



This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.
We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.
For a previously collated list of papers referencing CAIDA's skitter project, see Publications referencing the skitter tool or data. For a list of all papers published by CAIDA authors, see Papers by CAIDA.
Year | Author(s) | Title | Publication | Dataset |
---|---|---|---|---|
2020
| Verifying Self-Simularity For Current Network Traffic | University of Wisconsin-Madison | Anonymized Internet Traces | |
2020
| Zhang, Dai Gao, Kai Sun, Chen Cao, Jiamin Wang, Yangyan Xu, Mingwei We, Jianping | Newton: intent-driven network traffic monitoring | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Anonymized Internet Traces |
2020
| Pontarelli, Solvatore | When Filtering is not Possible Caching Negatives with Fingerprints Comes to the Rescue | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Anonymized Internet Traces |
2020
| Sonchack, John Hershkop, Shlomo Dautenhahn, Nathan DeHon, Andre Smith, Jonathan M. | DeepMatch: Practical Deep Packet Inspection in the Data Planeusing Network Processors | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Anonymized Internet Traces |
2020
| Govindan Kannan, Pravein Kian Hsiang Low, Byan Choon Chan, Mun | FCM-Sketch: Generic Network Measurementswith Data Plane Support | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Anonymized Internet Traces |
2020
| Sonchack, John Liu, Vincent | Mantis: Reactive Programmable Switches | Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication | Anonymized Internet Traces |
2020
| Borylo, P. Lason, A. Szymanski, A. | PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN | Journal of Network and Systems Management | Anonymized Internet Traces |
2020
| Rottenstreich, Ori Silberstein, Mark | A Computational Approach to Packet Classification | Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication | Anonymized Internet Traces |
2020
| Li, Yuliang Anwer, Bilal Shaikh, Aman Yu, Minlan | Microscope: Queue-based Performance Diagnosis for Network Functions | Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication | Anonymized Internet Traces |
2020
| Landau-Feibish, S. Braverman, M. Rexford, J. | BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a Time | Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies | Anonymized Internet Traces |
2020
| Oostenbrink, J. Kuipers, F.A. Keslassy, I. Orda, A. | Sequential zeroing: Online heavy-hitter detection on programmable hardware | IFIP Networking | Anonymized Internet Traces |
2020
| Cybersecurity Data Science: An Overview from Machine Learning Perspective | preprints.org |
Anonymized Internet Traces Denial of Service Attacks |
|
2020
| Liu, Y. Kwon, M. | Boosting FIB caching performance with aggregation | Proc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC) | Anonymized Internet Traces |
2020
| Chen, X. Einziger, G. Feibish, S. L. Raz, D. Yu, M | Routing Oblivious Measurement Analytics | IFIP Networking Conference | Anonymized Internet Traces |
2020
| Savi, M. Siracusa, D. | Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4 | NOMS -2020 IEEE/IFIP Network Operations and Management Symposium | Anonymized Internet Traces |
2020
| Gelenbe, Erol Kuaban Suila, Godlove Marek, Dariusv | Dynamics of Software Defined Networks: Diffusion Models | Researchgate.net | Anonymized Internet Traces |
2020
| Biersack, F. Wild, T. Herkersdorf, A. | Inter-server RSS: Extending receive side scaling for inter-server workload distribution | Euromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP) | Anonymized Internet Traces |
2020
| Pontarelli, S. Reviriego, P. | Adaptive cuckoo filters | ACM J. Exp. Algorithms | Anonymized Internet Traces |
2020
| Savi, M. Antichi, G. Siracusa, D. | An Incrementally-deployable P4-enabled Architecture for Network-wide Heavy-hitter Detection | IEEE Transactions on Network and Service Management | Anonymized Internet Traces |
2020
| Nemeth, F. Raghavan, B. Retvari, G. | Batchy: Batch-scheduling data flow graphs with service-level objectives | USENIX NSDI | Anonymized Internet Traces |
2020
| Zhu, Hang Ruffym, Fabian Jin, Xin Sivaraman, Anirudh Ports, Dan Panda, Aurojit | Multitenancy for fast and programmable networks in the cloud | USENIX Workshop on Hot Topics in Cloud Computing, HotCloud , co-located with USENIX ATC 2020 | Anonymized Internet Traces |
2020
| Martinez, J. Pontarelli, S. | Improving packet flow counting with fingerprint counting | IEEE Comm. Lett. | Anonymized Internet Traces |
2019
| Zhang, Youlin Ma, Chaoyi Chen, Shigang O. Odegbile, Olufemi | Generalized Sketch Families for Network TrafficMeasurement | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Anonymized Internet Traces |
2019
| Yu, Zhuolong Braverman, Vladimir Jin, Xin | QPipe: quantiles sketch fully in the data plane | CoNEXT 19: Proceedings of the International Conference on Emerging Networking Experiments And Technologies |
Anonymized Internet Traces Other Datasets Topology with Archipelago |
2019
| Ben Basat, Ran Liu, Zaoxing Einziger, Gil Friedman, Roy Braverman, Vladimir | I Know What You Did Last Summer: Network Monitoring using Interval Queries | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Anonymized Internet Traces |
2019
| Wang, X. Shami, A. | Intelligent active queue management using explicit congestion notification | IEEE Global Comm. Conf. (GLOBECOM) | Anonymized Internet Traces |
2019
| Feibish, S. L. Koral, Y. Rexford, J. Rottenstreich, O. Monetti, S. A. Wang, T. Y. | Fine-grained queue measurement in the data plane | International Conference on Emerging Networking Experiments And Technologies | Anonymized Internet Traces |
2019
| Zhang, H. Li, H. Gong, J. Uhlig, S. Chen, S. Uden, L. Li, X. | HeavyKeeper: An accurate algorithm for finding top-k elephant flows | IEEE/ACM Trans. on Networking | Anonymized Internet Traces |
2019
| Berger, Arthur | Scanning the Scanners: Sensing the Internet from a MassivelyDistributed Network Telescope | IMC 19: Proceedings of the Internet Measurement Conference | Anonymized Internet Traces |
2019
| Bridges, R.A. | Quantifiable and comparable evaluations of cyber defensive capabilities: A survey and novel, unified approach | arxiv.org | Anonymized Internet Traces |
2019
| READ: a three-communicating-stage distributed super points detections algorithm | arxiv.org | Anonymized Internet Traces | |
2019
| Knowledge acquisition for autonomic network management in emerging self-organizing architectures | Univ. of Madrid | Anonymized Internet Traces | |
2019
| Liberty, E. Lang, K. Karnin, Z. Braverman, V. | Streaming quantiles algorithms with small space and update time | arxiv.org | Anonymized Internet Traces |
2019
| Savi, M. Antichi, G. Siracusa, D. | Incremental deployment of programmable switches for network-wide heavy-hitter detection | IEEE Conference on Network Softwarization (NetSoft) | Anonymized Internet Traces |
2019
| Prasanna, V. K. | An LSTM Framework For Modeling Network Traffic | IFIP/IEEE Symp. on Integrated Network and Service Management (IM) | Anonymized Internet Traces |
2019
| Indyk, P. Katabi, D. Vakilian, A. | Learning-based frequency estimation algorithms | Intl Conf. on Learning Representations | Anonymized Internet Traces |
2019
| Security framework for the Internet of Things leveraging network telescopes and machine learning | Univ. of South Florida | Anonymized Internet Traces | |
2019
| Ravishankar, C.V. | Inferring insertion times and optimizing error penalties in time-decaying Bloom filters | ACM Trans, on Database Systems (TODS) | Anonymized Internet Traces |
2019
| Nezri, Y. | Cardinality estimation in a virtualized network device using online machine learning | arxiv.org |
Anonymized Internet Traces Denial of Service Attacks |
2019
| Oostenbrink, J. Kuipers, F. | Detecting heavy hitters in the data-plane | arxiv.org | Anonymized Internet Traces |
2019
| The design and implementation of a congestion control plane | Massachusetts Inst. of Technology | Anonymized Internet Traces | |
2019
| Aracil, Javier | Flow-concurrence and bandwidth ratio on the Internet | Computer Communications | Anonymized Internet Traces |
2019
| Wang, J. Qi, Q. Sun, H. Liao, J. | Toward Greater Intelligence in Route Planning: A Graph-Aware Deep Learning Approach | IEEE Systems J. | Anonymized Internet Traces |
2019
| Zhang, Y. Yin, L. Yuan, T. Wu, Z. Luo, H. | Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things | IEEE Access | Anonymized Internet Traces |
2019
| Eo, J. Kim, G. W. Kim, J. Y. Lee, S. Seo, J. Song, W. W. Chun, B. G. | Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies | USENIX | Anonymized Internet Traces |
2019
| Xu, J. Liu, X. Liu, P. Wang, L. Bi, J. Li, X. | A Generic Technique for Sketches to Adapt to Different Counting Ranges | IEEE INFOCOM - IEEE Conference on Computer Communications | Anonymized Internet Traces |
2019
| Bi, J. Sun, C. Zhou, Y. | Prophet: Real-time Queue Length Inference in Programmable Switches | ACM Symp. on SDN Research | Anonymized Internet Traces |
2019
| Huang, Q. Lee, P. P. C. | MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams | IEEE INFOCOM - IEEE Conference on Computer Communications | Anonymized Internet Traces |
2019
| Phan, T. V. | Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud | IEEE Access |
Anonymized Internet Traces Denial of Service Attacks |
2019
| Kamolphiwong, S. Kamolphiwong, T. Vasupongayya, S. | Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN) | Journal of Computer Networks and Communications | Anonymized Internet Traces |
2019
| Pajouh, F. M. Namayanja, J. | Exact algorithms for the minimum cost vertex blocker clique problem | Computers and Operations Research | Anonymized Internet Traces |
2019
| Guo, D. Zhao, X. Wu, J. Rottenstreich, O. Luo, X. | Near-accurate multiset reconciliation | IEEE Trans. on Knowledge and Data Engineering | Anonymized Internet Traces |
2019
| Benson, A. R. Charikar, M. | Sampling Methods for Counting Temporal Motifs | Twelfth ACM Intl Conf. on Web Search and Data Mining | Anonymized Internet Traces |
2019
| Huang, C. C. Tsai, S. C. | A SDN Soft Computing Application for Detecting Heavy Hitters | IEEE Transactions on Industrial Informatics | Anonymized Internet Traces |
2019
| Wang, C. L. | Efficient low-latency packet processing using On-GPU Thread-Data Remapping | Journal of Parallel and Distributed Computing | Anonymized Internet Traces |
2019
| Luo, H. Zhang, S. Li, H. Yan, F. | Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking | Journal of Network and Computer Applications | Anonymized Internet Traces |
2019
| Gifre, L. Gonzalez, I. Lopez de Vergara, J. E. Aracil, J. | Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyond | Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) | Anonymized Internet Traces |
2019
| Julian-Moreno, G. Gonzalez, I. Gomez-Arribas, F. J. Lopez de Vergara, J. E. | Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks | Computer Networks | Anonymized Internet Traces |
2019
| Marques, J. A. Gaspary, L. P. | Offloading Real-time DDoS Attack Detection to Programmable Data Planes | IFIP/IEEE Symp. on Integrated Network and Service Management (IM) |
Anonymized Internet Traces Denial of Service Attacks |
2019
| Zhai, X. Wang, M. Hu, G. | Graph analysis of network flow connectivity behaviors | Turkish Journal of Electrical Engineering and Computer Science | Anonymized Internet Traces |
2019
| Jain, R. Erbad, A. Bhamare, D. | The P-ART framework for placement of virtual network services in a multi-cloud environment | Computer Communications | Anonymized Internet Traces |
2019
| Argyraki, K. Ford, B. | MorphIT: Morphing Packet Reports for Internet Transparency | Proceedings on Privacy Enhancing Technologies | Anonymized Internet Traces |
2019
| Huong, T.T. Nguyen, H.T. Pham, N.N. Nguyen, N.T. Marshall, A. | SDN-based SYN proxy-A solution to enhance performance of attack mitigation under TCP SYN flood | The Computer J. | Anonymized Internet Traces |
2019
| Jamro, E. | Flow caching effectiveness in packet forwarding applications | Computer Science Journal | Anonymized Internet Traces |
2019
| Yang, X. Wang, Y. | A Hybrid Privacy Preserving against Multi-attacks for Network Data Publication | International Computer Science and Applications Conference (ICSAC ) | Anonymized Internet Traces |
2019
| Epicoco, I. Pulimeno, M. | CMSS: Sketching based reliable tracking of large network flows | Future Generation Computer Systems | Anonymized Internet Traces |
2019
| Chen, X. Einziger, G. Friedman, R. Kassner, Y. | Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation | IEEE/ACM Transactions on Networking | Anonymized Internet Traces |
2019
| Sampalli, S. Bodorik, P. | DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache Spark | IEEE Trans. on Network and Service Management | Anonymized Internet Traces |
2019
| Ruiz, M. Sutter, G. Lopez-Buedo, S. Lopez de Vergara, J. E. | Towards 100 GbE FPGA-Based Flow Monitoring | X Southern Conference on Programmable Logic (SPL) | Anonymized Internet Traces |
2019
| Parisis, G. Clegg, R. Zakhleniu, N. | On the Distribution of Traffic Volumes in the Internet and its Implications | IEEE INFOCOM - IEEE Conference on Computer Communications | Anonymized Internet Traces |
2019
| Zaidi, S. M. A. | DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation | International Journal of Information Security | Anonymized Internet Traces |
2018
| Shi, X. Yin, X. Wang, Z. | HashFlow for better flow record collection | arxiv.org | Anonymized Internet Traces |
2018
| Ding, W. Hu, X. | VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window | arxiv.org | Anonymized Internet Traces |
2018
| Nguyen, K. K. Cheriet, M. | Multiple-step-ahead traffic prediction in high-speed networks | IEEE Comm. Lett. | Anonymized Internet Traces |
2018
| Exposito, E. Gineste, M. Baudoin, C. Aguilar, J. | Towards the deployment of machine learning solutions in network traffic classification: A systematic survey | IEEE Comm. Surveys and Tutorials | Anonymized Internet Traces |
2018
| The implications of the Internets topological structure for its efficiency, security, and reliability | Univ. of Louisiana at Lafayette (ProQuest Publ.) |
Anonymized Internet Traces Topology with BGP |
|
2018
| Rodriguez-Perez, M. Fernandez-Veiga, M. Herreria-Alonso, S. | Matching SDN and legacy networking hardware for energy efficiency and bounded delay | Sensors | Anonymized Internet Traces |
2018
| Malone, T.W. | Integrated information as a metric for group interaction | Plos One | Anonymized Internet Traces |
2018
| Tseng, S. Tang, A. | Accurate rate-aware flow-level traffic splitting | Allerton Conf. on Communication, Control, and Computing | Anonymized Internet Traces |
2018
| Benson, A. Charikar, M. | A sampling framework for counting temporal motifs | arxiv.org | Anonymized Internet Traces |
2018
| Flexible and scalable systems for network management | Princeton Univ. | Anonymized Internet Traces | |
2018
| Li, M. Liu, A. | Finding persistent items in distributed datasets | Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2018
| Dai, T. Klein, A. Shulman, H. Waidner, M. | Domain validation++ for MitM-resilient PKI | ACM SIGSAC Conf. on Computer and Communications Security |
Anonymized Internet Traces Topology with BGP |
2018
| Qin, Q. Ma, L. Poularakis, K. Le, F. Leung, K.K. Kompella, S. Tassiulas, L. | Routing performance in distributed SDN under synchronization constraint | dais-ita.org | Anonymized Internet Traces |
2018
| Gong, J. Zhang, H. Zou, L. Shi, L. Li, X. | HeavyGuardian: Separate and guard hot items in data streams | ACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining | Anonymized Internet Traces |
2018
| Count-Min: Optimal estimation and tight error bounds using empirical error distributions | Conf. on Knowledge Discovery and Data Mining (SIGKDD) | Anonymized Internet Traces | |
2018
| Anomaly detection in networks using machine learning | Univ. of Essex | Anonymized Internet Traces | |
2018
| Harrison, R. Canini, M. Feamster, N. Rexford, J. Willinger, W. | Sonata: query-driven streaming network telemetry | Conf. on Special Interest Group on Data Communication | Anonymized Internet Traces |
2018
| Huang, Q. Lee, P.P.C. | On the performance and convergence of distributed stream processing via approximate fault tolerance | arxiv.org | Anonymized Internet Traces |
2018
| Infrastructure-based anonymous communication protocols in future internet architectures | Carnegie Mellon Univ |
Anonymized Internet Traces Topology with BGP |
|
2018
| Hsiao, H.C. Asoni, D.E. Scherrer, S. Perrig, A. Hu, Y.C. | CLEF: Limiting the damage caused by large flows in the Internet core (technical report) | arxiv.org | Anonymized Internet Traces |
2018
| Lashkari, A.H. Ghorbani, A.A. | A detailed analysis of the CICIDS2017 data set | Intl Conf. on Information Systems Security and Privacy |
Anonymized Internet Traces Denial of Service Attacks |
2018
| Choi, D. Sael, L | CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositions | PLOS One | Anonymized Internet Traces |
2018
| Yaoqing Liu, Y. | PFCA: a programmable FIB caching architecture | Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2018
| Shulman, H. Waidner, M. | Path MTU discovery considered harmful | Conf. on Distributed Computing Systems (ICDCS) | Anonymized Internet Traces |
2018
| Energy-efficient carrier SDN networks | Univ. of Vigo | Anonymized Internet Traces | |
2018
| Rodriguez-Perez, M. Fernandez-Veiga, M. | Implementing energy saving algorithms for ethernet link aggregates with ONOS | Conf. on Software Defined Systems (SDS) | Anonymized Internet Traces |
2018
| Carroll, T. E. Chikkagoudar, S. | Discovering significant co-occurrences to characterize network behaviors | Intl Conf. on Human Interface and the Management of Information | Anonymized Internet Traces |
2018
| Ovatman, T. | A decentralized replica placement algorithm for edge computing | Trans. on Network and Service Management | Anonymized Internet Traces |
2018
| Ultra-fast and memory-efficient lookups for cloud, networked systems, and massive data management | Univ. of Kentucky | Anonymized Internet Traces | |
2018
| Investigation of Internet traffic anomalies by application of neural networks | Vilnius Univ. | Anonymized Internet Traces | |
2018
| Popescu, D.A. Antichi, G. Korenek, J. Moore, A.W. | Seek and Push: Detecting large traffic aggregates in the dataplane | arxiv.org | Anonymized Internet Traces |
2018
| Gorinsky, S. | A protocol-ignorance perspective on incremental deployability of routing protocols | IFIP Networking Conf. (NETWORKING) |
Anonymized Internet Traces Topology with Archipelago |
2018
| Iannacone, M.E. Vincent, M.S. Chen, Q. Bridges, R.A. | A survey of Intrusion Detection Systems leveraging host data | arxiv.org | Anonymized Internet Traces |
2018
| Real-time detection of communication with blacklisted network hosts | Masaryk Univ. | Anonymized Internet Traces | |
2018
| Barlet-Ros, P. | Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs | Computer Networks | Anonymized Internet Traces |
2018
| Aviv, A. Keller, E. Smith, J. | Turboflow: information rich flow record generation on commodity switches | EuroSys Conf. | Anonymized Internet Traces |
2018
| Pezaros, D.P. Hutchison, D. | Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modelling | Computer Networks | Anonymized Internet Traces |
2018
| Vu, D. Lee, Y. Cho, S. Cho, C. Kim, H. | Pattern-identified online task scheduling in multitier edge computing for industrial IoT services | Mobile Information Systems | Anonymized Internet Traces |
2018
| Goldberg, I. | Secure asymmetry and deployability for decoy routing systems | Proc. on Privacy Enhancing Technologies | Anonymized Internet Traces |
2018
| Tang, X. Shen, M. Du, X. Guizani, M. | Privacy-preserving DDoS attack detection using cross-domain traffic in Software Defined Networks | IEEE J. on Selected Areas in Communications | Anonymized Internet Traces |
2018
| Cai, Q. Gupta, A. Rexford, J. | Network-wide heavy hitter detection with commodity switches | Symp. on SDN Research | Anonymized Internet Traces |
2018
| Moshref, M. Zhou, Y. Yang, T. Yu, M. | A comparison of performance and accuracy of measurement algorithms in software | Symp. on SDN Research | Anonymized Internet Traces |
2018
| Orozco, A. Villalba, L. | Adaptive artificial immune networks for mitigating DoS flooding attacks | Swarm and Evolutionary Computation |
Anonymized Internet Traces Denial of Service Attacks |
2018
| Ahmed, T. Pisharath, J. | ISA-based trusted network functions and server applications in the untrusted cloud | arxiv.org | Anonymized Internet Traces |
2018
| Drummond, A. Teodoro, G. | High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach | J. of Internet Services and Applications | Anonymized Internet Traces |
2018
| Narayan, A. Cangialosi, F. Raghavan, D. Narayana, S. Alizadeh, M. Balakrishnan, H. | Elasticity detection: A building block for Internet congestion control | arxiv.org | Anonymized Internet Traces |
2018
| Asoni, D. Perrig, A. Barrera, D. Danezis, G. Troncoso, C. | TARANET: Traffic-analysis resistant anonymity at the NETwork layer | arxiv.org |
Anonymized Internet Traces Topology with BGP |
2018
| Bi, J. Yang, T. Gao, K. Zhang, C. Cao, J. Wang, J. | KeySight: Troubleshooting programmable switches via scalable high-coverage behavior tracking | Intl Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2018
| Zhu, H. Liu, L. Zhu, C. | Detection of super nodes based on connection metrics for network data streams | IEEE Intl Conf on Big Data Analysis (ICBDA) | Anonymized Internet Traces |
2018
| Liu, L. Zhu, H. Zhu, C. Chen, L. | Parallel Sketch Based Super Node Detection with Traceability | Chinese Journal of Electronics | Anonymized Internet Traces |
2018
| Feng, Y. Song, H. Wan, Y. Xu, W. Wang, Y. Dai, H. Li, Y. Lin, B. | OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update Processing | IEEE/ACM Intl Symp. on Quality of Service (IWQoS) | Anonymized Internet Traces |
2018
| Jiang, J. Liu, P. Huang, Q. Gong, J. Zhou, Y. Miao, R. Li, X. Uhlig, S. | Elastic sketch: adaptive and fast network-wide measurements | ACM Special Interest Group on Data Communication | Anonymized Internet Traces |
2018
