of Interdomain Routing | IEEE GLOBECOM 2008 | Conference Paper | ||||
A. Dhamdhere; C. Dovrolis | 2008-10-01 | Ten years in the evolution of the internet ecosystem | IMC ’08 Proceedings of the 8th ACM SIGCOMM conference on Internet measurement | Conference Paper | ||||
J. Leskovec; K. Jang; A. Dasgupta; M. Mahoney | 2008-10-01 | Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters | arXiv:0810.1355 | Peer | ||||
M. Roughan; S. Tuke; O. Maennel | 2008-10-01 | Bigfoot, Sasquatch, the Yeti and Other Missing Links: What We Don’t Know About the AS Graph | IMC ’08 Proceedings of the 8th ACM SIGCOMM conference on Internet measurement | 325-330 | Conference Paper | |||
W. Zhang; X. Yin; J. Wu; Z. Whang | 2008-10-01 | Research on AS Path Diversity Based on Multihoming | International Symposium on Computer Science and its Applications | Conference Paper | ||||
Y. Chi; R. Oliveira; L. Zhang | 2008-10-01 | Cyclops: the AS-Level connectivity observatory | ACM SIGCOMM Computer Communication Review | 38 | 5 | May-16 | Peer | |
J. Shearer; K. Ma; T. Kohlenberg | 2008-09-01 | BGPeep: An IP-Space Centered View for Internet Routing Data | International Workshop on Visualization for Computer Security | 95-110 | Conference Paper | |||
V. Raghavan; G. Riley; T. Jaafar | 2008-09-01 | Realistic Topology Modeling for the Internet BGP Infrastructure | IEEE Symposium on Modeling, Analysis and Simulation of Computers and Telecommunications Systems (MASCOTS) | 01-Aug | Conference Paper | |||
V. Raghavan; G. Riley; T. Jaafar | 2008-09-01 | Realistic Topology Modeling for the Internet BGP Infrastructure | 2008 IEEE International Symposium on Modeling, Analysis, and Simulation of Computers and Telecommunications Systems | Conference Paper | ||||
X. Liu; P. Zhu; Y. Peng | 2008-09-01 | SEM: A Security Evaluation Model for Interdomain Routing System in the Internet | International Workshop on IP Operations and Management | 142-153 | Conference Paper | |||
A. Sapegin; S. Uhlig | 2008-08-01 | On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events | Elsevier Computer Communications Journal | 36 | 15 | 1592-1605 | Peer | |
H. Haddadi; D. Fay; A. Jamakovic; O. Maennel; A. Moore; R. Mortier; S. Uhlig | 2008-07-01 | Beyond Node Degree: Evaluating AS Topology Models | Unknown | Peer | ||||
P. Holme; J. Karlin; S. Forrest | 2008-07-01 | An integrated model of traffic, geography and economy in the internet | ACM SIGCOMM Computer Communication Review | 38 | 3 | May-16 | Peer | |
R. Smith | 2008-07-01 | The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena | arXiv:0807.3374 | Peer | ||||
X. Dimitropoulos; M. Ángele. Serrano; D. Krioukov | 2008-07-01 | On Cycles in AS Relationships | ACM SIGCOMM Computer Communication Review (CCR) | 38 | 3 | 102-104 | Peer | |
P. Verkaik; A. Broido; K. Claffy | 2008-05-29 | Atoms – Atomised Routing | CAIDA | Peer | ||||
B. Yuan; G. Zhang; Y. Li; G. Zhang; Z. Li | 2008-05-01 | Improving Chinese Internet’s Resilience through Degree Rank Based Overly Relays Placement | 2008 IEEE International Conference on Communications | Conference Paper | ||||
D. Krioukov; F. Papdopoulos; A. Vahdat; M. Boguñá | 2008-05-01 | Efficient Navigation in Scale-Free Networks Embedded in Hyperbolic Metric Spaces | arXiv cond-mat.stat-mech/0805.1266 | “ | ||||
F. Papadopoulos; D. Krioukov; M. Boguna; A. Vahdat | 2008-05-01 | Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces | arXiv:0805.1266 | Peer | ||||
N. Wang; B. Wang | 2008-05-01 | AT: An Origin Verification Mechanism Based on Assignment Track for Securing BGP | 2008 IEEE International Conference on Communications | Conference Paper | ||||
B. Donnet; O. Bonaventure | 2008-04-01 | On BGP communities | ACM SIGCOMM Computer Communication Review | 38 | 2 | 55-59 | Peer | |
Y. Li; J. -H. Cui; D. Maggiorini; M. Faloutsos | 2008-04-01 | Characterizing and Modelling Clustering Features in AS-Level Interenet Topology | IEEE INFOCOM 2008 – The 27th Conference on Computer Communications | Conference Paper | ||||
Z. Chen; C. Ji; P. Barford | 2008-04-01 | Spatial-Temporal Characteristics of Internet Malicious Sources | IEEE INFOCOM 2008 – The 27th Conference on Computer Communications | Conference Paper | ||||
M. Ángele. Serrano; D. Krioukov; M. Boguñá | 2008-02-01 | Self-similarity of complex networks and hidden metric spaces | Physical Review Letters | 100 | 78701 | Peer | ||
A. Stewart; M. Antoskiwicz | 2008-01-01 | BGP Route Analysis and Management Systems | IEEE Proceedings of 5th International Conference on Information Technology | Conference Paper | ||||