| Bi, Y. Michael, N. Tang, A. Doyle, J.C. Matni, N. | A Control-Theoretic Approach to In-Network Congestion Management | IEEE/ACM Trans. on Networking | Anonymized Internet Traces |
2018
| Chen, Y. Zheng, H. | Approximation algorithms for dependency-aware rule-caching in Software-Defined Networks | IEEE Global Comm. Conf. (GLOBECOM) | Anonymized Internet Traces |
2018
| Hsiao, H.C. Asoni, D.E. Scherrer, S. Perrig, A. Hu, Y.C. | CLEF: Limiting the Damage Caused by Large Flows in the Internet Core | Intl Conf. on Cryptology and Network Security | Anonymized Internet Traces |
2018
| Zhou, C. Yu, Y. Xingang, S. Yin, X. Yao, J. | Fast detection of heavy hitters in Software Defined Networking using an adaptive and learning method | Intl Conf. on Cloud Computing and Security | Anonymized Internet Traces |
2018
| Martinez-Pelaez, R. Mena-Camare, L. Ochoa-Brust, A. Iriarte-Solis, A. | Design of a Traffic Generation Platform for Offline Evaluation of NIDS | Intl Conf. On Advances In Computing, Control And Networking | Anonymized Internet Traces |
2018
| Awan, M. D. Khiyal, M. S. H. | Big Data in Cloud Computing: A Resource Management Perspective | Hindawi Scientific Programming | Anonymized Internet Traces |
2018
| Silva, J.M.C. Lima, S.R. | Deploying Time-based Sampling Techniques in Software-Defined Networking | Intl Conf. on Software, Telecommunications and Computer Networks (SoftCOM) | Anonymized Internet Traces |
2018
| Kirovski, D. Harper, D.T. | Computing units using directional wireless communication | arxiv.org | Anonymized Internet Traces |
2018
| Lashkari, A.H. Ghorbani, A.A. | Toward generating a new intrusion detection dataset and intrusion traffic characterization. | Intl Conf. on Information Systems Security and Privacy (ICISSP) |
Anonymized Internet Traces Denial of Service Attacks |
2018
| Yu, W. E. | Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop | Intl Symp. on Computing and Networking Workshops (CANDARW) | Anonymized Internet Traces |
2018
| Nayak, A. | On improving measurement accuracy of DREAM framework with estimation filters | IEEE Global Comm. Conf. (GLOBECOM) | Anonymized Internet Traces |
2018
| Akkus, I. E. Bhatotia, P. Blanas, S. Chen, R. Fetzer, C. Strufe, T. | ApproxJoin: Approximate Distributed Joins | ACM Symp. on Cloud Computing | Anonymized Internet Traces |
2018
| Li, H. Hu, C. | DIAL: Distributed Elephant Flow Counting on SDN | IEEE Global Communications Conf. (GLOBECOM) | Anonymized Internet Traces |
2018
| Mylonas, A. Yoo, P. D. Katos, V. | From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods | IEEE Communications Surveys and Tutorials | Anonymized Internet Traces |
2018
| Bahramali, A. Houmansadr, A. | DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning | ACM SIGSAC Conf. on Computer and Communications Security | Anonymized Internet Traces |
2018
| Cangialosi, F. Raghavan, D. Goyal, P. Narayana, S. Mittal, R. Alizadeh, M. Malakrishnan, H. | Restructuring endpoint congestion control | Conf. of the ACM Special Interest Group on Data Communication | Anonymized Internet Traces |
2018
| Application of clustering methods network traffic for detecting DDoS attacks | Problems of information technology | Anonymized Internet Traces | |
2018
| Morton, A. | Effects of Pervasive Encryption on Operators | Internet Engineering Task Force (IETF) | Anonymized Internet Traces |
2018
| Pontarelli, S. Reviriego, P. | Adaptive cuckoo filters | Proc. Workshop on Algorithm Engineering and Experiments (ALENEX) | Anonymized Internet Traces |
2018
| Samira, D. Bouabid, E. O. | Enhancing Cloud Security using advanced MapReduce k-means on log files | Intl Conf. on Software Engineering and Information Management | Anonymized Internet Traces |
2018
| Shen, Z. Huang, X. | Facilitating network functions virtualization by exploring locality in network traffic: A proposal | Intl Conf. on Computer Science and Artificial Intelligence | Anonymized Internet Traces |
2018
| Yang, T. Wang, Y. Dai, H. Chen, X. Jin, L. Song, H. Liu, B. | Low Computational Cost Bloom Filters | IEEE/ACM Transactions on Networking (TON) | Anonymized Internet Traces |
2018
| Cheng, W. Zhang, T. Xie, J. Ren, F. Yang, B. | Power efficient high performance packet I/O | Intl Conf. on Parallel Processing Article No. 69 | Anonymized Internet Traces |
2018
| Hu, H. Gu, G. Ahn, G. J. Zhang, F. | vNIDS: Towards elastic security with safe and efficient virtualization of Network Intrusion Detection Systems | ACM SIGSAC Conf. on Computer and Communications Security | Anonymized Internet Traces |
2018
| Chandra, J. Sairam, A. | Optimizing flow setup time in software defined network | Intl Conf. on Communication Systems and Networks (COMSNETS) | Anonymized Internet Traces |
2018
| Lee, H. | A High-Bandwidth PCM-Based Memory System for Highly Available IP Routing Table Lookup | IEEE Computer Architecture Letters | Anonymized Internet Traces |
2018
| Lee, D. Y. Chen, T. Y. Wu, A. Y. | Dynamically updatable ternary segmented aging Bloom filter for OpenFlow-compliant low-power packet processing | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2018
| Leira, R. Lopez de Vergara, J.E. Gomez-Arribas, F.J. Gonzalez, I. | On the feasibility of 40 gbps network data capture and retention with general purpose hardware | Annual ACM Symp. on Applied Computing | Anonymized Internet Traces |
2018
| Dutta, R. | GADFly: A fast and robust algorithm to detect P2P botnets in communication graphs | IEEE Global Comm. Conf. (GLOBECOM) | Anonymized Internet Traces |
2018
| Lee, P. P. C. Bao, Y. | Sketchlearn: relieving user burdens in approximate measurement with automated statistical inference | ACM Special Interest Group on Data Communication | Anonymized Internet Traces |
2018
| Zhai, X. Wang, M. Hu, G. | Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs) | International Conference on Cloud Computing and Security | Anonymized Internet Traces |
2018
| Heidemann, J. | Detecting IoT Devices in the Internet (Extended) | University of Southern California (USC) | Anonymized Internet Traces |
2018
| Wang, P. | An Efficient Hybrid Model for Detecting Distributed Denial of Service (DDOS) Attacks in Cloud Computing using Multivariate Correlation and Data Mining Clustering Techniques | Issues in Information System | Anonymized Internet Traces |
2018
| Yang, Y. Xu, M. | Flow-level traffic engineering in conventional networks with hop-by-hop routing | Symp. on Quality of Service (IWQoS) | Anonymized Internet Traces |
2018
| Kayatas, C. Anarim, E. | Statistical measures: Promising features for time series based DDoS attack detection | Workshop on Computational Intelligence for Multimedia Understanding (IWCIM) |
Anonymized Internet Traces Denial of Service Attacks |
2018
| Rodriguez-Perez, M. Fernandez-Veiga, M. | QoS-aware energye efficient algorithms for ethernet link aggregates in Software-Defined Networks | Intl Conf on Software, Telecommunications and Computer Networks (SoftCOM) | Anonymized Internet Traces |
2018
| Shahzad, M. Liu, A. X. Li, M. Zhong, Y. Chen, G. | Identifying and Estimating Persistent Items in Data Streams | IEEE/ACM Transactions on Networking | Anonymized Internet Traces |
2018
| Hardy, R. Chan, K. Scott, L. Oliveira, D. Verma, G. | Chaff allocation and performance for network traffic obfuscation | IEEE Intl Conf. on Distributed Computing Systems (ICDCS) | Anonymized Internet Traces |
2018
| Jirsik, T. Velan, P. Komarkova, J. Spacek, S. Drasar, M. Plesnik, T. | Towards provable network traffic measurement and analysis via semi-labeled trace datasets | Network Traffic Measurement and Analysis Conf. (TMA) | Anonymized Internet Traces |
2018
| Chen, X. Sheng, Y. Ni, H. | Catching the flow with locality sensitive hashing in programmable data planes | Intl Conf. on Software Engineering and Service Science (ICSESS) | Anonymized Internet Traces |
2018
| Heusse, M. Duda, A. | The virtue of gentleness: Improving connection response times with SYN priority active queue Management | IFIP Networking Conf. (IFIP Networking) and Workshops | Anonymized Internet Traces |
2018
| Chen, X. Einziger, G. Rottenstreich, O. | Efficient Measurement on Programmable Switches Using Probabilistic Recirculation | Intl Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2018
| Einziger, G. Friedman, R. | Fast flow volume estimation | Pervasive and Mobile Computing | Anonymized Internet Traces |
2018
| Einziger, G. Friedman, R. Luizelli, M. C. Waisbard, E. | Volumetric hierarchical heavy hitters | Intl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) | Anonymized Internet Traces |
2018
| Einziger, G. Feibish, S. L. Moraney, J. Raz, D. | Network-wide routing-oblivious heavy hitters | Symp. on Architectures for Networking and Communications Systems | Anonymized Internet Traces |
2018
| Kamli, A. Rataj, A. | Adaptation of the N-GREEN architecture for a bursty traffic | Intl Confe. on Computer Networks | Anonymized Internet Traces |
2018
| Busson, A. Lassous, I. G. | Association Optimization in Wi-Fi Networks based on the Channel Busy Time Estimation | Networking Conf. (IFIP Networking) and Workshops | Anonymized Internet Traces |
2018
| Sampalli, S. Bodorik, P. | DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark | IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE) | Anonymized Internet Traces |
2018
| Ullah, S. Kim, H. | Statistical Application Fingerprinting for DDoS Attack Mitigation | IEEE Transactions on Information Forensics and Security |
Anonymized Internet Traces Denial of Service Attacks |
2018
| Saavedra, M.Z. Medalla, A.H. Yu, W.E. | Adapting block-sized captures for faster network flow analysis on the Hadoop ecosystem | IEEE Intl Conf. on Computer and Communications | Anonymized Internet Traces |
2017
| Gao, D. Dong, P. Foh, C. Zhang, H. | Mitigating the table-overflow attack in Software-Defined Networking | IEEE Trans. on Network and Service Management |
Anonymized Internet Traces Topology with Archipelago |
2017
| Yu, W.E.S. | A comparison between text, Parquet, and PCAP formats for use in distributed network flow analysis on Hadoop | J. of Advances in Computer Networks | Anonymized Internet Traces |
2017
| Towards an accountable and private Internet | ETH Zurich | Anonymized Internet Traces | |
2017
| Data-driven management of CDN performance | Princeton Univ. | Anonymized Internet Traces | |
2017
| Jurisdictional arbitrage: Quantifying and counteracting the threat of government intelligence agencies against Tor | Northeastern Univ. | Anonymized Internet Traces | |
2017
| Belazzougui, D. Qian, C. Zhang, Q. | Memory-efficient and ultra-fast network lookup and forwarding using Othello hashing | arxiv.org | Anonymized Internet Traces |
2017
| Herreria-Alonso, S. Fernandez-Veiga, M. Lopez-Garcia, C. | Delay properties of energy efficient ethernet networks | IEEE Communications Lett. | Anonymized Internet Traces |
2017
| Anomaly detection in computer networks using higher-order dependencies | Univ. of Ljubljana | Anonymized Internet Traces | |
2017
| Ros, P. | Towards a NetFlow implementation for OpenFlow software-Defined Networks | Intl Teletraffic Congress | Anonymized Internet Traces |
2017
| Chen, R. Bhatotia, P. Fetzer, C. Hilt, V. Strufe, T. | Approximate stream analytics in Apache Flink and Apache Spark streaming | arxiv.org | Anonymized Internet Traces |
2017
| Design of a flow monitoring solution for OpenFlow Software-Defined Networks | Univ. of Granada | Anonymized Internet Traces | |
2017
| Minimizing the number of observers required for traffic matrix generation | Fed. Univ. of Espirito Santo |
Anonymized Internet Traces Topology with Archipelago |
|
2017
| Bao, N. Park, M. | Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks | J. of Network and Computer Applications |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Chen, Z. Li, J. Vasilakos, A.V. | Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiers | IEEE Trans. on Information Forensics and Security |
Anonymized Internet Traces Topology with Archipelago |
2017
| Choi, D. Van, T. Long, M. Park, M. | DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined Networking | J. of Korean Inst. of Communications and Information Sciences |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Lee, P. Li, R. Tang, L. Chen, Y. Zhang, G. | SketchVisor: Robust network measurement for software packet processing | ACM SIGCOMM | Anonymized Internet Traces |
2017
| Stochastic traffic analysis of contemporary Internet high-speed links | Colombian Conf. on Computing | Anonymized Internet Traces | |
2017
| Einziger, G. Friedman, R. Luizelli, M.C. Waisbard, E. | Constant time updates in hierarchical heavy hitters | ACM Special Interest Group on Data Communication (SIGCOMM) | Anonymized Internet Traces |
2017
| Gharib, A. Lashkari, A. Ghorbani, A. | Towards a reliable Intrusion Detection benchmark dataset | Software Networking |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Ren, F. Lin, C. | Modeling and understanding burst transmission for energy efficient ethernet | Computer Networks | Anonymized Internet Traces |
2017
| Lim, J. Kim, J. Cho, W. Chung, E. Lee, H. | Scalable bandwidth shaping scheme via adaptively managed parallel heaps in manycore-based network processors | ACM Trans. on Design Automation of Electronic Systems | Anonymized Internet Traces |
2017
| Jouet, S. Marnerides, A. Pezaros, D. | Distributed, multi-level network anomaly detection for datacentre networks | IEEE ICC Next Generation Networking and Internet Symp. | Anonymized Internet Traces |
2017
| Bi, Y. Michael, N. Tang, A. Doyle, J. Matni, N. | HFTraC: High-frequency traffic control | Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) | Anonymized Internet Traces |
2017
| Alameka, F. | Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS | J. Rekayasa Teknologi Informasi |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Bartlett, G. Heidemann, J. Shi, H. Deng, X. | Do you see me now? Sparsity in passive observations of address liveness | Network Traffic Measurement and Analysis Conf. | Anonymized Internet Traces |
2017
| Giladi, R. Shavitt, Y. | On network neutrality measurements | ACM Trans. on Intelligent Systems and Technology (TIST) | Anonymized Internet Traces |
2017
| Wan, Y. Li, Y. Zhang, C. Dai, H. Wang, Y. Zhang, G. Liu, B. | Ultra-fast Bloom filters using SIMD techniques | Intl Symp. on Quality of Service (IWQoS) | Anonymized Internet Traces |
2017
| Wang, C. Yuan, X. Zhou, Y. Wang, Q. Ren, K. | LightBox: SGX-assisted secure network functions at near-native speed | arxiv.org | Anonymized Internet Traces |
2017
| Log analysis using Splunk Hadoop Connect | Naval Postgraduate School | Anonymized Internet Traces | |
2017
| Addie, R. Fatseas, D. | Social network behaviour inferred from O-D pair traffic | Australian J. of Telecommunications and the Digital Economy | Anonymized Internet Traces |
2017
| Lucani, D. Fitzek, F. Bouallegue, A. | Random linear network coding schemes for reduced zero-padding overhead: Complexity and overhead analysis | European Wireless Conf. | Anonymized Internet Traces |
2017
| Navarro, L. | Tight bounds for sketches in traffic validation | Conf. on Networking, Sensing and Control | Anonymized Internet Traces |
2017
| Einziger, G. Friedman, R. Kassner, Y. | Randomized admission policy for efficient top-k and frequency estimation | Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2017
| Einziger, G. Friedman, R. Kassner, Y. | Optimal elephant flow detection | IEEE Conf. on Computer Communications | Anonymized Internet Traces |
2017
| Bevan, P. Lang, K. Liberty, E. Rhodes, L. Thaler, J. | A high-performance algorithm for identifying frequent items in data streams | arxiv.org | Anonymized Internet Traces |
2017
| Perez, M. Veiga, M. Garcia, C. | Optimizing dual-mode EEE interfaces: Deep-sleep is healthy | IEEE Trans. on Communications | Anonymized Internet Traces |
2017
| Narayana, S. Rottenstreich, O. Muthukrishnan, S. Rexford, J. | Heavy-hitter detection entirely in the data plane | Symp. on SDN Research | Anonymized Internet Traces |
2017
| On improving DREAM framework with estimations and ProgME | Univ. of Ottawa | Anonymized Internet Traces | |
2017
| Naidu, M. | A model for generating synthetic network flows and accuracy index for evaluation of anomaly network Intrusion Detection Systems | Indian J. Science and Technology | Anonymized Internet Traces |
2017
| Wild, T. Herkersdorf, H. | Reducing data center resource over-provisioning through dynamic load management for virtualized network functions | Architecture of Computing Systems (ARCS) | Anonymized Internet Traces |
2017
| Pappas, C. Perrig, A. Gligor, V. Hu, Y. | The case for in-network replay suppression | Asia Conf. on Computer and Communications Security |
Anonymized Internet Traces Paper Data and Tools |
2017
| Performance measurement of stream data processing in Apache Spark | Masaryk Univ. | Anonymized Internet Traces | |
2017
| Benson, T. Rexford, J. | Dapper: Data plane performance diagnosis of TCP | Symp. on SDN Research | Anonymized Internet Traces |
2017
| Gupta, A. Feamster, N. Vanbever, L. | SDX-based flexibility or Internet correctness?: Pick two! | Symp. on SDN Research (SOSR) |
Anonymized Internet Traces Topology with BGP |
2017
| Resource and admission management in Next Generation Networks | Riga Tech. Univ. | Anonymized Internet Traces | |
2017
| Xu, Y. Xia, L. Ahmed, N. Yu, M. | Stream aggregation through order sampling | arxiv.org | Anonymized Internet Traces |
2017
| Bifulco, R. Pontarelli, S. Capone, A. | Relaxing state-access constraints in stateful programmable data planes | arxiv.org | Anonymized Internet Traces |
2017
| Bhattacharyya, D.K | DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks | Microsystem Technologies |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Manaa, M.E. | DDoS attack detection approach using an efficient cluster analysis in large data scale | Conf. on New Trends in Information and Communications Technology Applications (NTICT) |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Koromilas, L. Polychronakis, M. Ioannidis, S. | Design and implementation of a stateful network packet processing framework for GPUs | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2017
| Barlet-Ros, P. | Reinventing NetFlow for OpenFlow Software-Defined Networks | arxiv.org | Anonymized Internet Traces |
2017
| Alam, M. Picone, J. | Measuring the variability of CAIDA internet traffic traces | Conf. on Computer and Information Technology | Anonymized Internet Traces |
2017
| Malone, W. | Integrated information as a metric for group interaction: Analyzing human and computer groups using a technique developed to measure consciousness | arxiv.org | Anonymized Internet Traces |
2017
| Li, H. Hu, H. Wang, K.C. Ahn, G.J. Zhao, Z. Han, W. | On the safety and efficiency of virtual firewall elasticity control | Network and Distributed System Security Symp. (NDSS) | Anonymized Internet Traces |
2017
| Barr, A. Feibish, S. Schiff, L. | Detecting heavy flows in the SDN match and action model | arxiv.org | Anonymized Internet Traces |
2017
| Lopez-Buedo, S. Ruiz, M. Sutter, G. | A single-FPGA architecture for detecting heavy hitters in 100 Gbit/s ethernet links | Intl Conf. on ReConFigurable Computing and FPGAs (ReConFig) | Anonymized Internet Traces |
2017
| Belazzougui, D. Qian, C. Zhang, Q. | A concise forwarding information base for scalable and fast name lookups | Intl Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2017
| Chen, S. Zhou, Y. Chen, M. Luo, J. Li, T. Ling, Y. | Cardinality estimation for elephant flows: A compact solution based on virtual register sharing | IEEE/ACM Trans. on Networking | Anonymized Internet Traces |
2017
| Indexing and compression of network flows | Univ, of Pisa | Anonymized Internet Traces | |
2017
| Sharan, V. Bailis, P. Valiant, G. | Finding Heavily-Weighted Features in Data Streams | arxiv.org | Anonymized Internet Traces |
2017
| Barlet-Ros, P. Carela-Espanol, V. | A NetFlow/IPFIX implementation with OpenFlow | SDN-Polygraph | Anonymized Internet Traces |
2017
| Chen, R. Bhatotia, P. Fetzer, C. Hilt, V. Strufe, T. | StreamApprox: approximate computing for stream analytics | ACM/IFIP/USENIX Middleware Conf. | Anonymized Internet Traces |
2017
| Hardware algorithms for high-speed packet processing | Michigan State Univ. | Anonymized Internet Traces | |
2017
| Houmansadr, A. Mazumdar, A. | Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis | ACM SIGSAC Conf. on Computer and Communications Security | Anonymized Internet Traces |
2017
| Vidal, J. M. Villalba, L. J. G. | Reasoning and Knowledge Acquisition Framework for 5G Network Analytics | Sensors | Anonymized Internet Traces |
2017
| Kline, E. Reiher, P. | RESECT: Self-Learning Traffic Filters for IP Spoofing Defense | Annual Computer Security Applications Conf. |
Anonymized Internet Traces Topology with BGP |
2017
| Towards precise network measurements | Cornell Univ. | Anonymized Internet Traces | |
2017
| Prasanna, V. K. | DeepFlow: a deep learning framework for software-defined measurement | Workshop on Cloud-Assisted Networking | Anonymized Internet Traces |
2017
| Load modelling and generation in IP-based networks | arxiv.org | Anonymized Internet Traces | |
2017
| Park, M. | An efficient DDoS attack detection mechanism based on distributed self organizing map | Intl J. of Applied Engineering Research |
Anonymized Internet Traces Denial of Service Attacks |
2017
| Thanh, N. | Software defined networking-based one-packet DDoS mitigation architecture | Conf. on Ubiquitous Information Management and Communication (IMCOM) | Anonymized Internet Traces |
2017
| Zhang, K. | Practical Concurrent Self-Organizing Lists | Intl Conf. on Parallel and Distributed Systems (ICPADS) | Anonymized Internet Traces |
2017
| Gangwal, A. | Blocking intrusions at border using software defined-internet exchange point (SD-IXP) | Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN) | Anonymized Internet Traces |
2017
| Gangwal, A. Gaur, M. S. | A comprehensive and effective mechanism for DDoS detection in SDN | Intl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob) | Anonymized Internet Traces |
2017
| Chen, M. Xiao, Q. | Per-flow cardinality measurement | Traffic Measurement for Big Network Data | Anonymized Internet Traces |
2017
| Tramarin, F. Vitturi, S. | An energy efficient ethernet strategy based on traffic prediction and shaping | IEEE Trans. on Communications |
Anonymized Internet Traces UCSD Network Telescope |
2017
| Bou-Harb, E. | On correlating network traffic for cyber threat intelligence: A Bloom filter approach | Intl Wireless Communications and Mobile Computing Conf. (IWCMC) | Anonymized Internet Traces |
2016
| Chen, T. Xu, W. | CIDS: Adapting legacy Intrusion Detection Systems to the cloud with hybrid sampling | Intl Conf. on Computer and Information Technology | Anonymized Internet Traces |
2016
| What to do with the Wi-Fi wild west | Horizon | Anonymized Internet Traces | |
2016
| Timely, accurate, and scalable network management for data centers | Univ. of Southern California | Anonymized Internet Traces | |
2016
| Alali, F. Wang, X. Guan, Y. Zhou, T. Liu, X. Basit, N. Stankovic, J. | Hobbits: Hadoop and Hive based Internet traffic analysis | IEEE Conf. on Big Data | Anonymized Internet Traces |
2016
| Sharafaldin, I. Lashkari, A. Ghorbani, A. | An evaluation framework for Intrusion Detection dataset | Conf. on Information Science and Security |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Perrig, A. | PHI: Path-hidden lightweight anonymity protocol at network layer | Proc. on Privacy Enhancing Technologies |
Anonymized Internet Traces Topology with BGP |
2016
| Asghari, V. Nguyen, K. Cheriet, M. | Gaussian process regression based traffic modeling and prediction in high-speed networks | Global Comm. Conf. (GLOBECOM) | Anonymized Internet Traces |
2016
| Resource mapping optimization for distributed cloud services | Istanbul Technical Univ. | Anonymized Internet Traces | |
2016
| Addie, R. Fatseas, D. | Inference of social network behavior from Internet traffic traces | Conf. on Telecommunication Networks and Applications (ITNAC) | Anonymized Internet Traces |
2016
| Sivaraman, A. Nathan, V. Alizadeh, M. Walker, D. Rexford, J. Jeyakumar, V. Kim, C. | Hardware-software co-design for network performance measurement | ACM Workshop on Hot Topics in Networks Pages | Anonymized Internet Traces |
2016
| Raz, D. | Efficient detection of flow anomalies with limited monitoring resources | Conf. on Network and Service Management (CNSM) | Anonymized Internet Traces |
2016
| Chen, Z. Zheng, W. Wu, Y. Cao, J. | BAH: A bitmap index compression algorithm for fast data retrieval | Conf. on Local Computer Networks (LCN) | Anonymized Internet Traces |
2016
| Pappas, C. Szalachowski, P. Perrig, A. | Communication based on per-packet one-time addresses | Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2016
| Building efficient and reliable software-defined networks | Princeton Univ. | Anonymized Internet Traces | |
2016
| Muthukkumarasamy, V. Sithirasenan, E. Singh, K. | A probabilistic sampling method for efficient flow-based analysis | J. of Communications and Networks |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Lee, P. | Toward high-performance distributed stream processing via approximate fault tolerance | Proc. of the Very Large Data Bases Endowment | Anonymized Internet Traces |
2016
| Yuksel, M. | CAR: Cloud-assisted routing | Conf. on Network Function Virtualization and Software Defined Networks | Anonymized Internet Traces |
2016
| Begin, T. Busson, A. Lassous, I. | Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks | Conf. on Network and Service Management | Anonymized Internet Traces |
2016
| Janeja, V. | Characterization of evolving networks for cybersecurity | Information Fusion for Cyber-Security Analytics, Ch. 5 | Anonymized Internet Traces |
2016
| Ponniah, K. | A new ontology?based multi agent framework for intrusion detection | Intl J. of Communication Systems | Anonymized Internet Traces |
2016
| Rice, A. | Picky: efficient and reproducible sharing of large datasets using Merkle-trees | Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) | Anonymized Internet Traces |
2016
| Per-flow cardinality estimation based on virtual LogLog sketching | Univ. Illinois, Urbana-Champaign | Anonymized Internet Traces | |
2016
| Belazzougui, D. Qian, C. Zhang, Q. | A concise forwarding information base for scalable and fast flat name switching | arxiv.org | Anonymized Internet Traces |
2016
| Lai, Y.-K. | Sketch-guided filtering support for detecting superspreaders in high-speed networks | Electronics Letters | Anonymized Internet Traces |
2016
| Jiang, Z. Wei, Y. Shi, X. Ma, X. Ormond, O. | Traffic aware energy efficient router: Architecture, prototype and algorithms | IEEE J. on Selected Areas in Communications | Anonymized Internet Traces |
2016
| Singh, K. De, T. | Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection | Conf. on Informatics and Analytics |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Singh, K. De, T. | Detection of DDoS DNS amplification attack using classification algorithm | Conf. on Informatics and Analytics | Anonymized Internet Traces |
2016
| Manousis, A. Vorsanger, X. Sekar, V. Braverman, V. | One sketch to rule them all: Rethinking network flow monitoring with UnivMon | ACM SIGCOMM | Anonymized Internet Traces |
2016
| Li, Y. Sang, Y. Zhang, J. | Anonymity-based privacy preserving network data publication | Trustcom/BigDataSE/ISPA | Anonymized Internet Traces |
2016
| Kim, J. Park, M. Cho, S. | Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks | PLoS One | Anonymized Internet Traces |
2016
| Reviriego, P. | Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput | IEEE Internet Computing | Anonymized Internet Traces |
2016
| Toan, T. Tuyen, D. Huong, T. Nguyen, T. | OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks | Conf. on Communications and Electronics |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Bao, N. Park, M. | A novel hybrid flow-based handler with DDoS attacks in Software-Defined Networking | Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress |
Anonymized Internet Traces Denial of Service Attacks |
2016
| A security framework based on flow marking IP-traceback techniques | Dalhousie Univ., Halifax, CA |
Anonymized Internet Traces Denial of Service Attacks Topology with Skitter |
|
2016
| Wang, S. | A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy | Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government | Anonymized Internet Traces |
2016
| Tovarnak, D. Lastovicka, M. Caleda, P. | A performance benchmark for NetFlow data analysis on distributed stream processing systems | Network Operations and Management Symp. | Anonymized Internet Traces |
2016
| Zhang, J. Li, Q. | Equalized interval centroid based watermarking scheme for stepping stone traceback | Conf. on Data Science in Cyberspace | Anonymized Internet Traces |
2016
| Ding, K. Hu, C. Chen, M. | Sample and fetch-based large flow detection mechanism in Software Defined Networks | IEEE Comm. Letters | Anonymized Internet Traces |
2016
| Chen, Z. Cao, J. Li, H. Li, C. Wang, Y. Zheng, W. Chang, J. Zhou, J. Hu, Z. Guo, J. | CAMP: A new bitmap index for data retrieval in traffic archival | IEEE Comm. Letters | Anonymized Internet Traces |
2016
| Okamura, K. | Adaptive query rate for anomaly detection with SDN | Intl J. of Computer Science and Network Security | Anonymized Internet Traces |
2016
| Sethu, H. Kandasamy, N. | A new approach to dimensionality reduction for anomaly detection in data traffic | arxiv.org | Anonymized Internet Traces |
2016
| Flow-based compromise detection | Univ. of Twente | Anonymized Internet Traces | |
2016
| Fellman, B. Friedman, R. Kassner, Y. | ICE buckets: improved counter estimation for network measurement | arxiv.org | Anonymized Internet Traces |
2016
| Celeda, P. | Detecting advanced network threats using a similarity search | Conf. on Autonomous Infrastructure, Management, and Security | Anonymized Internet Traces |
2016
| Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection | European Conf. on Networks and Communications | Anonymized Internet Traces | |
2016
| Lai, Y.-K. Huang, C.-Y. Chung, Y.-W. | Toward hardware support for a flexible sketch-based network traffic monitoring system | IEEE Region 10 Symp. (TENSYMP) | Anonymized Internet Traces |
2016
| Graph analysis combining numerical, statistical, and streaming techniques | Georgia Inst. of Technology | Anonymized Internet Traces | |
2016
| Chen, C. Barrera, D. Perrig, A. | On building onion routing into future Internet architectures | Workshop on Open Problems in Network Security (iNetSec) | Anonymized Internet Traces |
2016
| Research on performance and security improvements by Software Defined Network | Kyushu Univ. | Anonymized Internet Traces | |
2016
| Huang, T. Liu, J. Zhang, J. Yang, F. Li, S. Liu, Y. | Fast content store lookup using locality-aware skip list in Content-Centric Networks | Conf. on Computer Comm. Workshops | Anonymized Internet Traces |
2016
| Quoc, D. Bhatotia, P. Fetzer, C. Rodrigues, R. | IncApprox: A data analytics system for incremental approximate computing | Conf. on World Wide Web | Anonymized Internet Traces |
2016
| Rizk, A. Bhat, D. Zink, M. | Measurement-based flow characterization in centrally controlled networks | Conf. on Computer Communications | Anonymized Internet Traces |
2016
| Einziger, G. Friedman, R. | Heavy hitters in streams and sliding windows | IEEE Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2016
| Zincir-Heywood, A.N. | Autonomous system based flow marking scheme for IP-Traceback | IEEE/IFIP Network Operations and Management Symp. (NOMS) |
Anonymized Internet Traces Denial of Service Attacks Topology with Skitter |
2016
| Li, T. Han, B. Sun, Z. Huang, J. | Design and implementation of Software Defined Hardware Counters for SDN | Computer Networks | Anonymized Internet Traces |
2016
| Wu, G. Huang, J. Das, T. | Benchmarking modern distributed streaming platforms | Conf. on Industrial Technology (ICIT) | Anonymized Internet Traces |
2016
| Shirazipour, M. Yu, M. Zhang, Y. | MOZART: Temporal coordination of measurement | Proc. Symp. on SDN Research (SOSR) | Anonymized Internet Traces |
2016
| Sekar, V. Abe, Y. Anderson, D.G. | NetMemex: Providing full-fidelity traffic archival | arxiv.org | Anonymized Internet Traces |
2016
| Zhang, H. Liu, Y. Du, X. | Net-flow fingerprint model based on optimization theory | Arabian J. for Science and Engineering | Anonymized Internet Traces |
2016
| Alipourfard, O. Rexfor, J. Walker, D. | CacheFlow: Dependency-aware rule-caching for Software-Defined Networks | Symp. on SDN Research | Anonymized Internet Traces |
2016
| Basumatary, H. Goswami, T. Bhattacharyya, D.K. | UDP Flooding attack detection using information metric measure | Conf. on ICT for Sustainable Development | Anonymized Internet Traces |
2016
| Wang, Y. He, H. Xiang, Y. Yu, S. Liu, X. | A general collaborative framework for modeling and perceiving distributed network behavior | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2016
| A modular traffic sampling architecture for flexible network measurements | Univ. do Minho, Braga, PT | Anonymized Internet Traces | |
2016
| Perisa, M. Cvitic, I. Husnjak, S. | Artificial neuron network implementation in detection and classification of DDoS traffic | Telecommunications Forum (TELFOR) | Anonymized Internet Traces |
2016
| Muthukkumarasamy, V. Sithirasenan, E. Singh, K. | Performance of flow-based anomaly detection in sampled traffic | J. of Networks |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Muthukkumarasamy, V. Sithirasenan, E. Singh, K. | Intelligent sampling using an optimized neural network | J. of Networks |
Anonymized Internet Traces Denial of Service Attacks |
2016
| Nencioni, G. Procissi, G. Tavanti, L. | The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs | J. Computer Networks | Anonymized Internet Traces |
2016
| Friedman, R. | Counting with TinyTable: Every Bit Counts! | Intl Conf. on Distributed Computing and Networking (ICDN) | Anonymized Internet Traces |
2016
| Parr, G. McClean, S. Moore, A. Krug, L. | Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements | Sustainable Computing: Informatics and Systems | Anonymized Internet Traces |
2015
| Yu, M. Govindan, R. Vahdat, A. | SCREAM: Sketch Resource Allocation for Software-defined Measurement | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Anonymized Internet Traces |
2015
| Yang, J. Wang, Z. Li, F. Yang, Y. | A lightweight DDoS flooding attack detection algorithm based on synchronous long flows | Global Communications Conf. (GLOBECOM) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Muthukkumarasamy, V. Sithirasenan, E. Singh, K. | Flow-based anomaly detection using semisupervised learning | Conf. on Signal Processing and Communication Systems (ICSPCS) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Adaptive sampling and statistical inference for anomaly detection | Drexel Univ. | Anonymized Internet Traces | |
2015
| Luo, H. Zhang, M. Li, J. | Improving network security by dynamically changing path identifiers in future Internet | Global Communications Conf. (GLOBECOM) | Anonymized Internet Traces |
2015
| Yu, S.-Z. | CIPA: A collaborative intrusion prevention architecture for programmable network and SDN | Computers and Security |
Anonymized Internet Traces Denial of Service Attacks UCSD Network Telescope |
2015
| Guo, Z. Yang, Y. | Bounded-reorder packet scheduling in optical cut-through switch | IEEE Trans. on Parallel and Distributed Systems | Anonymized Internet Traces |
2015
| Choudhury, S.H. Nagajara, S. Balakrishnan, N. | BotSpot: fast graph based identification of structured P2P bots | J. Computer Virology and Hacking Techniques | Anonymized Internet Traces |
2015
| Nunes, R. | Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas | Simposio Brasileiro em Seguranca da Informacao e Sistemas |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Kuspriyanto, Hendrawan Rahardjo, B. | Statistical analysis on aggregate and flow based traffic features distribution | Conf. on Wireless and Telematics (ICWT) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Vorsanger, G. Braverman, V. Sekar, V. | Enabling a RISC approach for Software-Defined Monitoring using universal streaming | ACM Workshop on Hot Topics in Networks (HotNets) | Anonymized Internet Traces |
2015
| Zhang, H. Li, M. Liu, Y. | Network watermarking model based on optimization theory | Conf. on Cloud Computing and Big Data (CCBD) | Anonymized Internet Traces |
2015
| Flow-based anomaly detection in high-speed networks | Griffith Univ. | Anonymized Internet Traces | |
2015
| Sethu, H. Kandasamy, N. | A fast algorithm for detecting anomalous changes in network traffic | Conf. on Network and Service Management (CNSM) | Anonymized Internet Traces |
2015
| Moshref, M. Yu, M. | Re-evaluating measurement algorithms in software | Workshop on Hot Topics in Networks (HotNets) | Anonymized Internet Traces |
2015
| Zincir-Heywood, A.N. | Deterministic flow marking for IPv6 traceback (DFM6) | Conf. on Network and Service Management (CNSM) | Anonymized Internet Traces |
2015
| Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region | Univ. Illinois, Urbana-Champaign | Anonymized Internet Traces | |
2015
| Forcen, I. Fernandez-Navajas, J. Ruiz-Mas, J. | Improving network efficiency with Simplemux | Conf. on Computer and Information Technology (CIT) | Anonymized Internet Traces |
2015
| Pontarelli, S. Maestro, J.A. Ottavi, M. | A method to protect Bloom filters from soft errors | Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) | Anonymized Internet Traces |
2015
| Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, M. | Frame coalescing in dual-mode EEE | arxiv.org | Anonymized Internet Traces |
2015
| Rong, R. Liu, J. | Symbiotic network simulation and emulation | ACM Trans. on Modeling and Computer Simulation (TOMACS) | Anonymized Internet Traces |
2015
| Asoni, D.E. Barrera, D. Danezis, G. Perrig, A. | HORNET: High-speed onion routing at the network layer | Conf. on Computer and Communications Security (CCS) |
Anonymized Internet Traces Topology with BGP |
2015
| Reischuk, R.M. Szalachowski, P. Perrig, A. Zhang, Y. Hsiao, H.-C. Kubota, A. Urakawa, J. | SIBRA: Scalable Internet Bandwidth Reservation Architecture | arxiv.org |
Anonymized Internet Traces Topology with BGP |
2015
| Zincir-Heywood, A.N. | Probabilistic flow marking for IP traceback (PFM) | Workshop on Reliable Networks Design and Modeling (RNDM) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Busnel, Y. Mostefaoui, A. | Efficiently summarizing data streams over sliding windows | Symp. on Network Computing and Applications (NCA) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Sadre, R. Sperotto, A. van den Berg, H. Pras, A. | Impact of packet sampling on link dimensioning | IEEE Trans. on Network and Service Management | Anonymized Internet Traces |
2015
| Busnel, Y. Rivetti, N. Sericola, B. | Identifying global icebergs in distributed streams | Symp. on Reliable Distributed Systems (SRDS) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Ramos, J. Santiado del Rio, P.M. Garcia-Dorado, J.L. Gomez-Arribas, F.J. Aracil, J. | Commodity packet capture engines: tutorial, cookbook and applicability | IEEE Communications Surveys and Tutorials | Anonymized Internet Traces |
2015
| Leira, R. Gonzalez, I. Gomez-Arribas, F.J. | Towards high-performance network processing in virtualized environments | Symp. on High Performance Computing and Communications (HPCC) | Anonymized Internet Traces |
2015
| Lui, J.C.S. He, C. Pan, L. Fan, W. Shi, Y. | SAND: A fault-tolerant streaming architecture for network traffic analytics | J. Systems and Software | Anonymized Internet Traces |
2015
| Qian, C. | The virtual network function placement problem | Computer Communications Student Workshops | Anonymized Internet Traces |
2015
| Qian, C. | Low-complexity multi-resource packet scheduling for network function virtualization | Conf. on Computer Communications | Anonymized Internet Traces |
2015
| Jung, S. Park, M. | A distributed self-organizing map for DoS attack detection | Conf. on Ubiquitous and Future Networks |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Detecting DDoS attack using a multilayer data mining techniques | Islamic Univ. of Gaza | Anonymized Internet Traces | |
2015
| Miyazaki, T. Chino, M. Wang, X. Okamoto, S. Gravey, A. Gravey, P. Veeraraghavan, M. Brandt-Pearce, M. Yamanaka, N. | Application-centric energy-efficient Ethernet with quality of service support | Electronics Letters | Anonymized Internet Traces |
2015
| Rabinovich, M. | TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2015
| Chen, S. Chen, M. Ling, Y. | Hyper-compact virtual estimators for Big Network Data based on register sharing | Intl Conf. on Measurement and Modeling of Computer Systems | Anonymized Internet Traces |
2015
| Sistema de deteccion de ataques DDoS en Tor | Univ. Complutense de Madrid |
Anonymized Internet Traces Denial of Service Attacks |
|
2015
| Estudio de captura y almacenamiento de trafico en redes fisicas y virtuales multi-Gigabit | Univ. Autonoma de Madrid | Anonymized Internet Traces | |
2015
| Sistema de deteccion de ataques DDoS en Tor | Univ. Complutense de Madrid |
Anonymized Internet Traces Denial of Service Attacks |
|
2015
| Maji, S. Veeraraghavan, M. Tracy, C. | A measurement-based study of big-data movement | Conf. on Networks and Communications (EuCNC) | Anonymized Internet Traces |
2015
| Wang, B. Lan, J. | Identifying elephant flows in internet backbone traffic with bloom filters and LRU | Computer Communications | Anonymized Internet Traces |
2015
| Lai, Y.-K. Chung, W.-Y. | A software defined sketch system for traffic monitoring | Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2015
| Shuffling based mechanism for DDoS prevention on cloud environment | Natl Inst. of Technology, Rourkela |
Anonymized Internet Traces Denial of Service Attacks |
|
2015
| Janeja, V.P. | Change detection in evolving computer networks: Changes in densification and diameter over time | Conf. on Intelligence and Security Informatics (ISI) | Anonymized Internet Traces |
2015
| Traffic prediction in cloud computing using time series models | Univ. of Botswana | Anonymized Internet Traces | |
2015
| Serrat, J. Gorricho, J.-L. | Self-managed resources in network virtualisation environments | Symp. on Integrated Network Management (IM) | Anonymized Internet Traces |
2015
| Bertaux, L. Carvin, D. | Non-intrusive scheduling of TCP flows | IFIP Networking Conf. | Anonymized Internet Traces |
2015
| Zincir-Heywood, A.N. | Investigating unique flow marking for tracing back DDoS attacks | Symp. on Integrated Network Management (IM) |
Anonymized Internet Traces Denial of Service Attacks |
2015
| Hess, A. | Observing software-defined networks using a decentralized link monitoring approach | Conf. on Network Softwarization (NetSoft) | Anonymized Internet Traces |
2015
| de Hoz, D. Fernandez-Navajas, J. Ruiz-Mas, J. Pascual, F. Lopez, D.R. Florez, D. Castell, J.A. Nunez, M. | Small-packet flows in Software Defined Networks: Traffic profile optimization | J. of Networks | Anonymized Internet Traces |
2015
| Keslassy, I. | Tapping into the routers unutilized processing power | Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2015
| Fellman, B. Kassner, Y. | Independent counter estimation buckets | Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2015
| De Sensi, D. Torquati, M. | Energy driven adaptivity in stream parallel computations | Euromicro Conf. on Parallel, Distributed, and Network-Based Processing | Anonymized Internet Traces |
2015
| A comprehensive study on one-way backscatter traffic analysis | Dalhousie Univ., Halifax, CA |
Anonymized Internet Traces Denial of Service Attacks UCSD Network Telescope |
|
2015
| Pontarelli, S. Maestro, J.A. Ottavi, M. | A synergetic use of Bloom filters for error detection and correction | IEEE Trans. on Very Large Scale Integration (VLSI) Systems | Anonymized Internet Traces |
2015
| Garofalakis, M. Deligiannakis, A. | Sketching distributed sliding-window data streams | VLDB J. | Anonymized Internet Traces |
2015
| Kannan, R. Park, H. Bader, D. | Behavioral clusters in dynamic graphs | Parallel Computing | Anonymized Internet Traces |
2015
| Addie, R.G. Zukerman, M. Neame, T.D. | Performance evaluation of a queue fed by a Poisson Lomax burst process | IEEE Communications Letters | Anonymized Internet Traces |
2015