J. Clement;K-W. Chin | 2008-01-01 | Power-law and stable distributions of BGP paths | International Conference on Information Technology and Applications | Conference Paper | ||||
R. Oliveira; D. Pei; W. Willinger; B. Zhang; L. Zhang | 2008-01-01 | Quantifying the Completeness of the Observed Internet AS-level Structure | UCLA Computer Science Department – Technical Report TR-080026-2008 | Peer | ||||
V. Valancius; N. Feamster | 2007-12-01 | Multiplexing BGP sessions with BGP-Mux | CoNEXT Proceedings of the 2007 ACM CoNEXT conference | 44 | Conference Paper | |||
Y. Wang; J. Li | 2007-12-01 | Is your IP address prefix well-served by internet routing? | CoNEXT Proceedings of the 2007 ACM CoNEXT conference | 69 | Conference Paper | |||
J. Clement;K-W. Chin | 2007-10-01 | On the characteristics of BGP routes | 2007 International Symposium on Communications and Information Technologies | Conference Paper | ||||
Y. Zhang; Z. Zhang; Z. Morle. Mao; C. Hu; B. MacDowel. Maggs | 2007-10-01 | On the impact of route monitor selection | Proceedings of the 7th ACM SIGCOMM conference on Internet measurement | 215-220 | Conference Paper | |||
B. Quoitin; L. Iannone; C. d. Launois; O. Bonaventure | 2007-08-01 | Evaluating the benefits of the locator/identifier separation | ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture | 5 | Conference Paper | |||
X. Dimitropoulos; D. Krioukov; A. Vahdat; G. Riley | 2007-08-01 | Graph Annotations in Modeling Complex Network Topologies | arXiv:0708.3879 | Peer | ||||
A. Bradley; K. Claffy; K. Fall; D. Krioukov | 2007-07-01 | On Compact Routing for the Internet | ACM SIGCOMM Computer Communication Review (CCR) | 37 | 3 | 41-52 | Peer | |
A. Jackson; W. Milliken; C. Santivanez; M. Condell; W. Strayer | 2007-07-01 | A Topological Analysis of Monitor Placement | Sixth IEEE International Symposium on Network Computing and Applications | Conference Paper | ||||
A. Sriraman; K. Butler; P. McDaniel; P. Raghavan | 2007-07-01 | Analysis of the IPv4 Address Space Delegation Structure | 2007 12th IEEE Symposium on Computers and Communications | Conference Paper | ||||
S. Carmi; S. Havlin; S. Kirkpatrick; Y. Shavitt; E. Shir | 2007-07-01 | A Model of Internet Topology using k-shell decomposition | PNAS | Peer | ||||
A. Flavel; M. Roughan; N. Bean; O. Maennel | 2007-06-01 | Modeling BGP Table Fluctuation | International Teletraffic Congress | 141-153 | Conference Paper | |||
S. Lo; R. Chang; L. Colitti | 2007-06-01 | An active approach to measuring routing dyanmics induced by autonomous systems | ExpCS ’07 Proceedings of the 2007 workshop on Experimental computer science | 20 | Conference Paper | |||
Y. Guo; C. Chen; S. Zhou | 2007-06-01 | Inferring and visualizing topological structures of large-scale complex network | InfoScale ’07 Proceedings of the 2nd International Conference on Scalable Information Systems | 3 | Conference Paper | |||
Y. Zhang; Z. Mao; J. Wang | 2007-06-01 | A Firewall for Routers: Protecting against Routing Misbehavior | 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks | Conference Paper | ||||
Z. Li; D. Zhang; Y. Ma | 2007-05-01 | Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup | IEEE INFOCOM 2007 – 26th IEEE International Conference on Computer Communications | Conference Paper | ||||
G. Zhang; G. Zhang | 2007-04-01 | Agent Selection And P2P Overlay Construction Using Global Locality Knowledge | 2007 IEEE International Conference on Networking, Sensing and Control | Conference Paper | ||||
Z. Liu; B. Huffaker; M. Fomenkov; K. Claffy; N. Brownlee | 2007-04-01 | Two Days in the Life of the DNS Anycast Root Servers | Passive and Active Network Measurement Workshop (PAM) | 4427 | 125-134 | Conference Paper | ||
C. Bao; X. Li; J. Jiang | 2007-01-01 | Scalable Application-Specific Measurement Framework for High-Performance Network Video | Proceedings of the 2007 ACM NOSSDAV | Conference Paper | ||||
D. Blazakis; M. Karir; J. Baras | 2007-01-01 | Analyzing BGP ASPATH Behavior in the Internet | Unknown | Peer | ||||
X. Dimitropoulos; D. Krioukov; M. Fomenkov; B. Huffaker; Y. Hyun; K. Claffy; G. Riley | 2007-01-01 | AS Relationships: Inference and Validation | ACM SIGCOMM Computer Communication Review (CCR) | 37 | 1 | 29-40 | Peer | |
Y. Wang; Y. Wang; M. Chen; X. Li | 2007-01-01 | Inter-domain Access Volume Model: Ranking Autonomous Systems | International Conference on Information Networking | 482-491 | Conference Paper | |||
J. Abley; K. Lindqvist | 2006-12-01 | Operation of Anycast Services | RFC 4786 | Peer | ||||
J. Han; D. Watson; F. Jahanian | 2006-11-01 | An Experimental Study of Internet Path Diversity | IEEE Transactions on Dependable and Secure Computing | 3 | 4 | 273-288 | Peer | |