| Gorricho, J.-L. Serrat, J. Shen, M. Xu, K. Yang, K. | A neuro-fuzzy approach to self-management of virtual network resources | J. Expert Systems with Applications | Anonymized Internet Traces |
2015
| Techniques for online analysis of large distributed data | Iowa State Univ., Ames, IO, US | Anonymized Internet Traces | |
2015
| Okamura, K. | Adaptive anomaly detection for SDN | Asia-Pacific Advanced Network | Anonymized Internet Traces |
2015
| Distributed port scan detection in network traffic | Kauno Technologijos Univ. | Anonymized Internet Traces | |
2014
| Wu, G. Xie, B. Hu, J. | StreamBench: Towards benchmarking modern distributed stream computing frameworks | Conf. on Utility and Cloud Computing (UCC) | Anonymized Internet Traces |
2014
| Divakaran, D.M. | Development and experimentation of TCP initial window function | Conf. on Network of the Future (NOF) | Anonymized Internet Traces |
2014
| Kaplan, H. Korenfeld, B. Morrison, A. Tarjan, R.E. | The CB tree: a practical concurrent self-adjusting search tree | Distributed Computing | Anonymized Internet Traces |
2014
| Lee, K.S. Li, E. Lum, C.L. Tang, A. Weatherspoon, K. | Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks | Internet Measurement Conf. (IMC) | Anonymized Internet Traces |
2014
| Wellem, T. You, H.-P. | Hardware-assisted estimation of entropy norm for high-speed network traffic | IET Electronics Lett. | Anonymized Internet Traces |
2014
| Qiao, Y. Zhen, M. Chen, S. | Estimating the persistent spreads in high-speed networks | IEEE Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2014
| Truong, T.H. Hung, N.T. Puype, B. Colle, D. Steenhaut, K. Thanh, N.H. | An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks | Conf. on Advanced Technologies for Communications (ATC) | Anonymized Internet Traces |
2014
| Shi, X. Ma, X. | Fine-grained power scaling algorithms for energy efficient routers | Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2014
| Reviriego, P. Maestro, J.A. | Efficient flow sampling with back-annotated cuckoo hashing | IEEE Communications Letters | Anonymized Internet Traces |
2014
| Janeja, V.P. | Change detection in temporally evolving computer networks: A big data framework | Conf. on Big Data | Anonymized Internet Traces |
2014
| Tapolcai, J. Mihalka, B. Meszaros, G. Retvari, G. | Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously | Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2014
| Nagaraja, S. | On the reliability of network measurement techniques Used for malware traffic analysis | Cambridge Intl Workshop on Security Protocols | Anonymized Internet Traces |
2014
| Amer, P.D. | Transport layer reneging | Computer Communications | Anonymized Internet Traces |
2014
| Qian, C. Li, X. | Distributed and collaborative traffic monitoring in software defined networks | Hot Topics in Software Defined Networking (HotSDN) | Anonymized Internet Traces |
2014
| Akar, N. | Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks | Photonic Network Communications | Anonymized Internet Traces |
2014
| Tsarev, A. | Analysis and simulation of WAN traffic by self-similar traffic model with OMNET | Wireless Communications and Mobile Computing (IWCMC) | Anonymized Internet Traces |
2014
| Veltri, L. | A statistical blind technique for recognition of internet traffic with dependence enforcement | Wireless Communications and Mobile Computing (IWCMC) | Anonymized Internet Traces |
2014
| Yu, M. Govindan, R. Vahdat, A. | DREAM: Dynamic Resource Allocation for Software-defined Measurement | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2014
| Casey, C.J. Gratz, P.V. Sprintson, A. | Stochastic pre-classification for SDN data plane matching | ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) | Anonymized Internet Traces |
2014
| Cui, J. Chen, G. Chen, Z. Zhang, H. | On the applicability of software defined networking to large scale networks | Conf. on Computer Communication and Networks (ICCCN) | Anonymized Internet Traces |
2014
| Abdullah, A. Udzir, N.I. Mahmod, R. Mustapha, N. | Distributed Denial of Service detection using hybrid machine learning technique | Symp. on Biometrics and Security Technologies (ISBAST) |
Anonymized Internet Traces Denial of Service Attacks |
2014
| Sadre, R. A. Sperotto, A. van den Berg, H. Pras, A. | A hybrid procedure for efficient link dimensioning | Computer Networks | Anonymized Internet Traces |
2014
| Santiado del Rio, P.M. Ramos, J. Muelas, B. Garcia-Dorado, J.L. Gomez-Arribas, F.J. Aracil, J. | Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems | Intl J. Network Management | Anonymized Internet Traces |
2014
| Hadjadj-Aoul, Y. Ksentini, A. Rubino, G. Etame, T. Brun, C. | PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services | Conf. on Information, Intelligence, Systems and Applications (IISA) | Anonymized Internet Traces |
2014
| Liu, A.X. | Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping | ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) | Anonymized Internet Traces |
2014
| Sadre, R. Melnikov, N. Schonwalder, J. Pras, A. | Linking network usage patterns to traffic Gaussianity fit | IFIP Networking Conf. | Anonymized Internet Traces |
2014
| Gorricho, J.-L. Serrat, J. | Contributions to efficient resource management in virtual networks | IFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS) | Anonymized Internet Traces |
2014
| Gorricho, J.-L. Serrat, J. Claeys, M. Famaey, J. De Turck, F. | Neural network-based autonomous allocation of resources in virtual networks | European Conf. on Networks and Communications (EuCNC) | Anonymized Internet Traces |
2014
| Toward a highly available future Internet | Carnegie Mellon Univ. |
Anonymized Internet Traces Topology with BGP Topology with Skitter |
|
2014
| Petrovic, M. Eskridge, T. Carvalho, M. Tao, X. | Exploring Netflow data using Hadoop | ASE BigData/SocialCom/Cybersecurity Conf. | Anonymized Internet Traces |
2014
| Pontarelli, S. Maestro, J.A. | Energy efficient exact matching for flow identification with cuckoo affinity hashing | IEEE Communications Letters | Anonymized Internet Traces |
2014
| Gorricho, J.-L. Serrat, J. Claeys, M. De Turck, F. Latre, S. | Design and evaluation of learning algorithms for dynamic resource management in virtual networks | IEEE/IFIP Network Operations and Management Symp. (NOMS) | Anonymized Internet Traces |
2014
| Lu, J. Kai, Y. Wang, Y. Pan, T. | Power-proportional router: Architectural design and experimental evaluation | Quality of Service (IWQoS) Symp. | Anonymized Internet Traces |
2014
| Zincir-Heywood, A.N. | TDFA: Traceback-based defense against DDoS flooding attacks | IEEE Int Conf. on Advanced Information Networking and Applications (AINA) |
Anonymized Internet Traces Denial of Service Attacks |
2014
| Lee, K.S. Weatherspoon, H. | PHY convert channels: Can you see the idles? | Usenix Symp. on Networked Systems Design and Implementation (NSDI) | Anonymized Internet Traces |
2014
| Heller, B. Jeyakumar, V. Mazieres, D. McKeown, N. | I know what your packet did last hop: Using packet histories to troubleshoot networks | Usenix Symp. on Networked Systems Design and Implementation (NSDI) | Anonymized Internet Traces |
2014
| Mustafa, U. Trabelsi, Z. | A data driven firewall for faster packet filtering | Conf. on Communications and Networking (ComNet) | Anonymized Internet Traces |
2014
| Ko, M.-C. Nam, J. Kim, J. | Bitmap-based prefix caching for fast IP lookup | KSII Trans on Internet and Information Systems | Anonymized Internet Traces |
2014
| Pontarelli, S. Maestro, J.A. Ottavi, M. | Efficient implementation of error correction codes in hash tables | Microelectronics Reliability | Anonymized Internet Traces |
2014
| Takin, T. | On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling | Intl J. of Network Management |
Anonymized Internet Traces UCSD Network Telescope |
2013
| Sun, Y. Zhang, J. Xu, J. Wu, Y. | An efficient framework for parallel and continuous frequent item monitoring | Concurrency Computation: Practice and Experience | Anonymized Internet Traces |
2013
| Shulman, H. | Socket overloading for fun and cache-poisoning | Computer Security Applications Conf. (ACSAC) | Anonymized Internet Traces |
2013
| Slow port scanning with Bro | Gjovik Univ. College, Gjovik, Norway | Anonymized Internet Traces | |
2013
| Addie, R.G. Zukerman, M. | Performance evaluation and service rate provisioning for a queue with fractional Brownian input | Performance Evaluation | Anonymized Internet Traces |
2013
| Zincir-Heywood, A.N. | IP traceback through (authenticated) deterministic flow marking: an empirical evaluation | EURASIP J. on Information Security | Anonymized Internet Traces |
2013
| Sadre, R. Sperotto, A. Pras, A. | Lightweight link dimensioning using sFlow sampling | Conf. on Network and Services Management (CNSM) | Anonymized Internet Traces |
2013
| Tapolcai, J. Korosi, A. Majdan, A. Heszberger, Z. | Compressing IP forwarding tables: towards entropy bounds and beyond | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2013
| Duffield, N. Kompella, R.R. | High-fidelity per-flow delay measurements with reference latency interpolation | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2013
| Holt, J. Ryoo, J.H. John, L.K. de Veciana, G. | Flow migration on multicore network processors: Load balancing while minimizing packet reordering | Conf. on Parallel Processing (ICPP) | Anonymized Internet Traces |
2013
| Herzberg, A. Shulman, H. | Off-path hacking: the illusion of challenge-response authentication | IEEE Security and Privacy | Anonymized Internet Traces |
2013
| Sutton, A. Dos Reis, G. Sprintson, A. | Eliminating network protocol vulnerabilities through abstraction and systems language design | Conf. on Network Protocols (ICNP) | Anonymized Internet Traces |
2013
| On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux | Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) | Anonymized Internet Traces | |
2013
| Shulman, H. | Vulnerable delegation of DNS resolution | European Symp. on Research in Computer Security (ESORICS) | Anonymized Internet Traces |
2013
| Shick, M. | Passive TCP reconstruction and forensic analysis with tcpflow | Naval Postgraduate School, Monterey, CA, US | Anonymized Internet Traces |
2013
| Ksentini, A. Hadjadj-Aoul, Y. Boime, G. | PTPv2-based metwork load estimation | Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) | Anonymized Internet Traces |
2013
| Yu, M. Govindan, R. | Resource/accuracy tradeoffs in software-defined measurement | ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) | Anonymized Internet Traces |
2013
| Molnar, S. | Analysis of elephant users in broadband network traffic | EUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking | Anonymized Internet Traces |
2013
| Workload-aware network processors: improving performance while minimizing power consumption | Univ. Texas, Austin | Anonymized Internet Traces | |
2013
| A fluid-based approach for modeling network activities | J Electr Electron Syst | Anonymized Internet Traces | |
2013
| Salvador, P. Nogueira, A. | Inter-operator traffic differentiation based on multiscale analysis | ThinkMind, Conf. on Advances in Future Internet (AFIN) | Anonymized Internet Traces |
2013
| Pontarelli, S. Maestro, J.A. Ottavi, M. | Reducing the cost of implementing error correction codes in content addressable memories | IEEE Trans. on Circuits and Systems II: Express Briefs | Anonymized Internet Traces |
2013
| Yang, Y. | High-speed multicast scheduling for all-optical packet switches | Conf. on Networking, Architecture and Storage (NAS) | Anonymized Internet Traces |
2013
| Casey, C.J. Gratz, P.V. Sprintson, A. | Stochastic pre-classification for Software Defined Firewalls | IEEE Conf. on Computer Communications and Networks (ICCCN) | Anonymized Internet Traces |
2013
| Latency estimation of IP flows using NetFlow | Univ. Politecnica de Catalunya, Barcelona, Spain | Anonymized Internet Traces | |
2013
| Janeja, V.P. | Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks | IEEE Conf. on Intelligence and Security Informatics | Anonymized Internet Traces |
2013
| Gomez, P. Gonzalez, I. Lopez de Vergara, J.E. | Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware | Conf. on Smart Communications in Network Technologies (SaCoNeT) | Anonymized Internet Traces |
2013
| Choudhury, S. Haglin, D. Howe, B. Nickless, B. Olsen, B. | Massive scale cyber traffic analysis: A driver for graph database research | Workshop on Graph Data Management Experiences and Systems (GRADES) |
Anonymized Internet Traces Denial of Service Attacks |
2013
| Baiocchi, A. | Investigating the trade-off between overhead and delay for full packet traffic privacy | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2013
| Using packet histories to troubleshoot networks | Stanford Univ., Stanford, CA, US | Anonymized Internet Traces | |
2013
| A study of impacts of flow timeouts on link provisioning | Twente Student Conf. on IT | Anonymized Internet Traces | |
2013
| Araujo, J.T. Landa, R. Mykoniati, E. Griffin, D. Rio, M. | On the relationship between fundamental measurements in TCP flows | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2013
| Optimization of network flow monitoring | Information Sciences and Technologies Bulletin of the ACM Slovakia | Anonymized Internet Traces | |
2013
| Sadre, R. Pras, A. | Gaussian traffic revisited | IFIP Networking Conf. | Anonymized Internet Traces |
2013
| Internet traffic classification for high-performance and off-the-shelf systems | Univ. Autonoma de Madrid | Anonymized Internet Traces | |
2013
| Rajagopal, R. Obraczka, K. | Characterizing per-application network traffic using entropy | ACM Trans. on Modeling and Computer Simulation (TOMACS) | Anonymized Internet Traces |
2013
| A collaborative defense framework against DDoS attacks in networks | Washington State Univ., Pullman, WA, US |
Anonymized Internet Traces Denial of Service Attacks |
|
2013
| Liu, J. | Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation | Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS) | Anonymized Internet Traces |
2013
| Zincir-Heywood, A.N. | On evaluating IP traceback schemes: a practical perspective | IEEE Security and Privacy Workshops | Anonymized Internet Traces |
2013
| Jose, L. Miao, R. | Software defined traffic measurement with OpenSketch | Usenix Symp. on Networked Systems Design and Implementation (NSDI) | Anonymized Internet Traces |
2013
| Herzberg, A. | Fragmentation considered vulnerable | ACM Trans. on Information and System Security (TISSEC) | Anonymized Internet Traces |
2013
| Agnew, G. | Turbo covert channel: An iterative framework for covert communication over data networks | IEEE INFOCOM | Anonymized Internet Traces |
2013
| Drago, I. Sperotto, A. Sadre, R. Pras, A. | Measurement artifacts in NetFlow data | Passive and Active Measurement (PAM) | Anonymized Internet Traces |
2013
| Yang, M. Luo, J.-Z. Zhang, L. | Online identification of Tor anonymous communication traffic | J. of Software | Anonymized Internet Traces |
2013
| Chandrashekar, J. Cunha, I. Kurose, J. | Estimating TCP latency approximately with passive measurements | Passive and Active Measurement (PAM) | Anonymized Internet Traces |
2013
| Ravishankar, C.V. | Inferential time-decaying Bloom filters | Conf. on Extending Database Technology (EDBT) | Anonymized Internet Traces |
2013
| DPI over commodity hardware: implementation of a scalable framework using FastFlow | Univ. Pisa, Pisa, IT | Anonymized Internet Traces | |
2013
| Nam, S.Y. | A long range dependent Internet traffic model using unbounded Johnson distribution | IEICE Trans. on Communications | Anonymized Internet Traces |
2012
| Yan, Y. Dong, T. Run-hua, T. | Self-similarity and heavy-tail of ICMP traffic | J. Computers | Anonymized Internet Traces |
2012
| Paasch, C. van der Linden, S. Merindol, P. Avoine, G. Bonaventure, O. | Revisiting flow-based load balancing: Stateless path selection in data center networks | Computer Networks | Anonymized Internet Traces |
2012
| Profiling de trafego inter-operador baseado em analise multi-escalar | Univ. de Aveiro | Anonymized Internet Traces | |
2012
| Kang, K.-D. Zhou, Y. Suzer, M.H. | Adaptive load shedding via fuzzy control in data stream management systems | Conf. on Service-Oriented Computing and Applications (SOCA) | Anonymized Internet Traces |
2012
| Rossi, D. Gringoli, F. Nava, L. Salgarelli, L. Aracil, J. | Wire-speed statistical classification of network traffic on commodity hardware | Internet Measurement Conf. (IMC) | Anonymized Internet Traces |
2012
| Takahashi, T. Miyamoto, D. | DNS-based defense against IP spoofing attacks | Conf. on Neural Information Processing | Anonymized Internet Traces |
2012
| Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. | A GI/G/1 model for 10 Gb/s energy efficient ethernet links | IEEE Trans. on Communications | Anonymized Internet Traces |
2012
| Transport layer reneging | Univ. Delaware | Anonymized Internet Traces | |
2012
| Ding, W. | Comparative research on internet flows characteristics | Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics | Anonymized Internet Traces |
2012
| Wang, J. Yegneswaran, V. Briesemeister, L. Cheung, S. Wang, F. Boneh, D. | StegoTorus: a camouflage proxy for the Tor anonymity system | ACM Conf. on Computer and Communications Security (CCS) | Anonymized Internet Traces |
2012
| Santiago del Rio, P.M. Ramos, J. Garnica, J. Garcia-Dorado, J.L. | Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines | IEEE Communications Lett. | Anonymized Internet Traces |
2012
| Park, M. Han, S. Kim, J. | An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup | IEICE Trans. on Communications | Anonymized Internet Traces |
2012
| Cho, K. Honda, M. Tokuda, H. | Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation | Workshop on Managing Systems Automatically and Dynamically | Anonymized Internet Traces |
2012
| John, L.K. | Efficient traffic aware power management in multicore communications processors | ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2012
| Panwar, S.S. | Efficient buffering and scheduling for a single-chip crosspoint-queued switch | ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2012
| Kaplan, H. Korenfeld, B. Morrison, A. Tarjan, R.E. | CBTree: A practical concurrent self-adjusting search tree | Distributed Computing (DISC) | Anonymized Internet Traces |
2012
| Bin, L. | Stream data analysis for backbone network intrusion detection system | Conf. on Oxide Materials for Electronic Engineering (OMEE) | Anonymized Internet Traces |
2012
| Congdon, P. | Hey, you darned counters!: get off my ASIC! | ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) | Anonymized Internet Traces |
2012
| Hopper, N. | New attacks on timing-based network flow watermarks | Usenix Security Conf. (SEC) | Anonymized Internet Traces |
2012
| Guan, H. Xie, G. Salamatian, K. | Evaluating and optimizing IP lookup on many core processors | IEEE Conf. on Computer Communications and Networks (ICCCN) | Anonymized Internet Traces |
2012
| Nava, L. Este, A. Salgarelli, L. | MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware | Wireless Communications and Mobile Computing (IWCMC) | Anonymized Internet Traces |
2012
| Pomposini, M. Blefari-Melazzi, N. Salsano, S. | Supporting the Web with an information centric network that routes by name | Computer Networks | Anonymized Internet Traces |
2012
| Lima, S.R. | Multiadaptive sampling for lightweight network measurements | IEEE Conf. on Computer Communications and Networks (ICCCN) | Anonymized Internet Traces |
2012
| Toward building practical privacy enhancing technologies | Univ. Minnesota | Anonymized Internet Traces | |
2012
| Akinwumi, J. Esposito, F. Matta, I. | On supporting mobility and multihoming in recursive internet architectures | Computer Communications | Anonymized Internet Traces |
2012
| Yuan, R. Wang, W. Meng, D. Zhang, S. Li, J. | A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic | Conf. on Networking, Architecture and Storage (NAS) | Anonymized Internet Traces |
2012
| Duan, R. Lu, J. Zhang, S. Dai, H. Liu, B. | CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy | Conf. on Distributed Computing Systems (ICDCS) | Anonymized Internet Traces |
2012
| Lima, S.R. | Optimizing network measurements through self-adaptive sampling | Conf. on High Performance Computing and Communication (HPCC) | Anonymized Internet Traces |
2012
| Li, N. | Anonymizing network traces with temporal pseudonym consistency | Conf. on Distributed Computing Systems Workshops (ICDCSW) | Anonymized Internet Traces |
2012
| Tokheim, S. | Reliable broadcast contribution over the public Internet | Norwegian Univ. of Science and Technology | Anonymized Internet Traces |
2012
| Bhuyan, L. Klefstad, R. | Traffic-aware power optimization for network applications on multicore servers | Design Automation Conf. | Anonymized Internet Traces |
2012
| Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. | Bounded energy consumption with dynamic packet coalescing | Networks and Optical Communications (NOC) | Anonymized Internet Traces |
2012
| Li, W. Tessier, R. Wolf, T. | Saving energy and improving TCP throughput with rate adaptation in Ethernet | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2012
| Yang, Y. | High speed multicast scheduling in hybrid optical packet switches with guaranteed latency | IEEE Trans. on Computers | Anonymized Internet Traces |
2012
| Costa, L.H.M.K. | ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers | Computer Networks | Anonymized Internet Traces |
2012
| Jennings, B. Botvich, D. | QoSPlan: A measurement based quality of service aware network planning framework | J. Network and Systems Management | Anonymized Internet Traces |
2012
| A. Detti, A. Pomposini, M. | Scalability measurements in an information-centric network | Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project | Anonymized Internet Traces |
2012
| CBTree: A practical concurrent self-adjusting search tree | Tel-Aviv Univ., Israel | Anonymized Internet Traces | |
2012
| Hu, C. He, K. Jiang, J. Liuy, B. | Reducing power of traffic manager in routers via dynamic on/off-chip scheduling | IEEE INFOCOM | Anonymized Internet Traces |
2012
| Lu, G. Qassrawi, M.T. Zhang, Y. Yu, X. | Feature selection for optimizing traffic classification | Computer Communications | Anonymized Internet Traces |