J. Li; Z. Wu; E. Purpus | 2006-11-01 | CAM04-5: Toward Understanding the Behavior of BGP During Large-Scale Power Outages | IEEE Globecom 2006 | Conference Paper | ||||
J. Oberheide; M. Karir; D. Blazakis | 2006-11-01 | VAST: visualizing autonomous system topology | VizSEC ’06 Proceedings of the 3rd International Workshop on Visualization for Computer Security | 71-80 | Conference Paper | |||
L. Shyu; S. Lau; P. Huang | 2006-11-01 | GEN02-3: On the Search of Internet AS-level Topolgy Invariants | IEEE Globecom 2006 | Conference Paper | ||||
P. Cortese; G. Battista; A. Moneta; M. Patrignani; M. Pizzonia | 2006-11-01 | Topographic Visualization of Prefix Propagation in the Internet | IEEE Transactions on Visualization and Computer Graphics | 12 | 5 | 725-732 | Peer | |
R. Cohen; M. Gonen; A. Wool | 2006-11-01 | Bounding the Bias of Tree-Like Sampling in IP Topologies | arXiv:cs/0611157 | Peer | ||||
Z. Li; Y. Ma | 2006-11-01 | Trie-based Observations on the Routing Tables | 2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology | Conference Paper | ||||
C. Demetrescu; G. Italiano | 2006-10-01 | Experimental analysis of dynamic all pairs shortest path algorithms | ACM Transactions on Algorithms | 2 | 4 | 578-601 | Peer | |
S. Wei; J. Mirkovic | 2006-10-01 | A realistic simulation of internet-scale events | 06 Proceedings of the 1st international conference on Performance evaluation methodologies and tools | 28 | Conference Paper | |||
X. Liu; Y. Ji | 2006-10-01 | The effects of vendor-specific router implementation on convergence | 2006 First International Conference on Communications and Networking in China | Conference Paper | ||||
D. Lee; S. Moon; T. Choi; T. Jeong | 2006-09-01 | Forensic analysis of autonomous system reachability | Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data | 335-340 | Conference Paper | |||
D. Lee; S. Moon; T. Choi; T. Jeong | 2006-09-01 | Forensic analysis of autonomous system reachability | MineNet ’06 Proceedings of the 2006 SIGCOMM workshop on Mining network data | 335-340 | Conference Paper | |||
S. Ren; L. Quo; X. Zhang | 2006-07-01 | ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP | 26th IEEE International Conference on Distributed Computing Systems | Conference Paper | ||||
S. Zhou | 2006-07-01 | Characterizing and modeling the internet topology – The rich-club phenomenon and the PFP model | BT Technology Journal | 24 | 3 | 108-115 | Peer | |
Y. Kurokawa; J. Tanaka | 2006-07-01 | Registration of Policy Routing Choices | Presentation at Network Engineering Workshop in APAN Singapore Meeting | Conference Paper | ||||
S. Qui; P. McDaniel; F. Monrose; A. Rubin | 2006-06-01 | Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing | 11th IEEE Symposium on Computers and Communications | Conference Paper | ||||
A. Iosup; P. Garbacki; J. Pouwelse; D. Epema | 2006-05-01 | Correlating Topology and Path Characteristics of Overlay Networks and the Internet | Sixth IEEE International Symposium on Cluster Computing and the Grid | Conference Paper | ||||
M. Lad; D. Massey; D. Pei; Y. Wu; B. Zhang; L. Zhang | 2006-05-01 | PHAS: A Prefix Hijacking Alert System | 15th USENIX Security Symposium | 153-166 | Conference Paper | |||
P. Mahadevan; D. Krioukov;K_Fall; A. Vahdat | 2006-05-01 | Systematic Topology Analysis and Generation Using Degree Correlations | arXiv:cs/0605007 | Peer | ||||
R. France; J. Bieman; B. Cheng | 2006-05-01 | CRI: Collaborative Project: Repository for Model Driven Development (ReMoDD) | National Science Foundation: Division of Computer and Network Systems CISE Computing Research Infrastructure CRI Workshop | 27-31 | Peer | |||
R. Oliveira; M. Lad; B. Zhang; D. Pei; D. Massey; L. Zhang | 2006-05-01 | Placing BGP Monitors in the Internet | Technical No. UCLA, TR, 60017 | Peer | ||||
X. Dimitropoulos; G. Riley | 2006-05-01 | Modeling Autonomous System Relationships | Principles of Advanced and Dirstributed Simulation (PADS) | 143-149 | Conference Paper | |||
D. Blazakis; M. Karir; J. S. Baras | 2006-04-01 | BGP-Inspect – Extracting Information from Raw BGP Data | IEEE/IFIP Network Operations and Management Symposium NOMS 2006 | Conference Paper | ||||
J. Muir; P. va. Oorschot | 2006-04-01 | Internet Geolocation and Evasion | Unknown | “ | ||||
P. Boothe | 2006-04-01 | Internet Topology Data Warehouse Methodologies Compared | Final Project at University | Self | ||||
T. Wan; P. C. va. Oorschot | 2006-04-01 | Analysis of BGP prefix origins during Google’s May 2005 Outage | Proceedings of 20th IEEE International Parallel & Distributed Processing Symposium | Conference Paper | ||||
X. Dimitropoulos; D. Krioukov; G. Riley; K. Claffy | 2006-04-01 | Revealing the Autnonomous System Tazonomy: The Machine Learning Approach | Passive and Active Network Measurement Workshop (PAM) | Conference Paper | ||||
X. Dimitropoulos; D. Krioukov; G. Riley; K. Claffy | 2006-04-01 | Revealing the Autonomous System Taxonomy: The Machine Learning Approach | arXiv:cs/0604015 | Peer | ||||
H. Chang; W. Willinger | 2006-03-01 | Difficulties Measuring the Internet’s AS-Level Ecosystem | 40th Annual Conference on Information Sciences and Systems | Conference Paper | ||||
C. Olschanowsky; D. Massey | 2006-01-01 | BGPmon v7: A Scalable Real-Time BGP Monitor | Unknown | Peer | ||||
D. Anderson; N. Feamster | 2006-01-01 | Challenges and Opportunities in Internet Data Mining | Parallel Data Laboratory – Carnegie Mellon University | Peer | ||||
D. Malone | 2006-01-01 | Counting 6to4 relay routers | ACM SIGCOMM Computer Communication Review | 36 | 1 | 79-82 | Peer | |
D. Meyer; K. Patel | 2006-01-01 | RFC 4274 | BGP-4 Protocol Analysis | Peer | ||||
K. Butler; S. Qiu; P. McDaniel | 2006-01-01 | BGPRV: A library for fast and efficient routing data manipulation | DETER Community Workshop | Conference Paper | ||||
M. Gastner; M. Newman | 2006-01-01 | The spatial structure of networks | European Physical Journal B | 49 | 2 | 247-252 | Peer | |
M. Liljenstam; C. Omicron | 2006-01-01 | Simulating the National-Level impact of routing attacks in Sweden | Proceedings of the 4th Swedish National Computer Networking Workshop | Conference Paper | ||||
P. Mahadevan; D. Krioukov; M. Fomenkov; K. Claffy; A. Vahdat | 2006-01-01 | The internet AS-level topology: three data sources and one definitive metric | ACM SIGCOMM Computer Communication Review | 36 | 1 | 17-26 | Peer | |
P. McDaniel; K. Butler | 2006-01-01 | Testing Large Scale BGP Security in Replayable Network Environments | Unknown | Peer | ||||
R. Chertov; S. Fahmy; P. Kumar; D. Bettis; A. Khreishah; N. Shroff | 2006-01-01 | Topology Generation, Instrumentation, and Experimental Control Tools for Emulation Testbeds | Proceedings of DETER community workshop 2006 | Conference Paper | ||||
T. Erlebach; A. Hall; M. Mihal`ak | 2006-01-01 | Network Discovery in Random Graphs | Self-Published | Peer | ||||
V. Aggarwal; A. Feldmann; M. Gaertler; R. Gorke; D. Wagner | 2006-01-01 | Analysis of Overlay-Underlay Topology Using Visualization | IADIS Conference | Conference Paper | ||||
V. Colizza; A. Flammini; M. Serrano; A. Vespignani | 2006-01-01 | Detecting rich-club ordering in complex networks | Nature Physics | 2 | 110-115 | Peer | ||
R. Fonseca; G. Mannin. Porter; R. Katz. S. Shenker; I. Stoica | 2005-12-01 | IP Options are not an option | Technical Report No. UCB/EECS-2005-24 | Peer | ||||
R. Oliveira; R. Izhak-Ratzin; B. Zhang; L. Zhang | 2005-12-01 | Measurement of highly active prefixes in BGP | Global Telecommunications Conference | Conference Paper | ||||
E. Chlebus; R. Ohri | 2005-11-01 | Estimating parameters of the Pareto distribution by means of Zipf’s law: application to Internet research | GLOBECOM ’05. IEEE Global Telecommunications Conference 2005 | Conference Paper | ||||
H. Yu; J. Rexford; E. Felten | 2005-11-01 | A Distributed Reputation Approach to Cooperative Internet Routing Protection | 1st IEEE ICNP Workshop on Secure Network Protocols | Conference Paper | ||||
J. Ignaci. Alvarez-Hamelin; L. Dall’Asta; A. Barrat; A. Vespignani | 2005-11-01 | K-core decomposition of Internet graphs: hierarchies, self-similarity and measurement biases | arXiv:cs/0511007 | Peer | ||||
X. Dimitropoulos; G. Riley; D. Krioukov; R. Sundaram | 2005-11-01 | Towards a Topology Generator Modeling AS Relationships | IEEE International Conference on Network Protocols | Conference Paper | ||||
D. Spence; J. Crowcroft; S. Hand; T. Harris | 2005-10-01 | Location based placement of whole distributed systems | CoNEXT ’05 Proceedings of the 2005 ACM conference on Emerging Network Experiment and Technology | 124-134 | Conference Paper | |||
M. Freedman; M. Vutukuru; N. Feamster; H. Balakrishnan | 2005-10-01 | Geographic locality of IP prefixes | Proceedings of the 5th ACM SIGCOMM conference on Internet measurement | 13 | Conference Paper | |||
A. Lambert; M. Meulle;J-L. Lutton | 2005-09-01 | Revisting Interdomain Root Cause Analysis from multiple vantage points | Presentation at University | Peer | ||||
B. Zhang; V. Kambhampati; M. Lad; D. Massey; L. Zhang | 2005-08-01 | Identifying BGP routing table transfers | MineNet ’05 Proceedings of the 2005 ACM SIGCOMM workshop on Mining Network data | 213-218 | Conference Paper | |||