2012
| Yadav, B. Bansal, P. Raj, S. | IPv4 to IPv6 shift: major challenges | J. Engineering and Innovative Technology (IJEIT) | Anonymized Internet Traces |
2012
| Performance analysis of TCAMs in switches | Univ. Waterloo, Ontario, CA | Anonymized Internet Traces | |
2012
| John, L.K. | Power and performance analysis of network traffic prediction techniques | IEEE Symp. on Performance Analysis of Systems and Software (ISPASS) | Anonymized Internet Traces |
2012
| Bi, J. Wu, J. Zhang, B. | Catching popular prefixes at AS border routers with a prediction based method | Computer Networks | Anonymized Internet Traces |
2012
| Hanniel, I. Keslassy, I. | Estimators also need shared values to grow together | IEEE INFOCOM | Anonymized Internet Traces |
2012
| Kanizo, Y. Keslassy, I. | The variable-increment counting Bloom filter | IEEE INFOCOM | Anonymized Internet Traces |
2012
| Keslassy, I. | The Bloom paradox: When not to use a Bloom filter? | IEEE INFOCOM | Anonymized Internet Traces |
2012
| Guo, X. Zhang, C. Jiang, J. Wu, H. Liu, B. | Tracking millions of flows in high speed networks for application identification | IEEE Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2012
| Lee, D.K. Moon, S. | Unmasking the growing UDP traffic in a campus network | Passive and Active Measurement (PAM) | Anonymized Internet Traces |
2012
| Kiyavash, N. Borisov, N. | Non-blind watermarking of network flows | arxiv.org | Anonymized Internet Traces |
2012
| Rodriguez-Perez, M. Fernandez-Veiga, M. Lopez-Garcia, C. | Optimal configuration of energy-efficient ethernet | Computer Networks | Anonymized Internet Traces |
2012
| Scalable wavelet-based active network stepping stone detection | Air Force Inst. of Technology, Air Univ, | Anonymized Internet Traces | |
2012
| Duffield, N. Kompella, R.R. | Opportunistic flow-level latency estimation using consistent NetFlow | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2012
| Hay, D. Keslassy, I. | Maximizing the throughput of cuckoo hashing in network devices | ComNet, Technion, Israel | Anonymized Internet Traces |
2012
| Keslassy, I. Cohen, R. | Reducing the reordering delay in multi-core network processors | ComNet, Technion, Israel | Anonymized Internet Traces |
2012
| Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks | Univ. Autonoma de Madrid | Anonymized Internet Traces | |
2012
| Design, analysis, and implementation of effective network flow watermarking schemes | Univ. Illinois, Urbana-Champaign | Anonymized Internet Traces | |
2012
| Cancellieri, M. Detti, A. Pomposini, M. Salsano, S. | The CONET solution for information centric networking | Univ. Rome | Anonymized Internet Traces |
2011
| Wang, F. | Behavioral graph analysis of Internet applications | IEEE Global Telecommunications Conf. (GLOBECOM) | Anonymized Internet Traces |
2011
| Sivaraman, V. Zhao, Z. Russell, C. Thottan, M. | Adapting router buffers for energy efficiency | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Anonymized Internet Traces |
2011
| Evaluacion de desempeno de diversas arquitecturas de commutadores opticos | Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia | Anonymized Internet Traces | |
2011
| Carvalho, A.M.M. Teodoro, V.A. Tes, D. Araujo, L.B. | Performance comparison of forecasting models applied to LAN/MAN traffic prediction | IEEE Workshop on Local and Metropolitan Area Networks (LANMAN) | Anonymized Internet Traces |
2011
| Norige, E. Kumar, S Lynch, B. | Non-crypto hardware hash functions for high performance networking ASICs | Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2011
| Nguyen, G.T.K. Caesar, M. Borisov, N. | Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability | ACM Conf. on Computer and Communications Security (CCS) | Anonymized Internet Traces |
2011
| Yang, Y. | Pipelining multicast scheduling in all-optical packet switches with delay guarantee | Intl Teletraffic Congress (ITC) | Anonymized Internet Traces |
2011
| Landa, R. Rio, M. | Criticisms of modelling packet traffic using long-range dependence (extended version) | J. Computer and System Sciences | Anonymized Internet Traces |
2011
| Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias | Univ. Federal Do Rio de Janeiro, Brazil | Anonymized Internet Traces | |
2011
| Melazzi, N.B. Salsano, S. Pomposini, M. | CONET: a content centric inter-networking architecture | ACM SIGCOMM Workshop on Information-Centric Networking (ICN) | Anonymized Internet Traces |
2011
| Jeong, M.-W. Prabhakar, B. | A flow- and packet-level model of the Internet | Univ. Michigan | Anonymized Internet Traces |
2011
| Fernandez Anta, A. Mancuso, V. Rengarajan, B. Vasallo, P. Rizzo, G. | A simple analytical model for energy efficient ethernet | IEEE Communications Lett. | Anonymized Internet Traces |
2011
| Finochietto, J.M. Huiszoon, B. Lopez, V. Tarifeno, M. Aracil, J. Beghelli, A. | Comparison in power consumption of static and dynamic WDM networks | Optical Switching and Networking | Anonymized Internet Traces |
2011
| Reviriego, P. Hernandez, J.A. Maestro, J.A. Uruena, M.. | Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability | Optical Switching and Networking | Anonymized Internet Traces |
2011
| Paul, R.R. Kim, M.S. | Netshuffle: Improving traffic trace anonymization through graph distortion | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2011
| Keslassy, I. | The Bloom paradox: When not to use a Bloom filter | ComNet, Technion, Israel | Anonymized Internet Traces |
2011
| Barakat, C. Marzulli, M. | Spectral models for bitrate measurement from packet sampled traffic | IEEE Trans. on Network and Service Management | Anonymized Internet Traces |
2011
| Reed, M.J. | Optimising rule order for a packet filtering firewall | Conf. on Network and Information Systems Security (SAR-SSI) | Anonymized Internet Traces |
2011
| Xiang, F. Yibo Xue, Y. Jun Li, J. | Towards high-performance network application identification with aggregate-flow cache | arxiv.org | Anonymized Internet Traces |
2011
| Wang, F. Gu, L. | Network-aware behavior clustering of Internet end hosts | IEEE Conf. on Computer Communications (INFOCOM) |
Anonymized Internet Traces UCSD Network Telescope |
2011
| Rahman, A.H. Amer, P.D. | Misbehaviors in TCP SACK generation | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2011
| Gringoli, F. Salgarelli, L. | Quantifying the accuracy of the ground truth associated with Internet traffic traces | Computer Networks | Anonymized Internet Traces |
2011
| Huiszoon, B. Lopez, V. Coenen, R.B. Hernandez, J.A. Maestro, J.A. | Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links | IEEE J. Selected Topics in Quantum Electronics | Anonymized Internet Traces |
2011
| Yu, M. Rexford, J. | Online measurement of large traffic aggregates on commodity switches | Usenix Conf. Hot-ICE | Anonymized Internet Traces |
2011
| Borisov, N. | SWIRL: A scalable watermark to detect correlated network flows | Symp. on Network and Distributed System Security (NDSS) | Anonymized Internet Traces |
2011
| Preventing encrypted traffic analysis | Univ. Illinois, Urbana-Champaign | Anonymized Internet Traces | |
2011
| Lopez, D.R. Barros, A.B. | Predictive models of network traffic load | Studies in Computational Intelligence | Anonymized Internet Traces |
2011
| Sun, Y. Valgenti, V.C. Kim, M.S. | TrustGuard: A flow-level reputation-based DDoS defense system | Conf. on Consumer Communications and Networking (CCNC) |
Anonymized Internet Traces Denial of Service Attacks |
2010
| Hu, C. Jiang, J. Zhou, Y. Liu, B. | A2C: Anti-attack counters for traffic measurement | IEEE Global Telecommunications Conf. (GLOBECOM) | Anonymized Internet Traces |
2010
| Acharya, K. Raja, M.Y.A. | Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks | High-Capacity Optical Networks and Enabling Technologies (HONET) | Anonymized Internet Traces |
2010
| Tsokanos, A. Kouvatsos, D.D. | Dynamic OBS offset allocation in WDM networks | Computer Communications | Anonymized Internet Traces |
2010
| Canini, M. | Evolution of cache replacement policies to track heavy-hitter flows | Symp. on Architectures for Networking and Communications Systems (ANCS) | Anonymized Internet Traces |
2010
| Kompella, R. | CLAMP: Efficient class-based sampling for flexible flow monitoring | Computer Networks | Anonymized Internet Traces |
2010
| Hay, D. Keslassy, I. | Hash tables with finite buckets are less resistant to deletions | Allerton Conf. on Communication, Control and Computing | Anonymized Internet Traces |
2010
| Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas | Facultad de Informatica, Univ. Nacional de la Plata | Anonymized Internet Traces | |
2010
| Ramos, J. Salvador, A. de Vergara, J.E.L. Aracil, J. Cuadra, A. Cutanda, M. | Application of Internet traffic characterization to all-optical networks | Conf. on. Transparent Optical Networks (ICTON) | Anonymized Internet Traces |
2010
| Weibing, Y. Mingyu, C. Xiaofang, Z. Jianping, F. | Robust TCP reassembly with a hardware-based solution for backbone traffic | Conf. on Networking, Architecture and Storage (NAS) | Anonymized Internet Traces |
2010
| Clegg, R. Rio, M. | Forecasting full-path network congestion using one bit signalling | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2010
| Larrabeiti, D. Maestro, J.A. | Would energy efficient ethernet be effective on 10Gbps optical links? | OSA Photonics in Switching (PS) | Anonymized Internet Traces |
2010
| Franke, B. | Empirical evaluation of data transformations for network infrastructure applications | Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) |
Anonymized Internet Traces Topology with Archipelago |
2010
| Wang, F. Gong, B. Li, L. | Identifying heavy-hitter flows fast and accurately | Conf. on Future Computer and Communication (ICFCC) | Anonymized Internet Traces |
2010
| Sanchez-Macian, A. Maestro, J.A. Bleakley, C.J. | Increasing the MTU size for energy efficiency in ethernet | IET Signals and Systems Conf. (ISSC) | Anonymized Internet Traces |
2010
| Carpenter, B.E. Brownlee, N. | Observations of UDP to TCP ratio and port numbers | Conf. on Internet Monitoring and Protection (ICIMP) | Anonymized Internet Traces |
2010
| Goebel, V. Plagemann, T. Siekkinen, M. | Resource adaptive distributed information sharing | Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) | Anonymized Internet Traces |
2010
| Goncalves, P. Vicat-Blanc Primet, P. Dupas, A. | Traffic classification techniques supporting semantic networks | Wireless Communications and Mobile Computing (IWCMC) | Anonymized Internet Traces |
2010
| Achieving flexibility and performance for packet forwarding and data center management | UC Berkeley | Anonymized Internet Traces | |
2010
| Duffield, N. Kompella, R. | Two samples are enough: Opportunistic flow-level latency estimation using NetFlow | IEEE Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2010
| Fang, B.X. Zhang, Y.Z. | Parallelizing weighted frequency counting in high-speed network monitoring | Computer Communications | Anonymized Internet Traces |
2010
| Fang, B.X. Zhang, Y.Z. | Identifying heavy hitters in high-speed network monitoring | Science China Information Sciences | Anonymized Internet Traces |
2010
| Meitinger, M. Wild, T. Herkersdorf, A. | FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors | Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 | Anonymized Internet Traces |
2010
| Foag, J. Koch, R. Maehle, E. Pionteck, T. | DynaCORE - dynamically reconfigurable coprocessor for network processors | Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 | Anonymized Internet Traces |
2010
| Characterization and classification of internet backbone traffic | Chalmers Univ. of Technology, Gothenborg, Sweden | Anonymized Internet Traces | |
2010
| Meitinger, M. Wild, T. Herkersdorf, A. | An application-aware load balancing strategy for network processors | Conf. on High performance embedded architectures and compilers (HIPEAC) | Anonymized Internet Traces |
2010
| Naous, J. Liu, J. Zarifis, K. Casado, M. Koponen, T. Shenker, S. Breslau, L. | Bridging the software/hardware forwarding divide | semanticscholar.org | Anonymized Internet Traces |
2009
| Wang, C.-C. Bagchi, S. Shroff, N.B. | Camouflaging timing channels in web traffic | Purdue Univ. | Anonymized Internet Traces |
2009
| Tiny buffers for electronic and optical routers | Stanford Univ., Stanford, CA, US | Anonymized Internet Traces | |
2009
| Borisov, N. | Preventing SSL traffic analysis with realistic cover traffic | ACM Conf. on Computer and Communications Security (CCS) | Anonymized Internet Traces |
2009
| Prasanna, V.K. | Reducing dynamic power dissipation in pipelined forwarding engines | IEEE Conf. on Computer Design (ICCD) | Anonymized Internet Traces |
2009
| Dusi, M. John, W. Chen, C. | Analysis of UDP traffic usage on internet backbone links | Symp. on Applications and the Internet (SAINT) | Anonymized Internet Traces |
2009
| Gringoli, F. Salgarelli, L. | Support Vector Machines for TCP traffic classification | Computer Networks | Anonymized Internet Traces |
2009
| Message traceback systems. Dancing with the devil | Univ. Newcastle upon Tyne |
Anonymized Internet Traces Topology with Skitter |
|
2009
| Sahli, N. Kamoun, F. | Joint entropy analysis model for DDoS attack detection | Conf. on Information Assurance and Security (IAS) |
Anonymized Internet Traces UCSD Network Telescope |
2009
| Sahli, N. Kamoun, F. | A traffic coherence analysis model for DDoS attack detection | Conf. on Security and Cryptography (SECRYPT) |
Anonymized Internet Traces UCSD Network Telescope |
2009
| Vahdat, A. | Swing: Realistic and responsive network traffic generation | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2009
| Akinwumi, J. Matta, I. | On the cost of supporting multihoming and mobility | Boston Univ., CS Dept. | Anonymized Internet Traces |
2009
| Withall, M.S. Moore, A.W. Phillips, I.W. Parish, D.J. Rio, M. Landa, R. Haddadi, H. Kyriakopoulos, K. Auge, J. Clayton, R. Salmon, D. | Challenges in the capture and dissemination of measurements from high-speed networks | IET Communications | Anonymized Internet Traces |
2009
| The quantitative comparison of computer networks | UC Davis | Anonymized Internet Traces | |
2009
| Kompella, R. | A framework for efficient class-based sampling | IEEE Conf. on Computer Communications (INFOCOM) | Anonymized Internet Traces |
2009
| Gyires, T. | Does the internet still demonstrate fractal nature? | IEEE Conf. on Networking (ICN) | Anonymized Internet Traces |
2009
| Search and analysis of backbone traffic measurements in the internet | Technische Univ. Berlin (TKN-09-004) | Anonymized Internet Traces | |
2009
| Gyires, T. | Levy flights and fractal modeling of internet traffic | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2009
| Molina, G. Baiocchi, A. Rizzi, A. | On the fly application flows identification by exploiting K-means based classifiers | J. Information Assurance and Security | Anonymized Internet Traces |
2009
| Hay, D. Keslassy, I. | Optimal dynamic hash tables | ComNet, Technion, Israel | Anonymized Internet Traces |
2009
| van Moorsel, A. | COTraSE Connection Oriented Traceback in Switched Ethernet | J. Information Assurance and Security | Anonymized Internet Traces |
2008
| Koponen, T. Moon, D. Shenker, S. | Rethinking packet forwarding hardware | ACM SIGCOMM HotNets Workshop | Anonymized Internet Traces |
2008
| Maiolini, G. Molina, G. Rizzi, A. | On-the-fly statistical classification of internet traffic at application layer based on cluster analysis | Workshop on Computational Intelligence in Security for Information Systems (CISIS) | Anonymized Internet Traces |
2008
| Moorsel, A. | COTraSE: Connection Oriented Traceback in Switched Ethernet | Conf. on Information Assurance and Security |
Anonymized Internet Traces Topology with Skitter |
2008
| Gringoli, F. Salgarelli, L. | IP traffic classification for QoS guarantees: the independence of packets | IEEE Conf. on Computer Communications and Networks (ICCCN) | Anonymized Internet Traces |
2008
| Barriga, A. Lopez, D.R. Sanchez-Solano, S. | Linguistic summarization of network traffic flows | IEEE Conf. on Fuzzy Systems (FUZZ-IEEE) | Anonymized Internet Traces |
2008
| Ansari, N. | A router-based technique to mitigate reduction of quality (RoQ) attacks | Computer Networks | Anonymized Internet Traces |
2008
| Landa, R. Haddadi, H. Rio, M. Moore, A.W. | Techniques for flow inversion on sampled data | IEEE INFOCOM Workshop Global Internet Symp. | Anonymized Internet Traces |
2008
| Ohlendorf, R. Wild, T. Herkersdorf, A. | A hardware packet re-sequencer unit for network processors | Architecture of Computing Systems (ARCS) | Anonymized Internet Traces |
2008
| Sallent, S. | Adaptive shared-state sampling | Internet Measurement Conf. (IMC) | Anonymized Internet Traces |
2008
| Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic | UC Davis | Anonymized Internet Traces | |
2008
| Gringoli, F. Salgarelli, L. | An SMV-based approach to traffic classification | Univ. Brescia | Anonymized Internet Traces |
2007
| Vila-Carbo, J. | Network performance analysis based on histogram workload models | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) | Anonymized Internet Traces |
2007
| Ansari, N. | A proactive test based differentiation to mitigate low rate DoS attacks | IEEE Conf. on Computer Communications and Networks (ICCCN) | Anonymized Internet Traces |
2007
| Lung, C.-H. Rabinovitch, P. | A TCP connection establishment filter: symmetric connection detection | IEEE Conf. on Communications (ICC) | Anonymized Internet Traces |
2007
| Pappu, P. Faloutsos, M. Mitzenmacher, M. Singh, S. Varghese, G. | Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation | UC Riverside |
Anonymized Internet Traces Topology with Skitter |
2007
| Haddadi, H. Landa, R. Rio, M. | Towards informative statistical flow inversion | arxiv.org | Anonymized Internet Traces |
2007
| Landa, R. Rio, M. Bhatti, S. | Revisiting the issues on netflow sample and export performance | arxiv.org | Anonymized Internet Traces |
2007
| Chuah, C. Mohapatra, P. | ProgME: towards programmable network measurement | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2007
| Gringoli, F. Karagiannis, T. | Comparing traffic classifiers | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2007
| Pappu, P. Faloutsos, M. Mitzenmacher, M. Singh, S. Varghese, G. | Network monitoring using traffic dispersion graphs (TDGs) | Internet Measurement Conf. (IMC) |
Anonymized Internet Traces Topology with Skitter |
2007
| Vila-Carbo, J. | A histogram-based stochastic process for finite buffer occupancy analysis | Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS) | Anonymized Internet Traces |
2007
| Simulating internet traffic with Markov-modulated processes | UK Performance Engineering Workshop | Anonymized Internet Traces | |
2006
| Tyan, H.-R. Jay Kuo, C.-C. | GA-based internet traffic classification technique for QoS provisioning | Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | Anonymized Internet Traces |
2006
| Nishimura, S. Ishida, S. Nishi, H. | Cache-based network processor architecture: evaluation with real network traffic | IEICE Trans. on Electronics | Anonymized Internet Traces |
2006
| Vahdat, A. | Realistic and responsive network traffic generation | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2006
| Fingerhut, J. F. Bonomi, F. | Detecting evasion attacks at high speeds without reassembly | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
2006
| Varghese, G. Fisk, M. | Bitmap algorithms for counting active flows on high speed links | IEEE/ACM Trans. on Networking (TON) | Anonymized Internet Traces |
2006
| Markov-modulated on/off processes for long-range dependent internet traffic | arxiv.org | Anonymized Internet Traces | |
2006
| Mavrommatis, P. | Identifying known and unknown peer-to-peer traffic | IEEE Symp. on Network Computing and Applications (NCA) | Anonymized Internet Traces |
2006
| Lin, Y. Jin, Y. Cheng, S. | Easily-implemented adaptive packet sampling for high speed networks flow measurement | Conf. on Computational Science (ICCS) | Anonymized Internet Traces |
2006
| Maschmeyer, J. Crowley, P. | Exploiting locality to ameliorate packet queue contention and serialization | ACM Conf. on Computing Frontiers | Anonymized Internet Traces |
2006
| Hwang, K. | Collaborative change detection of DDoS attacks on community and ISP networks | IEEE Symp. on Collaborative Technologies and Systems (CTS) | Anonymized Internet Traces |
2006
| Kaur, J. | Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth | Passive and Active Measurement (PAM) | Anonymized Internet Traces |
2006
| Chiu, D.-M. Lui, J. | Entropy based flow aggregation | IFIP Networking Conf. | Anonymized Internet Traces |
2006
| Modelling internet traffic using Markov chains | Imperial College, London, UK | Anonymized Internet Traces | |
2005
| Estan, C. | The power of slicing in internet flow measurement | Internet Measurement Conf. (IMC) | Anonymized Internet Traces |
2005
| Hohna, N. Abry, P. | Multifractality in TCP/IP traffic: the case against | Computer Networks | Anonymized Internet Traces |
2005
| Dovrolis, C. | Why is the internet traffic bursty in short (sub-RTT) timescales? | ACM SIGMETRICS Performance Evaluation Review | Anonymized Internet Traces |
2005
| Ishida, S. Nishi, H. | Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera | IEICE Trans. on Electronics | Anonymized Internet Traces |
2004
| Molle, M. Faloutsos, M. | Long-range dependence: ten years of Internet traffic modeling | IEEE Internet Computing | Anonymized Internet Traces |
2004
| Nishi, H. | Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler | IEICE technical report: Circuits and system | Anonymized Internet Traces |
2003
| Varghese, G. Fisk, M. | Bitmap algorithms for counting active flows on high speed links | Internet Measurement Conf. (IMC) | Anonymized Internet Traces |
2003
| Varghese, G. | New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice | ACM Trans. on Computer Systems (TOCS) | Anonymized Internet Traces |
2003
| Savage, S. Varghese, G. | Automatically inferring patterns of resource consumption in network traffic | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications | Anonymized Internet Traces |