J. Zhang; J. Rexford; J. Feigenbaum | 2005-08-01 | Learning-based anomaly detection in BGP updates | Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data | 219-220 | Conference Paper | |||
P. Mahadevan; D. Krioukov; B. Huffaker; K. Claffy; A. Vahdat | 2005-08-01 | Impact of Degree Correlations on Topology Generators | Unknown | Peer? | ||||
P. Mahadevan; D. Krioukov; M. Fomenkov; B. Huffaker; X. Dimitropoulos; K. Claffy; A. Vahdat | 2005-08-01 | Lessons from Three Views of the Internet Topology | arXiv:cs/0508033 | Peer | ||||
X. Dimitropoulos; D. Krioukov; G. Riley; K. Claffy | 2005-08-01 | Classifying the Types of Autonomous Systems in the Internet | SIGCOMM | Conference Paper | ||||
X. Dimitropoulos; D. Krioukov; G. Riley | 2005-07-01 | Revisiting Internet AS-level Topology Discovery | arXiv:cs/0507046 | Peer | ||||
C. Zou; D. Towsley; W. Gong; S. Cai | 2005-06-01 | Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information | PADS ’05 Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation | 199-206 | Conference Paper | |||
M. Cai; K. Hwang; Y. Kwok; S. Song; Y. Chen | 2005-06-01 | Collaborative Internet worm containment | IEEE Security and Privacy | 3 | 3 | 25-33 | Peer | |
S. Wei; J. Mirkovic; M. Swany | 2005-06-01 | Distributed Worm Simulation with a Realistic Internet Model | PADS ’05 Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation | 71-79 | Conference Paper | |||
Y. Shavitt; E. Shir | 2005-06-01 | DIMES: Let the Internet Measure Itself | arXiv:cs/0506099 | Peer | ||||
X. Dimitropoulos; D. Krioukov; B. Huffaker; K. Claffy; G. Riley | 2005-05-01 | Inferring AS Relationships: Dead End or Lively Beginning? | Workshop on Effecient and Expermental Algorithms (WEA) | 113-125 | Conference Paper | |||
Z. Wu; E. Purpus; J. Li | 2005-03-01 | BGP Behavior Analysis During the August 2003 Blackout | Proceedings of IEEE IM | Peer | ||||
B. Zhang; R. Liu; D. Massey; L. Zhang | 2005-01-01 | Collecting the internet AS-Level topology | ACM SIGCOMM Computer Communication Review | 35 | 1 | 53-61 | Peer | |
J.-L. Guillaume; M. Latapy | 2005-01-01 | Relevance of massively distributed explorations of the Internet: Simulation results | IEEE INFOCOM 2005 | Conference Paper | ||||
L. Subramanian; M. Caesar; C. Tie. Ee; M. Handley; M. Mao; S. Shenker; I. Stoica | 2005-01-01 | HLP: A Next Generation Intedomain Routing Protocol | SICOMM ’05 | Conference Paper | ||||
M. Caesar; L. Subramanian; R. Katz | 2005-01-01 | The Case for an Internet Health Monitoring System | Unknown | “ | ||||
M. Gaertler; M. Patrignani | 2005-01-01 | Dynamic Analysis of the Autonomous System Graph | Unknown | “ | ||||
R. Beverly; S. Bauer | 2005-01-01 | The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet | SRUTI ’05 Paper | Peer | ||||
R. Bush; T. Griffin; J. Li; Z. Mao; E. Purpus; D. Stutzbach | 2005-01-01 | Happy Packets to You! | IEEE INFOCOMM 2005 | Conference Paper | ||||
X. Meng; Z. Xu; B. Zhang; G. Huston; S. Lu; L. Zhang | 2005-01-01 | IPv4 address allocation and the BGP routing table evolution | ACM SIGCOMM Computer Communication Review | 35 | 1 | 71-80 | Peer | |
X. Meng; Z. Xu; B. Zhang; G. Huston; S. Lu; L. Zhang | 2005-01-01 | IPv4 address allocation and the BGP routing table evolution | ACM SIGCOMM Computer Communication Review | 35 | 1 | 71-80 | Peer | |
M. Baur;U;Brandes; M. Gaertler; D. Wagner | 2004-10-01 | Drawing the AS Graph in 2.5 Dimensions | International Symposium on Graph Drawing | 43-48 | Conference Paper | |||
M. Lad; D. Massey; L. Zhang | 2004-10-01 | LinkRank: A Tool for Diagnosis of BGP Routing Dynamics | NANOG 32 | Unknown | ||||
S. Lee; Z. Zhang; S. Nelakuditi | 2004-10-01 | Exploiting as hierarchy for scalable route selection in multi-homed stub networks | IMC ’04 Proceedings of the 4th ACM SIGCOMM conference on Internet measurement | 294-299 | Conference Paper | |||
S. Teoh; K. Zhang;S-M. Tseng;K-L. Ma; S. Wu | 2004-10-01 | Combining visual and automated data mining for near-real-time anomaly detection analysis in BGP | VizSEC/DMSEC ’04 Proceedings of the 2004 ACM workshop on Visualization of data mining for computer security | Conference Paper | ||||
K. Cho; M. Luckie; B. Huffaker | 2004-09-01 | Identifying IPv6 network problems in the dual-stack world | NetT ’04 Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality | 283-288 | Conference Paper | |||
D. Chang; R. Govindan; J. Heidemann | 2004-08-01 | Locating BGP Missing Routes Using Multiple Perspectives | SIGCOMM 2004 | Conference Paper | ||||
D. Meyer | 2004-06-01 | RouteViews Update | ISMA Data Catalog 2004 Workshop | Conference Paper | ||||