2002
| Varghese, G. | New directions in traffic measurement and accounting | ACM SIGCOMM Computer Communication Review | Anonymized Internet Traces |
1999
| Peterson, L. | Inter-AS traffic patterns and there implications | IEEE Global Telecommunications Conf. (GLOBECOM) | Anonymized Internet Traces |
2019
| Li, J. Tang, X. Sheng, V.S. Zhang, C. Li, M. | A novel DDoS attack detection method using Optimized Generalized Multiple Kernel Learning | arxiv.org | Denial of Service Attacks |
2019
| Singh, P. | LeCAM: A novel metric for detecting DDoS attacks | IEEE Intl Conf. on Electronics and Communication and Aerospace Technology | Denial of Service Attacks |
2019
| Ng, B. Seah, W.K. G. Pekar, A. | Traffic Classification with Machine Learning in a Live Network | IFIP/IEEE Symp. on Integrated Network and Service Management (IM) | Denial of Service Attacks |
2019
| Tang, X. Cheng, J. Wang, F. Xu, R. | DDoS attack detection method based on network abnormal behavior in Big Data Environment | arxiv.org | Denial of Service Attacks |
2019
| A multifractal approach for detecting distributed denial of service attacks | Univ. of Manitoba | Denial of Service Attacks | |
2019
| Shi, L. Sisodia, D. Li, J. Reiher, P. | On multi-point, in-network filtering of Distributed Denial-of-Service traffic | IFIP/IEEE Symp. on Integrated Network and Service Management (IM) | Denial of Service Attacks |
2019
| Hybrid Traceback Scheme for DDoS Attacks | Recent Findings in Intelligent Computing Techniques | Denial of Service Attacks | |
2019
| Panda, S. K. Sahoo, S. Sahoo, B. Dash, R. | Toward secure software-defined networks against distributed denial of service attack | The Journal of Supercomputing | Denial of Service Attacks |
2019
| Siva, V. S. Kishore, K. Sreenivasulu, M. | DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble Classifier | Computing and Network Sustainability |
Denial of Service Attacks UCSD Network Telescope |
2019
| Krishna, C. R. Kumar, K. Behal, S. | E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks | Journal of King Saud University - Computer and Information Sciences | Denial of Service Attacks |
2019
| Schmidt, T.C. Wahlisch, M. | Uncovering vulnerable industrial control systems from the Internet core | arxiv.org | Denial of Service Attacks |
2019
| Moura, J. Serrao, C. | SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks | Special Issue Insider Attacks | Denial of Service Attacks |
2019
| Znati, T. | An empirical study of intelligent approaches to DDoS detection in large scale networks | International Conference on Computing, Networking and Communications (ICNC) | Denial of Service Attacks |
2019
| Cooperstein, L.M. | To the problem of forming the dataset for DDoS attack research | Vinnitsia Nat. Tech. Univ. | Denial of Service Attacks |
2019
| Mostafa, S. A. Mustapha, A. Mohammed, M. A. Abduallah, W. M. | Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods | IEEE Access | Denial of Service Attacks |
2019
| Tang, X. Cheng, J. Xu, J. Cai, C. Guo, Y. | DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory | International Conference on Artificial Intelligence and Security | Denial of Service Attacks |
2019
| Li, K. Guo, Z. Wang, Y. | Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm | IEEE Access | Denial of Service Attacks |
2019
| Wang, M. Luo, Y. Zhong, H. | DDoS detection and defense mechanism based on cognitive-inspired computing in SDN | Future Generation Computer Systems | Denial of Service Attacks |
2019
| Basicevic, I. Ocovaj, S. Popovic, M. | A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method | Computers and Electrical Engineering | Denial of Service Attacks |
2019
| Gupta, B. B. | Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing | Multimedia Tools and Applications | Denial of Service Attacks |
2019
| Hussain, A. Liatsis, P. Alani, M. Tawfik, H. Kendrick, P. Francis, H. | Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks | Transactions on Emerging Telecommunications Technologies | Denial of Service Attacks |
2018
| Papazachos, Z. Kilpatrick, P. Nikolopoulos, D.S. | RADS: Real-time anomaly detection system for cloud data centres | arxiv.org | Denial of Service Attacks |
2018
| Distributed Denial of Service attack prediction system | Fed. Univ. of Parana | Denial of Service Attacks | |
2018
| A prediction-based approach for anomaly detection in the cloud | Univ. of Coimbra | Denial of Service Attacks | |
2018
| A contribution to the method for detection of denial of service attacks inInternet | Univ. of Novi Sad | Denial of Service Attacks | |
2018
| Distributed Denial of Service attack detection using a machine learning approach | Univ. of Calgary | Denial of Service Attacks | |
2018
| Balasaraswathi, R. Journaux, L. Sugumaran, M. | Benchmark datasets for Network Intrusion Detection: A review | Intl J. of Network Security | Denial of Service Attacks |
2018
| Zhou, J. Liu, Q. Tang, X. Guo, Y. | A DDoS detection method for socially aware networking based on forecasting fusion feature sequence | Computer J. | Denial of Service Attacks |
2018
| Kumar, K. Sachdeva, M. | D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events | J. of Network and Computer Applications | Denial of Service Attacks |
2018
| Reddy, A. R. M. Rao, K. V. | DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment | Cluster Computing |
Denial of Service Attacks UCSD Network Telescope |
2018
| Xu, R. Tang, X. Sheng, V. Cai, C. | An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment | CMC: Computers, Materials and Continua | Denial of Service Attacks |
2018
| Hsieh, C.J. | Detection and Analysis of Distributed Denial-of-service in Internet of Things-Employing Artificial Neural Network and Apache Spark Platform | Sensors and Materials | Denial of Service Attacks |
2018
| Sampalli, S. Bodorik, P. | DDoS attack detection system: Utilizing classification algorithms with Apache Spark | Conf. on New Technologies, Mobility and Security (NTMS) | Denial of Service Attacks |
2018
| Martine, B. Dagenais, M. | An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment | J. of Cloud Computing: Advances, Systems and Applications | Denial of Service Attacks |
2018
| Bhattacharyya, D. | HLR_DDoS: A low-rate and high-rate DDoS attack detection method using a -divergence | Intl Conf. on Computing and Communication Systems | Denial of Service Attacks |
2018
| Bhattacharyya, D. Kalita, J. | Granger causality in TCP flooding attack | Intl J. of Network Security | Denial of Service Attacks |
2018
| Cheng, J. Tang, X. Liu, Q. He, X. | DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm | Intl Conf. on Cloud Computing and Security | Denial of Service Attacks |
2018
| Guo, L. Liu, Y. Zheng, J. Zong, Y. | An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks | IEEE Access | Denial of Service Attacks |
2018
| Mundt, T. Goltz, J. | Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus Systems | IEEE Conf. on Application, Information and Network Security (AINS) | Denial of Service Attacks |
2018
| Zhou, H. Chen, J. | PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection Approach | IEEE Access | Denial of Service Attacks |
2018
| Debashi, M. | Sonification of Network Traffic for Detecting and Learning About Botnet Behavior | IEEE Access | Denial of Service Attacks |
2018
| Sege, P. Moravik, M. Papan, J. Kontsek, M. Hrabovsky, J. | Infrastructure for Generating New IDS Dataset | Intl Conf. on Emerging eLearning Technologies and Applications (ICETA) | Denial of Service Attacks |
2018
| Chow, K. P. | Forensic-Aware Anti-DDoS Device | IEEE Security and Privacy Workshops (SPW) | Denial of Service Attacks |
2018
| Nguyen, C. Q. Nguyen., K. V. | Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter | Asian Conf. on Defense Technology (ACDT) | Denial of Service Attacks |
2018
| Muhammad, A. W. | Neural Network Based DDoS Detection Regarding Hidden Layer Variation | Journal of Theoretical and Applied Information Technology | Denial of Service Attacks |
2018
| Basicevic, I. Kukolj, D. Popovic, M. | Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks | Computer Science and Information Systems | Denial of Service Attacks |
2018
| Phong, P. Khoa, T. Huong, T. Nam, P. Thanh, N. Thang, L. Tran, P. Dung, Le. Loi, V. | Self-organizing map-based approaches in DDoS flooding detection using SDN | Intl Conf. on Information Networking (ICOIN) | Denial of Service Attacks |
2018
| Doh, I. Chae, K. | CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word | Computer Science and Information Systems | Denial of Service Attacks |
2018
| Patel, D. | A feasible approach to intrusion detection in virtual network layer of Cloud computing | Academy Proceeding in Engineering Sciences | Denial of Service Attacks |
2018
| Deng, W. Shen, F. | DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features | IEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE) | Denial of Service Attacks |
2018
| Rajput, A. Gupta, A. K. | Private Virtual Cloud Infrastructure Modelling using VCPHCF-RTT Security Agent | Intl Conf. on Computing Communication and Automation (ICCCA) | Denial of Service Attacks |
2018
| Agrawal, N. Kumar, S. Sah, D. K. | Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow | Intl Conf. on Recent Advances in Information Technology (RAIT) | Denial of Service Attacks |
2018
| De, T. | Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation | IET Information Security | Denial of Service Attacks |
2018
| Shaikh, J. R. | Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security | Global Conf. on Wireless Computing and Networking (GCWCN) | Denial of Service Attacks |
2018
| Afdel, K. Belouch, M. | Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest | Hindawi Security and Communication Networks | Denial of Service Attacks |
2018
| Implementation of lightweight intrusion detection model for security of smart green house and vertical farm | Intl J. of Distributed Sensor Networks | Denial of Service Attacks | |
2018
| Sun, Y. E. Chen, S. Tang, S. Han, K. Yuan, J. Yang, W. | You can drop but you cant hide: K-persistent spread estimation in high-speed networks | IEEE Conf. on Computer Comm. (INFOCOM) | Denial of Service Attacks |
2018
| Segec, P. Moravcik, M. Papan, J. | Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems | Intl Conf. on Innovations for Community Services | Denial of Service Attacks |
2018
| Alzharani, S. | Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation | Journal of Information Security | Denial of Service Attacks |
2018
| Spangler, W. E. | Managing IT Implementation Risk: A Model from High Reliability Organizations | Intl Association for Computer Information Systems | Denial of Service Attacks |
2018
| Kinsner, W. | Extracting features from both the input and the output of a convolutional neural network to detect Distributed Denial of Service attacks | IEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC) | Denial of Service Attacks |
2018
| Machine-learning and statistical methods for DDoS attack detection and defense system in Software Defined Networks | Ryerson Univ. | Denial of Service Attacks | |
2018
| Bhattacharya, D. K. Kalita, J. K. | Active Learning to Detect DDoS Attack Using Ranked Features | Computer Comm. | Denial of Service Attacks |
2018
| Raju, N. | Effective Method to Detect Distributed Denial of Service Attacks | International Journal of Pure and Applied Mathematics | Denial of Service Attacks |
2018
| Singh, V. Singh, M. | Hadoop-based analytic framework for cyber forensics | International Journal of Communication Systems | Denial of Service Attacks |
2018
| Li, M. Tang, X. Sheng, V. S. Liu, Y. Guo, W. | Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing | Security and Communication Networks | Denial of Service Attacks |
2018
| Faria, E. R. Zarpelao, B. B. Miani, R. S. | Qualitative evaluation of denial of service datasets | Brazilian Symp. on Information Systems |
Denial of Service Attacks Topology with Archipelago |
2018
| A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud Computing | Selected Computing Research Papers - University of Sunderland | Denial of Service Attacks | |
2018
| Pourzandi, M. Brunner, R. Dault, S. | Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology | IFIP Annual Conf. on Data and Applications Security and Privacy | Denial of Service Attacks |
2018
| Elmroth, E. | Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric | IEEE Intl Conf. on Machine Learning and Applications (ICMLA) | Denial of Service Attacks |
2018
| Gupta, B. B. | Hypothesis test for low-rate DDoS attack detection in cloud computing environment | Procedia Computer Science | Denial of Service Attacks |
2018
| Behal, S. Ahmed, I. | Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions | Versatile Cybersecurity | Denial of Service Attacks |
2018
| Kumar, K. Sachdeva, M. | A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics | Turkish Journal of Electrical Engineering and Computer Sciences | Denial of Service Attacks |
2018
| Sachdeva, M. Saluja, K. K. | D-FAC: A novel 0-Divergence based distributed DDoS defense system | Journal of King Saud University | Denial of Service Attacks |
2017
| Phan, T.V. Saad, U. Kim, J. Bauschert, T. Cho, S. | Securing heterogeneous IoT with intelligent DDoS attack behavior learning | arxiv.org | Denial of Service Attacks |
2017
| Hoque, N. Bhattacharya, D. | DDoS attack detection using unique source IP deviation | Intl J. of Network Security | Denial of Service Attacks |
2017
| Ravikumar, K. | Rating association for short degree DDoS attack recognition | Intl J. of Engineering and Technology | Denial of Service Attacks |
2017
| De, T. | MLP-GA based algorithm to detect application layer DDoS attack | J. of Information Security and Applications | Denial of Service Attacks |
2017
| De, T. | Mathematical modelling of DDoS attack and detection using correlation | J. Cyber Security Technology | Denial of Service Attacks |
2017
| Kashyap, H. Bhattacharyya, D. | Real-time DDoS attack detection using FPGA | Computer Comm. | Denial of Service Attacks |
2017
| Bhattacharyya, D. Kalita, J. | A systematic hands-on approach to generate real-life intrusion datasets | Network Traffic Anomaly Detection and Prevention | Denial of Service Attacks |
2017
| Bhattacharyya, D. Kalita, J. | Practical tools for attackers and defenders | Network Traffic Anomaly Detection and Prevention | Denial of Service Attacks |
2017
| Kumar, K. Sachdeva, M. | Discriminating flash events from DDoS Attacks: A comprehensive review | Intl J. of Network Security | Denial of Service Attacks |
2017
| Yang, K. Shi, Z. Wang, Y. | A distinction method of flooding DDoS and flash crowds based on user traffic behavior | IEEE Trustcom/BigDataSE/ICESS | Denial of Service Attacks |
2017
| Kumar, K. Sachdeva, M. | Characterizing DDoS attacks and flash events: Review, research gaps and future directions | Computer Science Review | Denial of Service Attacks |
2017
| Research on application of DDos attack detection technology based on software defined network | Acta Technica CSAV | Denial of Service Attacks | |
2017
| Nurse, J.R.C. Goldsmith, M. Creese, S. | A formalised approach to designing sonification systems for network-security monitoring | Intl J. On Advances in Security | Denial of Service Attacks |
2017
| Variational Bayesian Hidden Markov model for the prediction of Distributed Denial of Service attacks | Univ. of Lagos | Denial of Service Attacks | |
2017
| Yang, K. Shi, Z. Lv, B. | A behavior-based method for distinction of flooding DDoS and flash crowds | Conf. on Knowledge Science, Engineering and Management | Denial of Service Attacks |
2017
| Bhamare, D. Erbad, A. Jain, R. Samaka, M. | Machine learning for anomaly detection and categorization in multi-cloud environments | Conf. on Cyber Security and Cloud Computing | Denial of Service Attacks |
2017
| Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | Univ. of New South Wales | Denial of Service Attacks | |
2017
| Jayasumana, A. Ray, I. | A distributed mechanism to protect against DDoS attacks | IFIP Conf. on Data and Applications Security and Privacy | Denial of Service Attacks |
2017
| Santos, A. Moura, J. | Early signals from volumetric DDoS attacks: An empirical study | arxiv.org | Denial of Service Attacks |
2017
| Tripathi, N. | An event based technique for detecting spoofed IP packets | J. of Information Security and Applications | Denial of Service Attacks |
2017
| Data structures, algorithms and applications for Big Data analytics: Single, multiple and all repeated patterns detection in discrete sequences | Univ. of Calgary | Denial of Service Attacks | |
2017
| Loganathan, S. Shunmuganathan, S. Palanichamy, Y. | Suspicious score based mechanism to protect web servers against application layer Distributed Denial of Service attacks | Intl J. of Intelligent Engineering and Systems | Denial of Service Attacks |
2017
| Niyaz, Q. Javaid, A. Sun, W. | Normal and anomalous traffic flow pattern analysis for organizational networks | Canadian Conf. on Electrical and Computer Engineering (CCECE) | Denial of Service Attacks |
2017
| Kumar, K. | Computer networks detection of DDoS attacks and flash events using novel information theory metrics | Computer Networks | Denial of Service Attacks |
2017
| DDoS detection through recurrence quantification analysis based on dynamic feature extraction and adaptive clustering | Fed. Univ. of Santa Maria | Denial of Service Attacks | |
2017
| Lai, Y. Zhang, S. | FL-GUARD: A detection and defense system for DDoS attack in SDN | Conf. on Cryptography, Security and Privacy | Denial of Service Attacks |
2017
| Divakaran, D. Ang, A. Lim, W. Thing, V. | FACT: A framework for authentication in cloud-based IP traceback | IEEE Trans. on Information Forensics and Security | Denial of Service Attacks |
2017
| Algelal, S. | A modified DBSCAN clustering algorithm for proactive detection of DDoS attacks | Conf. on New Trends in Information and Communications Technology Applications (NTICT) | Denial of Service Attacks |
2017
| Anomaly detection systems for Distributed Denial of Service attacks | Univ. of Victoria | Denial of Service Attacks | |
2017
| Alsmadi, I. | Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach | J. of Network and Computer Applications | Denial of Service Attacks |
2017
| Orozco, A.L.S. Vidal, J.M. | Advanced payload analyzer preprocessor | Future Generation Computer Sysems | Denial of Service Attacks |
2017
| Yang, K. Lv, B. Shi, Z. | Could we beat a new mimicking attack? | Asia-Pacific Network Operations and Management Symp. (APNOMS) | Denial of Service Attacks |
2017
| Yang, K. Lv, B. Shi, Z. | A new mimicking attack by LSGAN | Intl Conf. on Tools with Artificial Intelligence | Denial of Service Attacks |
2017
| Yang, K. Shi, Z. Wang, Y. | Detecting flooding DDoS under flash crowds based on Mondrian forest | Wireless Algorithms, Systems, and Applications | Denial of Service Attacks |
2017
| Vuppala, V. P. K. | HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm | Applied Computing and Informatics | Denial of Service Attacks |
2017
| Muhammad, A.W. Sunardi, S. | Network packet classification using neural network based on training function and hidden layer neuron number variation | Intl J. of Advanced Computer Science and Applications | Denial of Service Attacks |
2017
| Riadi, I. Sunardi, S. | Deteksi serangan DDoS menggunakan neural network dengan fungsi fixed moving average window | J. Informatika Sunan Kalijaga | Denial of Service Attacks |
2017
| Jayasumana, A.P. Ray, I. Bezawada, B. | History-based throttling of Distributed Denial-of-Service attacks | Intl Conf. on E-Business and Telecommunications | Denial of Service Attacks |
2017
| AlBelooshi, B. Salah, K. Yeun, C.Y. Damiani, E. | A scattering technique for protecting cryptographic keys in the cloud | Intl Workshops on Foundations and Applications of Self* Systems (FAS*W) | Denial of Service Attacks |
2017
| Chechulin, A. Branitskiy, A. | Generation of source data for experiments with network attack detection software | J. of Physics: Conf. Series | Denial of Service Attacks |
2017
| Behal, S. Shifali, K. | An information divergence based approach to detect flooding DDoS attacks and Flash Crowds | Intl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT) | Denial of Service Attacks |
2017
| Kinsner, W. Ferens, K. | Detecting a distributed denial of service attack using a pre-processed convolutional neural network | Electrical Power and Energy Conf. (EPEC) | Denial of Service Attacks |
2017
| Xiong, K. Rahouti, M. | SDN-based kernel modular countermeasure for intrusion detection | Intl Conf. on Security and Privacy in Communication Systems | Denial of Service Attacks |
2017
| Distributed data streaming algorithms for network anomaly detection | Iowa State Univ. |
Denial of Service Attacks UCSD Network Telescope |
|
2017
| Chitrakar, R. | DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes Classification | J. of Information Security | Denial of Service Attacks |
2017
| Kumar, K. | Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation | Computer Communications | Denial of Service Attacks |
2016
| Karimpour, J. Lotfi, S. | A cluster-based approach towards detecting and modeling network dictionary attacks | Engineering, Technology and Applied Science Research | Denial of Service Attacks |
2016
| Shanmuganathan, S. Palanichamy, Y. | Behavior-based detection of application layer distributed denial of service attacks during flash events | Turkish J. of Electrical Engineering and Computer Sciences | Denial of Service Attacks |
2016
| Ensemble-based model for DDoS attack detection and flash event separation | Future Technologies Conf. | Denial of Service Attacks | |
2016
| Bhattacharya, D. | Self-similarity based DDoS attack detection using Hurst parameter | Security and Communication Networks | Denial of Service Attacks |
2016
| Su, W. Quan, W. | Security technologies of SINET | Smart Collaborative Identifier Network | Denial of Service Attacks |
2016
| Chen, Y. Tian, H. Wang, T. Cai, Y. Chen, X. | A novel botnet detection method based on preprocessing data packet by graph structure clustering | Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery | Denial of Service Attacks |
2016
| Choo, K. Dlodlo, M. | Change-point cloud DDoS detection using packet inter-arrival time | Computer Science and Electronic Engineering | Denial of Service Attacks |
2016
| Bhattacharyya, D.K. Kalita, J.K. | FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis | Security and Communication Networks | Denial of Service Attacks |
2016
| Sangal, A.L. Kumar, K. | Characterizing flash events and distributed denial-of-service attacks: an empirical investigation | Security and Communication Networks | Denial of Service Attacks |
2016
| Udzir, N.I. Selamat, A. | An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack | Lecture Notes in Computer Science (LNCS) | Denial of Service Attacks |
2016
| Thongam, K. De, T. | Entropy-based application layer DDoS attack detection using artificial neural networks | Entropy | Denial of Service Attacks |
2016
| Cooperative defense mechanism for detection, identification, and filtering of DDos attacks | Colorado State Univ. | Denial of Service Attacks | |
2016
| DDoS defence for service availability in cloud computing | Univ. of Cape Town | Denial of Service Attacks | |
2016
| Bhattacharyya, D. Kalita, J. | E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric | Security and Communication Networks | Denial of Service Attacks |
2016
| Luo, J. Ni, G. Wu, Z. Duan, W. | CVS: Fast cardinality estimation for large-scale data streams over sliding windows | Neurocomputing | Denial of Service Attacks |
2016
| Packet filter approach to detect Denial of Service attacks | California State Univ. San Bernardino | Denial of Service Attacks | |
2016
| Chen, X. Tian, H. Wang, T. Cai, Y. | A blind detection method for tracing the real source of DDoS attack packets by cluster matching | IEEE Conf. on Communication Software and Networks | Denial of Service Attacks |
2016
| Kumar, K. | Trends in validation of DDoS research | Procedia Computer Science | Denial of Service Attacks |
2016
| Niyaz, Q. Sun, W. Javaid, A. Devabhaktuni, V. | Distributed network traffic feature extraction for a real-time IDS | IEEE Conf. on Electro Information Technology | Denial of Service Attacks |
2016
| Bhuyan, M.H. Bhattacharyya, D.K. Kalita, J.K. | Rank correlation for low-rate DDoS attack detection: An empirical evaluation | Intl J. of Network Security | Denial of Service Attacks |
2016
| Apostolaki, M. Maglaris, V. | A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains | IEEE/IFIP Network Operations and Management Symp. (NOMS) |
Denial of Service Attacks Topology with BGP |
2016
| Vilela, J.P. Simoes, P. Curado, M. | Expedite feature extraction for enhanced cloud anomaly detection | IEEE/IFIP Network Operations and Management Symp. (NOMS) | Denial of Service Attacks |
2016
| Alsmadi, I. | Identifying DoS attacks on software defined networks: A relation context approach | IEEE/IFIP Network Operations and Management Symp. (NOMS) | Denial of Service Attacks |
2016
| Bhattacharyya, D. Kalita, J. | Denial of Service attack detection using multivariate correlation analysis | Conf. on Information and Communication Technology for Competitive Strategies | Denial of Service Attacks |
2016
| Divakaran, D.M. Lim, W.Y. Thing, V.L.L. | Opportunistic piggyback marking for IP traceback | IEEE Trans. on Information Forensics and Security | Denial of Service Attacks |
2016
| Li, J. Wang, H. Zeng, X. | Improving accuracy and automation of anomaly detectors based on self-correlation | J. Internet Technology (JIT) |
Denial of Service Attacks UCSD Network Telescope |
2016
| Bhattacharyya, D.K. Kalita, J.K. | A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis | Conf. on Communication Systems and Networks (COMSNETS) | Denial of Service Attacks |
2016
| Holder, L. | Identifying anomalies in graph streams using change detection | Workshop on Mining and Learning with Graphs |
Denial of Service Attacks Topology with BGP |
2015
| Thomas, C. | Ranking of machine learning algorithms based on the performance in classifying DDoS attacks | IEEE Recent Advances in Intelligent Computational Systems (RAICS) |
Denial of Service Attacks UCSD Network Telescope |
2015
| Intelligent network intrusion detection using an evolutionary computation approach | Edith Cowan Univ. | Denial of Service Attacks | |
2015
| Bose, S. | Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET | Cluster Computing | Denial of Service Attacks |
2015
| Zori, M. Fu, Z Peris, R. Paptriantafilou, M. Martinez, M. | STONE: A streaming DDoS defense framework | J. Expert System with Applications | Denial of Service Attacks |
2015
| Li, Y. Zhao, X. Wang, B. | Intrusion detection system design of cloud computing based on abnormal traffic identification | Intl J. of Reasoning-based Intelligent Systems | Denial of Service Attacks |
2015
| Lam, C. Hingston, P. | A statistical rule learning approach to network intrusion detection | Intl Conf. on IT Convergence and Security | Denial of Service Attacks |
2015
| Androulidakis, G. Maglaris, V. | A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox | Security and Communication Networks | Denial of Service Attacks |
2015
| Zincir-Heywood, A.N. Heywood, M.I. | Feature selection for robust backscatter DDoS detection | Local Computer Networks Conf. Workshops (LCNW) |
Denial of Service Attacks UCSD Network Telescope |
2015
| Liao, M. Yuan, C. Sheng, Z. Zhang, H. | DDOS attack detection using packet size interval | Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM ) | Denial of Service Attacks |
2015
| Bose, S. | A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS attack in MANET | Arabian J. for Science and Engineering | Denial of Service Attacks |
2015
| Jia, Z. Ju, L. | An entropy-based distributed DDoS detection mechanism in Software-Defined Networking | Trustcom/BigDataSE/ISPA | Denial of Service Attacks |
2015
| Hingston, P. Lam, C.P. | Evolving statistical rulesets for network intrusion detection | J. Applied Soft Computing | Denial of Service Attacks |
2015
| Purwanto, Y. Hafidudin, X. | Traffic anomaly based detection: Anomaly detection by self-similar analysis | Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC) | Denial of Service Attacks |
2015
| Kalita, M.J. Singh, S. Bhattacharyya, D.K. | Anomaly based DDoS attack detection | Intl J. of Computer Applications | Denial of Service Attacks |
2015
| Zhang, Z. Ju, L. Jia, Z. | A novel OpenFlow-based DDoS flooding attack detection and response mechanism in Software-Defined Networking | Intl J. of Information Security and Privacy (IJISP) | Denial of Service Attacks |
2015
| Small scale denial of service attacks | Masaryk Univ. | Denial of Service Attacks | |
2015
| Applying big data analytics on integrated cybersecurity datasets | Texas Tech Univ., Lubbock, TX, US | Denial of Service Attacks | |
2015
| Hubballi, N. | An experience report on scalable implementation of DDoS attack detection | Lecture Notes in Business Information Processing (LNBIP) | Denial of Service Attacks |
2015
| Thomas, C. | DDoS attack detection using fast entropy approach on flow-based network traffic | Procedia Computer Science | Denial of Service Attacks |
2015
| Guan, Y. | Distinct element counting in distributed dynamic data streams | Conf. on Computer Communications (INFOCOM) | Denial of Service Attacks |
2015
| Chen, S. Hu, H. Zhang, M. | Superpoint-based detection against distributed denial of service (DDoS) flooding attacks | Workshop on Local and Metropolitan Area Networks | Denial of Service Attacks |
2015
| Kalwar, A. Goswami, A. Bhattacharyya, D.K. Kalita, J.K. | Low-rate and high-rate Distributed DoS attack detection using partial rank correlation | Intl. Conf. on Communication Systems and Network Technologies (CSNT) | Denial of Service Attacks |
2015
| Daghighi, B. Anuar, N.B. Kiah, L.M. Patel, A. Abraham, A. | Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network | J. Intelligent and Fuzzy Systems | Denial of Service Attacks |
2015
| Chen, Y. Liu, Z. Yang, Z. Li, X. | On monitoring and predicting mobile network traffic abnormality | Simulation Modelling Practice and Theory |
Denial of Service Attacks UCSD Network Telescope |
2015
| Bhattacharyya, D.K. Kalita, J.K. | An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection | Pattern Recognition Letters | Denial of Service Attacks |
2014
| Zhang, H.-K. Wu, T.-Y. Lo, C.-H. | Anomaly detection and response approach based on mapping requests | Security and Communication Networks | Denial of Service Attacks |
2014
| Visualizing spatio-temporal data | Georgia State Univ. | Denial of Service Attacks | |
2014
| Zhu, Y. Manandhar, K. | NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis | Advances in Visual Computing | Denial of Service Attacks |
2014
| Klyuev, V. | Large-scale network packet analysis for intelligent DDoS attack detection development | Conf. on Internet Technology and Secured Transactions (ICITST) | Denial of Service Attacks |
2014
| Manaa, M.E. | A proactive DDoS detection approach using data mining cluster analysis | J. of Next Generation Information Technology | Denial of Service Attacks |
2014
| Kuspriyanto, Hendrawan Rahardjo, B. | Traffic anomaly detection in DDos flooding attack | Conf. on Telecommunication Systems Services and Applications (TSSA) | Denial of Service Attacks |
2014
| Paschalidis, I.C. | Botnet detection using social graph analysis | Allerton Conf. on Communication, Control, and Computing | Denial of Service Attacks |
2014
| Anitha, R. | DDoS detection system using wavelet features and semi-supervised learning | Symp. on Security in Computing and Communications | Denial of Service Attacks |
2014
| Zareapoor, M. | Statistical-based filtering system against DDOS attacks in cloud computing | Conf. on Advances in Computing, Communications and Informatics (ICACCI) | Denial of Service Attacks |
2014
| Klyuev, V. | An intelligent DDoS attack detection system using packet analysis and support vector machine | Intl J. of Intelligent Computing Research (IJICR) | Denial of Service Attacks |
2014
| Androulidakis, G. Maglaris, V. | Leveraging SDN for efficient anomaly detection and mitigation on legacy networks | European Workshop on Software Defined Networks | Denial of Service Attacks |
2014
| Bhattacharyya, D.K. Kalita, J.K. | Information metrics for low-rate DDoS attack detection: A comparative evaluation | Intl. Conf. on Contemporary Computing (IC3) | Denial of Service Attacks |
2014
| Schmidt, D. Mohay, G. Tickle, A. | A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash events | Computers and Security | Denial of Service Attacks |
2014
| Distributed denial of service (DDoS) attack detection system using burst detection | Future Univ. Hakodate | Denial of Service Attacks | |
2013
| Lin, Y. Zhang, H. Zukerman, M. | Preventing DDoS attacks by identifier/locator separation | IEEE Network | Denial of Service Attacks |
2013
| Applying data mining techniques in anomaly based network intrusion detection | Tezpur Univ. | Denial of Service Attacks | |
2013
| Detecting Distributed Denial-of-Service attacks and flash events | Queensland Univ. of Technology, Brisbane, Australia | Denial of Service Attacks | |
2013
| Debar, H. Safa, H. Hijazi, A. | A TCP delay-based mechanism for detecting congestion in the Internet | Conf. on Communications and Information Technology (ICCIT) | Denial of Service Attacks |
2013
| Liu, Y. Guan, Y. | Cardinality change-based early detection of large-scale cyber-attacks | IEEE INFOCOM |
Denial of Service Attacks UCSD Network Telescope |
2013
| Jimenez-Peris, R. Gulisano, V. Papatriantafilou, M. Fu, Z. Patino-Martinez, M. | STONE: A stream-based DDoS defense framework | ACM Symp. on Applied Computing (SAC) | Denial of Service Attacks |
2013
| Selvakumar, S. | Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems | Computer Communications |
Denial of Service Attacks UCSD Network Telescope |
2012
| Schmidt, D. Mohay, G. | Ensemble-based DDoS detection and mitigation model | Conf. on Security of Information and Networks (SIN) | Denial of Service Attacks |
2012
| Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation | Chalmers Univ. of Technology, Gothenborg, Sweden | Denial of Service Attacks | |
2012
| Kumar, K. Sachdeva, M. Sidhu, N. | DDoS attacks simulation using legitimate and attack real data sets | J. Scientific and Engineering Research | Denial of Service Attacks |
2012
| Souto, E. Sadok, D.H. | An orchestration approach for unwanted Internet traffic identification | Computer Networks | Denial of Service Attacks |
2012
| Karthik, R. Pravin, V. Thirugnanam, K. | A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system | Conf. on Computer Science, Engineering and Applications (ICCSEA) | Denial of Service Attacks |
2012
| Sahli, N. Kamoun, F. | DDoS flooding attack detection scheme based on F-divergence | Computer Communications | Denial of Service Attacks |
2012
| Zou, P. Jia, Y Han, W. | An online learning and unsupervised traffic anomaly detection system | Advanced Science Lett. | Denial of Service Attacks |
2012
| Zou, P. Jia, Y. Han, W. | Traffic anomaly detection and containment using Filter-Ary-Sketch | Procedia Engineering |
Denial of Service Attacks UCSD Network Telescope |
2012
| Hattiwale, V.P. Ravindran, B. | Adaptive network intrusion detection system using a hybrid approach | Conf. on Communication Systems and Networks (COMSNETS) | Denial of Service Attacks |
2011
| Chen, Y. Lall, A. | Divergence in network traffic | Midstates Conf. on Undergraduate Research in Computer Science and Mathematics | Denial of Service Attacks |
2011
| Jeong, T. Roman, H.E. Hong, J.W. | Traffic dispersion graph based anomaly detection | Symp. on Information and Communication Technology (SolCT) | Denial of Service Attacks |
2011
| Mohay, G. Tickle, A. Ahmed, E. | Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event | Conf. on Availability, Reliability and Security (ARES) | Denial of Service Attacks |
2011
| Assuring network service with bandwidth and integrity based fairness | Univ. Illinois, Urbana-Champaign | Denial of Service Attacks | |
2021
| Maire, Cedric Vanbever, Laurent | PERIMETER: A network-layer attack on the anonymity of cryptocurrencies | ETH Zurich |
Other Datasets Topology with BGP |
2019
| Goldberg, S. Choffnes, D. | Passport: Enabling accurate country-level router geolocation using inaccurate sources | arxiv.org |
Other Datasets Topology with BGP |
2019
| Tran, M. Shinde, S. Jin, H. Sekar, V. Saxena, P. Kang, M.S. | Practical verifiable in-network filtering for DDoS defense | arxiv.org |
Other Datasets Topology with BGP |
2018
| Pulls, T. Vestin, J. Hoiland-Jorgensen, T. Kassler, A. | Aggregation-based certificate transparency gossip | arxiv.org |
Other Datasets Topology with BGP |
2017
| Liu, Y. Winter, P. Mittal, P. Hu, Y. | TorPolice: Towards enforcing service-defined access policies in anonymous systems | arxiv.org | Other Datasets |
2017
| Minimal deployable endpoint-driven network forwarding: principle, designs and applications | Univ. of Illinois at Urbana-Champaign |
Other Datasets Topology with BGP |
|
2017
| Kasmir Raja, S. Annie Uthra, R. | Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks | J. of Network and Computer Applications | Other Datasets |
2016
| Feldmann, A. | BGP prefix delegations: A deep dive | Internet Measurement Conf. (IMC) |
Paper Data and Tools Topology with Archipelago Topology with BGP |
2016
| Using looking glasses to understand the Internets structure | Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) | Paper Data and Tools | |
2015
| Starov, O. Zair, A. Gill, P. Schapira, M. | Measuring and mitigating AS-level adversaries against Tor | arxiv.org | Paper Data and Tools |
2015
| Analyzing impact of introducing CCN on profit of ISPs | IEEE Trans. on Network and Service Management |
Paper Data and Tools Topology with BGP |
|
2014
| CCN economics: Can ISPs profit by introducing CCN? | Conf. on Network and Service Management (CNSM) and Workshop |
Paper Data and Tools Topology with BGP |
|
2020
| He, Jia Jiang, Weifan Calder, Matt Cunha, Italo Giotsas, Vasileios Katz-Bassett, Ethan | Cloud Provider Connectivity in the Flat Internet | Internet Measurement Conf. (IMC) |
Topology with Archipelago Topology with BGP |
2020
| Lichtblau, Franziska Feldmann, Anja | When wells run dry: the 2020 IPv4 address market | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Topology with Archipelago |
2020
| Jain, Alankar Wang, Chen Fanti, Giulia Sekar, Vyas | Using GANs for Sharing Networked Time Series Data:Challenges, Initial Promise, and Open Questions | IMC 20: Proceedings of the ACM Internet Measurement Conference | Topology with Archipelago |
2020
| Rabinovich, Michael Al-Dalky, Rami | FlashRoute: Efficient Traceroute on a Massive Scale | IMC 20: Proceedings of the ACM Internet Measurement Conference | Topology with Archipelago |
2020
| Nomikos, George Kotronis, Vasileios Serpezis, Pavlos Gigis, Petros Manassakis, Lefteris Dietzel, Christoph Konstantaras, Stravros Dimitropoulos, Xenofontas | O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs | IEEE/ACM Transactions on Networking |
Topology with Archipelago Topology with BGP |
2020
| Koch, Thomas Fazzion, Elverton Cunha, Italo Calder, Matt Madhyastha, Harsha Katz-Bassett, Ethan | Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes | IMC 20: Proceedings of the ACM Internet Measurement Conference | Topology with Archipelago |
2020
| Radicchi, Filippo Papadopoulos, Fragkiskos | k-core structure of real multiplex networks | Phys. Rev. Research 2 | Topology with Archipelago |
2020
| Ba, Yang Qiu, Han Zhu, Junhu Wang, Qingxian | ISRchain: Achieving efficient interdomain secure routing with blockchain | Computers and Electrical Engineering |
Topology with Archipelago Topology with BGP |
2020
| Rawat, Anil Vyavahare, Prakash D Tokebar, Sanjiv | Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profiles | International Journal of Information Technology | Topology with Archipelago |
2020
| Khan, Arijit Al Hasan, Mohommad Rezvansangsari, Rojin | Reliability Maximization in Uncertain Graphs | IEEE Transactions on Knowledge and Data Engineering | Topology with Archipelago |
2020
| Papadopoulos, Christos Heidemann, John Partridge, Craig | Delay-based Identification of Internet Block Movement | Colorado State University, Computer Science | Topology with Archipelago |
2020
| Beverly, R. | Discovering the IPv6 Network Periphery | International Conference on Passive and Active Network Measurement |
Topology with Archipelago Topology with BGP |
2020
| Vairam, Prasanna Karthik Raman, Shankar Kamakoti, V. | Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks | Computer Communications |
Topology with Archipelago Topology with BGP |
2020
| Beverly, Robert | Discovering the IPv6 Network Periphery | arXiv |
Topology with Archipelago Topology with BGP |
2019
| Vanaubel, Y. Merindol, P. Pansiot, J.-J. Donnet, B. | Let there be light: Revealing hidden MPLS tunnels with TNT | Trans. on Network and Service Management (TNSM) | Topology with Archipelago |
2019
| Li, M. Su, S. Tian, Z. Shi, W. Han, M. | Secure data sharing framework via hierarchical greedy embedding in darknets | Mobile Networks and Applications | Topology with Archipelago |
2019
| Antichi, G. Fernandes, E.L. di Lallo, R. Bruyere, M. Uhlig, S. Tyson, G. Ignacio, C. | Shaping the Internet: 10 years of IXP growth | arxiv.org |
Topology with Archipelago Topology with BGP |
2019
| Luttringer, J.R. Merindol, P. Pansiot, J.J. Donnet, B. | TNT, watch me explode: A light in the dark for revealing MPLS tunnels | IEEE | Topology with Archipelago |
2019
| Kotronis, V. | Validating IP prefixes and AS-paths with Blockchains | arxiv.org |
Topology with Archipelago Topology with BGP |
2019
| Forsberg, D. | Identifying DNS-tunneled traffic with predictive models | arxiv.org | Topology with Archipelago |
2019
| Smith, J. Schuchard, M. | Measuring irregular geographic exposure on the Internet | arxiv.org | Topology with Archipelago |
2019
| Martin, J. Beverly, R. | EUI-64 considered harmful | arxiv.org | Topology with Archipelago |
2019
| The graph structure of the Internet at the Autonomous Systems level during ten years | arxiv.org | Topology with Archipelago | |
2019
| Gong, X. Wu, Q. Que, X. Tian, Y. | Hierarchical Forwarding Bit Index Explicit Replication (HF-BIER) in Multicast | IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC) | Topology with Archipelago |
2019
| Population anomaly detection through deep gaussianization | ACM/SIGAPP Symp. on Applied Computing | Topology with Archipelago | |
2019
| Varga, L. Afifi, M. Gere, I. Neda, Z. | Scaling in the space-time of the Internet | Scientific Reports | Topology with Archipelago |
2019
| Kleineberg, K. K. | Link persistence and conditional distances in multiplex networks | Physics Review E | Topology with Archipelago |
2019
| Fontugne, R. Dimitropoulos, X. | Detecting Network Disruptions At Colocation Facilities | IEEE INFOCOM - IEEE Conference on Computer Communications | Topology with Archipelago |
2019
| Zong, B. Lumezanu, C. Chen, H. | Learning IP network representations | ACM SIGCOMM Computer Communication Review | Topology with Archipelago |
2019
| Candela, M. Di Battista, G. | Periodic Path Changes in RIPE Atlas | IEEE Access | Topology with Archipelago |
2019
| DEmidio, M. DAngelo, G. | Fully Dynamic 2-Hop Cover Labeling | Journal of Experimental Algorithmics (JEA) | Topology with Archipelago |
2019
| Anbar, M. Belaton, B. Alabsi, B. Al-Ani, A. K. | Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection | Computational Science and Technology | Topology with Archipelago |
2019
| Frigioni, D. | Distributed Shortest Paths on Power Law Networks in the Generalized Linear Preference Model: An Experimental Study | International Conference on Computational Science and Its Applications | Topology with Archipelago |
2019
| Dragan, F. F. Habib, M. Vaxes, Y. Alrasheed, H. | Fast approximation of eccentricities and distances in hyperbolic graphs | Journal of Graph Algorithms and Applications |
Topology with Archipelago Topology with BGP |
2019
| Bhattacharyya, D. K. | A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks | IETE Journal of Research | Topology with Archipelago |
2018
| Power-law degree distribution consistency in the AS-level Internet topology | Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE) |
Topology with Archipelago Topology with Skitter |