J. Han; F. Jahanian | 2004-06-01 | Impact of path diversity on multi-homed and overlay networks | International Conference on Dependable Systems and Networks, 2004 | Conference Paper | ||||
J. Chen; L. Trajkovic | 2004-05-01 | Analysis of Internet topology data | International Symposium on Circuits and Systems | Conference Paper | ||||
J. Gast; P. Barford | 2004-05-01 | Representing the Internet as a succinct forest | Computer Networks | 45 | 1 | 35-44 | Peer | |
T. Griffin | 2004-05-01 | BGP Wedgies: Bad Routing Policy Interactions that Cannot be Debugged | IDRWS | Conference Paper | ||||
H. Chang; R. Govindan; S. Jamin; S. Shenker; W. Willinger | 2004-04-01 | Towards capturing representative AS-level Internet topologies | Elsevier Computer Communications Journal | 44 | 6 | 737-755 | Peer | |
L. Amini; A. Shaikh; H. Schulzrinne | 2004-04-01 | Issues with inferring Internet topological attributes | Elsevier Computer Communications Journal | 27 | 6 | 557-567 | Peer | |
M. Lad; L. Zhang; D. Massey | 2004-04-01 | Link-Rank: a graphical tool for capturing BGP routing dynamics | 2004 IEEE/IFIP Network Operations and Management Symposium | Conference Paper | ||||
S. Banerjee; T. Griffin; M. Pias | 2004-04-01 | The Interdomain Connectivity of PlanetLab Nodes | Passive and Active Network Measurement Workshop (PAM) | 3015 | 73-82 | Conference Paper | ||
B. Quoitin; S. Tandel; S. Uhlig; O. Bonaventure | 2004-03-01 | Interdomain traffic engineering with redistribution communities | Computer Communications | 27 | 4 | 355-363 | Peer | |
N. Spring; R. Mahajan; D. Wetherall; T. Anderson | 2004-02-01 | Measuring ISP Topologies with Rocketfuel | IEEE/ACM Transactions on Networking (TON) | 12 | 1 | Feb-16 | Peer | |
P. Verkaik; A. Broido; K. Claffy; R. Gao; Y. Hyun; R. va. de. Pol | 2004-02-01 | Beyond CIDR Aggregation | Cooperative Association for Internet Data Analysis (CAIDA) | Peer | ||||
A. Feldmann; N. Kammenhuber; O. Maennel; B. Maggs; R. D. Prisco; R. Sundaram | 2004-01-01 | A Methodology for Estimating Interdomain Web Traffic Demand | IMC ’04 | Conference Paper | ||||
A. Feldmann; O. Maennel; Z. Morle. Mao; A. Berger; B. Maggs | 2004-01-01 | Locating Internet Routing Instabilities | SIGCOMM 2004 | Conference Paper | ||||
J. Pang; J. Hendricks; A. Akella; B. Maggs; R. D. Prisco; S. Seshan | 2004-01-01 | Availability, Usage, and Deployment Characteristics of the Domain Name System | IMC ’04 | Conference Paper | ||||
N. Spring; D. Wetherall; T. Anderson | 2004-01-01 | Reverse engineering the Internet | ACM SIGCOMM Computer Communication Review | 34 | 1 | 03-Aug | Peer | |
S.-T. Park; D. Pennock; C. Giles | 2004-01-01 | Comparing static and dynamic measurements and models of the Internet Topology | IEEE INFOCOM 2004 | Conference Paper | ||||
M. Lad; X. Zhao; B. Zhang; D. Massey; L. Zhang | 2003-12-01 | Analysis of BGP Update Surge during Slammer Worm Attack | International Workshop on Distributed Computing | 66-79 | Conference Paper | |||
R. Gao; E. Zegura | 2003-12-01 | An evolutionary framework for AS-level Internet topology modeling | GLOBECOM ’03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489) | Conference Paper | ||||
S. Zhou; R. Mondragon | 2003-12-01 | Towards modelling the internet topology – The interactive growth model | Teletraffic Science and Engineering | 5 | 121-129 | Peer | ||
D-F. Chang; R. Govindan; J. Heidemann | 2003-11-01 | The temporal and topological characteristics of BGP path changes | 11th IEEE International Conference on Network Protocols, 2003. Proceedings | Conference Paper | ||||
A. Sridharan; S. Moon; C. Diot | 2003-10-01 | On the correlation between route dynamics and routing hoops | IMC ’03 Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement | 285-294 | Conference Paper | |||
J. Heasley | 2003-10-01 | Routing Update | NANOG 29 | Conference Paper | ||||
X. Zhao; D. Massey | 2003-10-01 | A Study on the Routing Convergence of Latin America Networks | DSOM | Conference Paper | ||||
Z. Mao; R. Bush; T. Griffin; M. Roughan | 2003-10-01 | BGP beacons | IMC ’03 Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement | Jan-14 | Conference Paper | |||
H. Kong | 2003-09-01 | Verification of Zebra as a BGP Measurement Instrument | Agilent Labs, China | Peer | ||||
R. Teixeira; J. Rexford | 2003-09-01 | A measurement framework for pin-pointing routing changes | NetT ’04 Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality | 313-318 | Conference Paper | |||
S. Seetharaman | 2003-09-01 | Interdomain routing reliability measurements | CS 8803 presentation | Self | ||||
A. Nakao; L. Peterson; A. Bavier | 2003-08-01 | A routing underlay for overlay networks | Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications | Nov-18 | Conference Paper | |||
Z. Mao; J. Rexford; J. Wang; R. Katz | 2003-08-01 | Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM | Conference Paper | ||||
S. Zhou; R. Mondragon | 2003-07-01 | Analyzing and Modeling the AS-Level Internet Topology | Proceedings of the HET-NETs’ 03 | Conference Paper | ||||
J. Nieto-Hipolito; J. Barcelo | 2003-06-01 | On the geographical properties of BGP routing tables | Workshop on High Performance Switching and Routing, 2003, HPSR | Conference Paper | ||||
N. Feamster; D. Anderson; H. Balakrishnan; M. Kaashoek | 2003-06-01 | Measuring the Effects of Internet Path Faults on Reactive Routing | Proc. of SIGMETRICS | Conference Paper | ||||
M. fayed; P. Krapivsky; J. Byers; M. Corvella; D. Finkel; S. Redner | 2003-04-01 | On the emergence of highly variable distributions in the autonomous system topology | ACM SIGCOMM Computer Communication Review | 33 | 2 | 41-49 | Peer | |
S. Zhou; R. Mondragon | 2003-04-01 | The missing links in the BGP-based AS connectivity maps | Passive and Active Measurement Workshop | Conference Paper | ||||
Y. Hyun; A. Broido; K. Claffy | 2003-04-01 | On Third-party Addresses in Traceroute Paths | Passive and Active Network Measurement Workshop (PAM) | Conference Paper | ||||
S. Zhou; R. Mondragon | 2003-03-01 | The missing links in the BGP-based AS connectivity maps | arXiv:cs/0303028 | Peer | ||||
Y. Hyun; A. Broido; K. Claffy | 2003-03-01 | Traceroute and BGP AS Path Incongruities | Cooperative Association for Internet Data Analysis (CAIDA) | Peer | ||||
A. Akella; S. Seshan | 2003-01-01 | An Empirical Evaluation of Wide-Area Internet Bottlenecks | IMC ’03 Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement | Conference Paper | ||||
F. Wang; L. Gao | 2003-01-01 | Inferring and Characterizing Internet Routing Policies | IMC ’03 Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement | Conference Paper | ||||
G. Battista; F. Mariani; M. Patrignani; M. Pizzonia | 2003-01-01 | Archives of BGP Updates: Integration and Visualization | Proc. International Workshop on Inter-domain Performance and Simulation | Conference Paper | ||||
L. Subramanian; M. Caesar; C. Tie. Ee; M. Handley; M. Mao; S. Shenker; I. Stoica | 2003-01-01 | Towards a Next Generation Inter-domain Routing Protocol | SIGMETRICS | Conference Paper | ||||
L. Tang; M. Crovella | 2003-01-01 | Virtual Landmarks for the Internet | IMC ’03 Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement | Conference Paper | ||||
S. Park; A. Khrabrov; D. Pennock; S. Lawrence; C. Giles; L. Ungar | 2003-01-01 | Static and Dynamic Analysis of the Internet’s Susceptibility to Faults and Attacks | IEEE INFOCOMM 2003 | Conference Paper | ||||
J. Rexford; J. Wang; Z. Xiao; Y. Zhang | 2002-11-01 | BGP routing stability of popular destinations | ACM SIGCOMM Workshop on Internet Measurement | 197-202 | Conference Paper | |||
T. Bu; L. Gao; D. Towsley | 2002-11-01 | On characterizing BGP routing table growth | Global Telecommunications Conference | Conference Paper | ||||
B. Quoitin; S. Uhlig; O. Bonaventure | 2002-10-01 | Using Redistribution Communities for Interdomain Traffic Engineering | International Workshop on Quality of Future Internet Services | Conference Paper | ||||
R. Bush; T. Griffin; Z. Mao | 2002-10-01 | Route Flap Damping: Harmful? | NANOG 25 | Conference Paper | ||||
A. Selcuk; K. Park; H. Lee | 2002-09-01 | The Static DPF Simulator | Self-Published | Peer | ||||
H. Chang; R. Govindan; S. Jamin; S. Shenker; W. Willinger | 2002-06-01 | Towards capturing representative AS-level Internet topologies | ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems | 30 | 1 | 280-281 | Conference Paper | |
V. Mhaske | 2002-06-01 | BGP and Inferring Autonomous System Relationships | Presentation | Self | ||||
Mark Knopper, Sean Doran | 2002-02-01 | Prefix Taxonomy Ongoing Measurement and Inter-Network Experiment | IETF IDS Working Group | Unknown | ||||
A. Broido; E. Nemeth; K. Claffy | 2002-01-01 | Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications | 13 | 1 | 33-51 | Peer | |
A. Broido; E. Nemeth;K_Claffy | 2002-01-01 | Internet Expansion, Refinement, and Churn | CAIDA | Peer | ||||
A. Mankin; D. Massey; C. Wu; S. Wu; X. Zhao; D. Pei; L. Wang; L. Zhang; R. Bush | 2002-01-01 | FNIISC: Fault-Tolerant Networking through Intrusion Identification and Secure Compartments | Darpa FRN PI Meeting | Conference Paper | ||||
CAIDA | 2002-01-01 | CAIDA Macroscopic IP Topology Data Kit (ITDK) #0204, provided to the Network Modeling and Simulation (NMS) community under DARPA grant N66001-01-1-8909 | CAIDA | Peer | ||||
G. Huston | 2002-01-01 | BGP ’01: An Examination of the Internet’s BGP Table Behavior in 2001 | Internet2 Joint Techs Workshop | Presentation | ||||
G. Ledesma | 2002-01-01 | Mapping the Philippine Internet using the Border Gateway Protocol | University Senior Project | Self | ||||
H. Chang; R. Godvindan; S. Jamin; S. Shenker; W. Willinger | 2002-01-01 | Towards Capturing Representative AS-Level Internet Topologies | ACM | Peer | ||||
R. Bless | 2002-01-01 | Using Realistic Internet Topology Data for Large Scale Network Simulations in OMNeT++ | Institute of Telematics | Peer | ||||
R. Mahajan; D. Wetherall; T. Anderson | 2002-01-01 | Understanding BGP Misconfiguration | University of Washington | Peer | ||||
Unknown | 2002-01-01 | The Internet Under Crisis Conditions: Learning from September 11 | National Research Council of the National Academies | Book | ||||
X. Zhao; D. Pei; L. Wang; D. Massey; A. Mankin; S. Wu; L. Zhang | 2002-01-01 | Detection of Invalid Routing Announcements in the Internet | International Conference on Dependable Systems and Networks | Conference Paper | ||||
X. Zhao; D. Pei; L. Wang; D. Massey; A. Mankin; S. Wu; L. Zhang | 2001-11-01 | An analysis of BGP multiple origin AS (MOAS) conflicts | ACM SIGCOMM Workshop on Internet Measurement | 31-35 | Conference Paper | |||
L. Subramanian; S. Agarwal; J. Rexford; R. Katz | 2001-08-01 | Characterizing the Internet hierarchy from multiple vantage points | UC Berkeley Technical Report CSD-01-1151 | Peer | ||||
A. Broido; K. Claffy | 2001-07-01 | Complexity of global routing policies | Cooperative Association for Internet Data Analysis (CAIDA) | Peer | ||||
C. Labovitz; A. Ahuja; A. Bose; F. Jahanian | 2001-06-01 | Delayed Internet routing convergence | IEEE/ACM Transactions on Networking (TON) | 9 | 3 | 293-306 | Peer | |
A. Broido; K. Claffy | 2001-05-01 | Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop | Conference Paper | ||||
C. Labovitz; A. Ahuja; A. Bose; F. Jahanian | 2001-01-01 | Delayed Internet Routing Convergence | Unknown | Peer | ||||
S. Bellovin; R. Bush; T. Griffin; J. Rexford | 2001-01-01 | Slowing Routing Table Growth by Filtering Based on Address Allocation Policies | Unpublished | Peer | ||||
CAIDA | 2000-12-01 | ISMA Winter 2000 Workshop – Final Report | Internet Statistics and Metrics Analysis (ISMA) | Peer | ||||
A. Donnelly; T. Deegan | 2000-11-01 | IP route lookups as string matching | Proceedings of the 25th Annual IEEE Conference on Local Computer Networks | Conference Paper | ||||
C. Labovitz; A. Ahuja; A. Bose; F. Jahanian | 2000-10-01 | Delayed Internet routing convergence | ACM SIGCOMM Computer Communication Review | 30 | 4 | 175-187 | Peer | |
C. Labovitz; A. Ahuja; A. Bose; F. Jahanian | 2000-06-01 | Delayed Internet routing convergence | SIGCOMM Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Commputer Communication | 175-187 | Conference Paper | |||
C. Labovitz; A. Ahuja; F. Jahanian | 1999-06-01 | Experimental study of Internet stability and backbone failures | Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing | Conference Paper |
Web Resources
African Route-collectors Data Analyzer (A.R.D.A)
A.R.D.A. is an open-source web application that offers unique views of the current status of interconnection and traffic exchange in the African region and its evolution from 2005. A.R.D.A makes use of data collected from all PCH and RouteViews collectors deployed at existing African IXPs.
https://arda.af-ix.net
G. Huston. Telstra Internet Network Performance Reports.
http://bgp.potaroo.net/
BGP Table Statistics: http://www.potaroo.net/bgp2/rv-index.html.
Additional papers: http://www.potaroo.net/papers.html
CIDR Report
http://www.cidr-report.org/
ISMA – Internet Statistic and Metrics Analysis Workshops. Cooperative Association for Internet Data Analysis – CAIDA, San Diego Supercomputer Center, University of California, San Diego.
http://www.caida.org/outreach/isma
Atoms / Atomised Routing – CAIDA
http://www.caida.org/projects/routing/atoms
http://www.nlnet.nl/project/atombr/20030214-report.html
Outreach – Networking Bibliography An annotated bibliography of papers and presentations in the wide-area networking literature.
http://www.caida.org/outreach/bib/networking/
Spamshield’s “route-leecher” script.
http://www.spamshield.org/
Tim Griffin’s “Interdomain routing links”
http://www.cambridge.intel-research.net/~griffin/interdomain
Visualizing Internet Topology at a Macroscopic Scale
http://www.caida.org/analysis/topology/as_core_network/