|
2018
| Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements | Anglia Ruskin University |
Topology with Archipelago Topology with BGP Topology with Skitter |
|
2018
| Welzl, M. Elmokashfi, A. M. Dreibholz, T. Gjessing, S. | Can WebRTC QoS Work? A DSCP measurement study | Intl Teletraffic Congress | Topology with Archipelago |
2018
| Khan, A. | Composite hashing for data stream sketches | arxiv.org | Topology with Archipelago |
2018
| Methods and systems for understanding large-scale Internet threats | Univ. of California, Berkeley | Topology with Archipelago | |
2018
| Marti, G. Muller, J. Vanbever, L. | SABRE: Protecting bitcoin against routing attacks | arxiv.org | Topology with Archipelago |
2018
| Gao, L. Xiaozhe, S. Hirai, H. Fujikawa, K. | Efficient handling of excessive locators in hierarchical addressing | IEEE Conf. on Computer Communications | Topology with Archipelago |
2018
| Ermakova, T. Ghazaryan, Z. | Internet connectivity of financial services - A graph-based analysis | SSRN Electronic J. | Topology with Archipelago |
2018
| Garg, S. Batra, S. Kumar, N. Rodrigues, J. J. | Bloom filter based optimization scheme for massive data handling in IoT environment | Future Generation Computer Systems | Topology with Archipelago |
2018
| Quantifying irregular geographic exposure on the Internet | Univ. of Tennessee | Topology with Archipelago | |
2018
| Gueye, A. Schanzle, C. | Quantifying information exposure in Internet routing | Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE) |
Topology with Archipelago Topology with BGP |
2018
| Phan, T. Maini, E. Rio, M. Simoens, P. | On the feasibility of using current data centre infrastructure for latency-sensitive applications | IEEE Trans. on Cloud Computing | Topology with Archipelago |
2018
| An, C. | A study on geographic properties of Internet routing | Computer Networks | Topology with Archipelago |
2018
| Mbaye, B. | On the prevalence of boomerang routing in Africa: Analysis and potential solutions | Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol) | Topology with Archipelago |
2018
| Longitudinal study of large-scale traceroute results | Naval Postgraduate School |
Topology with Archipelago Topology with BGP |
|
2018
| Tozal, M.E. | Cross-AS (X-AS) Internet topology mapping | Computer Networks |
Topology with Archipelago Topology with BGP |
2018
| Ma, X. Luo, X. Chang, E.W.W. Miu, T.T.N. Gu, G. | LinkScope: Toward detecting target link flooding attacks | IEEE Trans. on Information Forensics and Security | Topology with Archipelago |
2018
| Zhu, H. Li, Y. Zeng, Z. | FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing System | Intl Conf. on Computer and Communications (ICCC) | Topology with Archipelago |
2018
| Tozal, M. E. | Geography and Routing in the Internet | ACM Transactions on Spatial Algorithms and Systems (TSAS) |
Topology with Archipelago Topology with BGP |
2018
| Kanimozhiselvi, C. S. Kogilavani, S. V. | A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage Overhead | International Journal on Future Revolution in Computer Science and Communication Engineering |
Topology with Archipelago Topology with Skitter |
2018
| Xie, H. Lui, J. C. S. | Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models | IEEE Intl Conf. on Network Protocols (ICNP) | Topology with Archipelago |
2018
| Lumensanu, C. Zong, B. Chen, H. | Deep Learning IP Network Representations | Workshop on Big Data Analytics and Machine Learning for Data Communication Networks | Topology with Archipelago |
2018
| Improving accuracy and efficiency of network measurement by identifying homogenous IPv4 addresses | Univ. of Maryland | Topology with Archipelago | |
2018
| Grampin, E. Alvarez-Hamelin, J. I. | The Atlas Vision of IPv6 in Latin America: Topology and Latency | Latin America Networking Conf. | Topology with Archipelago |
2018
| Liu, W. Fei, G. Yang, S. Hu, G. | A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery | Information and Communications Technology | Topology with Archipelago |
2018
| Pradkin, Y. Nisar, A. | Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended) | University of Southern California / Information Sciences Institute | Topology with Archipelago |
2018
| Heidemann, J. | Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2018
| Han, Z. Tang, W. K. S. Lin, D. | Relay-based information broadcast in complex networks | Physica A: Statistical Mechanics and its Applications | Topology with Archipelago |
2018
| Tang, W. | Interplay of ICP and IXP over the Internet with power-law features | Intl J. of Modern Physics C | Topology with Archipelago |
2018
| Kelkel, S. Ermakova, T. Baumann, A. | Attacking Internet Border Routers - A Graph-Based Analysis of Strategies | ssrn.com | Topology with Archipelago |
2018
| Anbar, M. Belaton, B. Hamouda, S. | Labeled flow-based dataset of ICMPv6-based DDoS attacks | arxiv.org | Topology with Archipelago |
2018
| DEmidio, M. Frigioni, D. | Distance-Vector Algorithms for Distributed Shortest Paths Computation in Dynamic Networks | Shortest Path Solvers. From Software to Wetware | Topology with Archipelago |
2018
| Rossi, D. | A longitudinal study of IP Anycast | ACM SIGCOMM Computer Communication Review | Topology with Archipelago |
2018
| Duraiajan, R. Plonka, D. Roherer, J. P. | In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2018
| Diverse Data Sets for Impact | Univ. of Wisconsin System Madison United States | Topology with Archipelago | |
2018
| Detecting BGP anomalies using recurrence quantification analysis | Swinburne Univ. of Technology | Topology with Archipelago | |
2018
| Botta, A. Marchetta, P. Persico, V. Pescape, A. | A comprehensive survey on internet outages | J. of Network and Computer Applications |
Topology with Archipelago Topology with BGP |
2017
| Metric clusters in evolutionary games on scale-free networks | Nature Communications | Topology with Archipelago | |
2017
| Merindol, P. Pansiot, J. Donnet, B. | Through the wormhole: Tracking invisible MPLS tunnels | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2017
| Li, F. Bramsen, P. Durumeric, Z. Paxson, V. | Target generation for Internet-wide IPv6 scanning | Internet Measurement Conf. (IMC) |
Topology with Archipelago Topology with BGP |
2017
| Sriram, S. Vu, T. Raychaudhuri, D. | EIR: Edge-aware inter-domain routing protocol for the future mobile internet | Computer Networks | Topology with Archipelago |
2017
| Streibeld, F. Kruger, T. Richter, P. Feldmann, A. | Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2017
| Improving Pan-African research and education networks through traffic engineering: A LISP/SDN approach | Univ. of Cape Town | Topology with Archipelago | |
2017
| Shao, X. Gao, L. Hirai, H. Fujikawa, K. | Labelling and encoding hierarchical addressing for scalable Internet routing | Adv. in Computer and Computational Sciences | Topology with Archipelago |
2017
| Graser, L. Gupta, H. Saurez, E. Ramachandran, U. | EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures | arxiv.org | Topology with Archipelago |
2017
| Donnet, B. | A first look at the prevalence and persistence of middleboxes in the wild | Intl Teletraffic Congress | Topology with Archipelago |
2017
| Okada, M. Kanaoka, A. | Simulation study of BGP origin validation effect against mis-origination with Internet topology | Asia Joint Conf. on Information Security |
Topology with Archipelago Topology with BGP |
2017
| Mukherjee, S. Raychaudhuri, D. | The named-object abstraction for realizing advanced mobility services in the future Internet | Proc. of the Workshop on Mobility in the Evolving Internet Architecture | Topology with Archipelago |
2017
| Cannistraci, C.V. | Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction | arxiv.org | Topology with Archipelago |
2017
| Sriram, S. Raychaudhuri, D. | Edge-aware inter-domain routing for realizing next-generation mobility services | IEEE Conf. on Communications (ICC) | Topology with Archipelago |
2017
| Chen, W. Li, Q. Jiang, Y. Xu, K. | TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code | Future Generation Computer Systems |
Topology with Archipelago Topology with BGP |
2017
| Frigioni, D. | Distance-vector algorithms for distributed shortest paths on dynamic power-law networks | preprints.org | Topology with Archipelago |
2017
| Bartolomeo, M. Battista, G. Squarcella, C. | Radian: Visual exploration of traceroutes | IEEE Trans. Visualization and Computer Graphics | Topology with Archipelago |
2017
| Gasser, O. Sattler, P. Carle, G. | HLOC: Hints-based geolocation leveraging multiple measurement frameworks | Network Traffic Measurement and Analysis Conf. | Topology with Archipelago |
2017
| Nithyanand, R. Razaghpanah, A. Gill, P. | A churn for the better: Localizing censorship using network-level path churn and network tomography | arxiv.org |
Topology with Archipelago Topology with BGP |
2017
| Zohar, A. Vanbever, L. | Hijacking bitcoin: Routing attacks on cryptocurrencies | Symp. on Security and Privacy | Topology with Archipelago |
2017
| Wang, Z. Liu, X. Li, Q. Chen, Z. | The design and implementation of a covering MDN-complete-life-cycle malicious domain detection framework | Intl Conf. on Computer Science and Technology (CST) | Topology with Archipelago |
2017
| Measurement-based characterization of large-scale networked systems | Univ. of Oregon |
Topology with Archipelago Topology with BGP |
|
2017
| Hu, H. Hu, G. | Two-type information fusion based IP-to-AS mapping table refining | J. of Computer Science and Technology |
Topology with Archipelago Topology with BGP |
2017
| Baumann, A. Ehlert, M. Vasilis, V. Ermakova, T. | CORIA - Analyzing Internet connectivity risks using network graphs | IEEE Conf. on Communications (ICC) |
Topology with Archipelago Topology with BGP |
2017
| Bartolini, N. Khamfroush, H. La Porta, T. | Progressive damage assessment and network recovery after massive failures | Computer Communications | Topology with Archipelago |
2017
| Helbing, D. | Collective navigation of complex networks: Participatory greedy routing | Scientific Reports | Topology with Archipelago |
2017
| High-frequency mapping of the IPv6 Internet using Yarrp | Naval Postgraduate School | Topology with Archipelago | |
2017
| Geddes, J. Schliep, M. Hopper, N. | The cost of the path not taken | IEEE Global Communications Conf. (GLOBECOM) | Topology with Archipelago |
2017
| Fonseca, O. Fazzion, E. Guedes, D. Meira, W. Cunha, I. | A characterization of load balancing on the IPv6 Internet | Conf. on Passive and Active Network Measurement |
Topology with Archipelago Topology with BGP |
2017
| Xu, G. Xia, Y. | Optimal defense resource allocation in scale-free networks | Physica A: Statistical Mechanics and its Applications | Topology with Archipelago |
2017
| Hu, G. Chen, G. Sangaiah, A. K. Zhang, P. Yan, X. Jiang, W. | Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack | IEEE Access | Topology with Archipelago |
2017
| He, T. La Porta, T. | Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring | ACM SIGMETRICS Performance Evaluation Review | Topology with Archipelago |
2017
| Zhang, Y. Fang, B. Zhang, H. | Succinct and practical greedy embedding for geometric routing | Computer Communications | Topology with Archipelago |
2017
| Ensalfi, R. Li, F. Feamster, N. Paxson, V. | Augur: Internet-wide detection of connectivity disruptions | IEEE Symp. on Security and Privacy | Topology with Archipelago |
2017
| Spring, N. | Identifying and Analyzing Broadband Internet Reverse DNS Names | Intl Conf. on emerging Networking EXperiments and Technologies |
Topology with Archipelago Topology with BGP |
2017
| Performance evaluation for network services, systems and protocols | arxiv.org |
Topology with Archipelago Topology with BGP |
|
2017
| Network analysis and algorithm solutions in critical emergency scenarios | Sapienza Univ. of Rome | Topology with Archipelago | |
2017
| Nithyanand, R. Gill, P. Razaghpanah, A. | A Churn for the Better | CoNEXT |
Topology with Archipelago Topology with BGP |
2017
| Thom, J. Gunes, M. H. | Comparative analysis of internet topology data sets | Conf. on Computer Communications Workshops (INFOCOM WKSHPS) | Topology with Archipelago |
2017
| Obraczka, K. | An empirical characterization of Internet round-trip times | ACM Symp. on QoS and Security for Wireless and Mobile Networks | Topology with Archipelago |
2016
| Shao, X. Gao, L. Harai, H. Fujikawa, K. | Towards variable length addressing for scalable Internet routing | IEEE Performance Computing and Communications Conf. (IPCCC) | Topology with Archipelago |
2016
| Towards uncovering BGP hijacking attacks | ParisTech | Topology with Archipelago | |
2016
| Zhang, X. Zhao, J. Wang, X. Wolf, T. | Fast shortest-path queries on large-scale graphs | International Conference on Network Protocols |
Topology with Archipelago Topology with Skitter |
2016
| Smaragdakis, G. Plonka, D. Berger, A. | Beyond counting: New perspectives on the active IPv4 address space | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2016
| Smith, J.M. | MAP-IT: Multipass accurate passive inferences from traceroute | Internet Measurement Conf. (IMC) |
Topology with Archipelago Topology with BGP |
2016
| Dimitropoulos, X. Tassiulas, L. | Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach | IEEE Trans. on Network and Service Management |
Topology with Archipelago Topology with BGP |
2016
| Yarrping the Internet: Randomized high-speed active topology discovery | Internet Measurement Conf. (IMC) | Topology with Archipelago | |
2016
| Mell, P. Banse, D. Congo, F. | On the Internet connectivity in Africa | EAI Conf. on e-Infrastructure and e-Services for developing countries | Topology with Archipelago |
2016
| Head into the cloud: An analysis of the emerging cloud infrastructure | Duke Univ. |
Topology with Archipelago Topology with BGP |
|
2016
| Li, Q. Jin, F. Xiong, W. Wu, Y. | Hyperbolic mapping of complex networks based on community information | Physica A: Statistical Mechanics and its Applications | Topology with Archipelago |
2016
| Durumeric, Z. Czyz, J. Karami, M. Bailey, M. McCoy, D. Savage, S. Paxson, V. | Youve got vulnerability: Exploring effective vulnerability notifications | USENIX Security Symp. | Topology with Archipelago |
2016
| Sherr, M. Zhou, W. | Data-plane defenses against routing attacks on Tor | Privacy Enhancing Technologies |
Topology with Archipelago Topology with BGP |
2016
| LaFever, B. Beverly, R. | Empirical study of router IPv6 interface address distributions | IEEE Internet Computing | Topology with Archipelago |
2016
| Bi, Y. Zhao, H. Cai, W. | Research on bottleneck-delay in internet based on IP united mapping | Peer-to-Peer Networking and Applications | Topology with Archipelago |
2016
| Boguna, M. Serrano, A. Papadopoulos, F. | Hidden geometric correlations in real multiplex networks | Nature Physics | Topology with Archipelago |
2016
| Kim, D.S. Jung, H.Y. | Defending against DDoS attacks under IP spoofing using image processing approach | IEICE Trans. on Communications | Topology with Archipelago |
2016
| Wright, M. | DeNASA: Destination-naive AS-awareness in anonymous communications | Proc. on Privacy Enhancing Technologies |
Topology with Archipelago Topology with BGP |
2016
| Zhang, K. | Quantifying the flattening of Internet topology | Conf. on Future Internet Technologies |
Topology with Archipelago Topology with BGP Topology with Skitter |
2016
| Fontunge, R. Papadopoulos, C. | Towards characterizing international routing detours | arxiv.org |
Topology with Archipelago Topology with BGP |
2016
| Feuillen, G. | Toward realistic network topologies | Univ. de Louvain | Topology with Archipelago |
2016
| A brave new world: Studies on the deployment and security of the emerging IPv6 Internet | Univ. of Michigan, Ann Arbor, MI, US | Topology with Archipelago | |
2016
| Wu, Y. Li, Q. Jin, F. Xiong, W. | Link prediction based on hyperbolic mapping with community structure for complex networks | Physica A: Statistical Mechanics and its Applications | Topology with Archipelago |
2016
| Singh, R. Cho, S. Gill, P. | Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design | arxiv.org | Topology with Archipelago |
2016
| Reducing short flows latency in the Internet | Univ. of Illinois at Urbana-Champaign |
Topology with Archipelago Topology with BGP |
|
2016
| Fabian, B. | Vulnerability against Internet disruptions - A graph-based perspective | Lecture Notes in Computer Science |
Topology with Archipelago Topology with BGP |
2016
| Ruan, L. | A machine learning approach to edge type inference in Internet AS graphs | Computer Comm.s Workshops (INFOCOM WKSHPS) |
Topology with Archipelago Topology with BGP |
2016
| Network level attacks and defenses against anonymity networks | Georgetown Univ. |
Topology with Archipelago Topology with BGP |
|
2016
| Rohrer, J.P. Beverly, R. | Revisiting AS-level graph reduction | Computer Communications Workshops (INFOCOM WKSHPS) | Topology with Archipelago |
2016
| Peng, W. Su, J. Wang, Z. | Assessing resilience of inter-domain routing system under regional failures | KSII Trans. on Internet and Information Systems |
Topology with Archipelago Topology with BGP |
2016
| Reducing short flows latency in the internet | Univ. Illinois, Urbana-Champaign |
Topology with Archipelago Topology with BGP |
|
2016
| Data-driven large scale network-layer Internet simulation | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) | Topology with Archipelago | |
2016
| Vijayalayan, K. | Network timing and the 2015 leap second | Passive and Active Measurement (PAM) | Topology with Archipelago |
2016
| Merindol, P. Pansiot, J.-J. Donnet, B. | A brief history of MPLS usage in IPv6 | Passive and Active Measurement (PAM) |
Topology with Archipelago Topology with BGP |
2016
| Dimitropoulos, X. | traIXroute: Detecting IXPs in traceroute paths | Lecture Notes in Computer Science (LNCS) |
Topology with Archipelago Topology with BGP |
2016
| Correlating inferred data plane IPv6 reboot events with control plane BGP activity | Naval Postgraduate School, Monterey, CA, US | Topology with Archipelago | |
2016
| Shi, J.-M. | Graph perturbations and corresponding spectral changes in Internet topologies | Computer Communications | Topology with Archipelago |
2016
| Boguna, M. Serrano, M. Papadopoulos, F. | Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation | arxiv.org |
Topology with Archipelago Topology with BGP |
2016
| Wang, F. Gao, L. | Quantifying AS path inflation by routing policies | Intl J. of Future Generation Communication and Networking | Topology with Archipelago |
2016
| Kumar, V.S.A. Marathe, M.V. Sundaram, R. Thakur, M. Thulasidasan, S. | A study of the structure and vulnerabilities of metropolitan area networks | Intl. Conf. on Communication Systems and Networks (COMSNETS) |
Topology with Archipelago Topology with Skitter |
2015
| Zhang, Y. Zhang, H. Fang, B. Du, X. | Geometric Routing on Flat Names for ICN | IEEE Global Comm. Conference | Topology with Archipelago |
2015
| Jiang, Q. Fei, G. Yuan, M. Hu, G. | A novel methodology of router-to-AS mapping inspired by community discovery | arxiv.org | Topology with Archipelago |
2015
| Frigioni, D. Navarra, A. | Explore and repair graphs with black holes using mobile entities | Theoretical Computer Science | Topology with Archipelago |
2015
| Merindol, P. Pansiot, J.-J. Donnet, B. | MPLS under the microscope: Revealing actual transit path diversity | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2015
| Edge-aware inter-domain routing protocol for the MobilityFirst Future Internet Architecture | Rutgers, The State Univ. of New Jersey | Topology with Archipelago | |
2015
| Motta Pires, P.S. Borges Neto, J.B. Loureiro, A.A.F. | Minimization and placement of sensors in structurally observable networks | Conf. on Computer and Information Technology (CIT) | Topology with Archipelago |
2015
| Baumann, A. Lackner, J. | Topological analysis of cloud service connectivity | Computers and Industrial Engineering |
Topology with Archipelago Topology with BGP |
2015
| Shalinie, S.M. | Single packet ICMP traceback technique using router interface | J. of Information Science and Engineering | Topology with Archipelago |
2015
| Detection of active topology probing deception | Naval Postgraduate School | Topology with Archipelago | |
2015
| Wu, H. Scoglio, C. Gruenbacher, D. | Robust allocation of weighted dependency links in cyber-physical networks | Physica A: Statistical Mechanics and its Applications | Topology with Archipelago |
2015
| Discovery of IPv6 router interface addresses via heuristic methods | Naval Postgraduate School | Topology with Archipelago | |
2015
| Aldecoa, R. Krioukov, D. | Network geometry inference using common neighbors | Phys. Rev. E | Topology with Archipelago |
2015
| Wang, F. Gao, L. | Routing-policy aware peering for large content providers | Computer Comm. | Topology with Archipelago |
2015
| Grynberg, S.P. Alvarez-Hamelin, J.I. | Router-level community structure of the Internet Autonomous Systems | EPJ Data Science | Topology with Archipelago |
2015
| Yu, Z. Shen, S. Hongli, Z. Binxing, F. | Geometric name routing for ICN in dynamic world | China Comm. | Topology with Archipelago |
2015
| Gamperli, A. Dimitropoulos, X. | Routing centralization across domains via SDN: A model and emulation framework for BGP evolution | Computer Networks | Topology with Archipelago |
2015
| Vasilakos, X. Okwii, T. Xylomenos, G. Pavlou, G. Polyzos, G. | On the inter-domain scalability of route-by-name information-centric network architectures | IFIP Networking Conf. | Topology with Archipelago |
2015
| DEmidio, M. Frigioni, D. Leucci, S. Proietti, G. | Dynamic maintenance of a shortest-path tree on homogeneous batches of updates: New algorithms and experiments | J. Experimental Algorithmics | Topology with Archipelago |
2015
| Johnson, A. Das, A. Borisov, N. Caesar, M. | Defending Tor from network adversaries: A case study of network path prediction | Privacy Enhancing Technologies | Topology with Archipelago |
2015
| Herzeele, L.V. Vandeputte, F. Vermoesen, L. | Challenges for orchestration and instance selection of composite services in distributed edge clouds | Intl. Symp. on Integrated Network Management (IM) | Topology with Archipelago |
2015
| Montero, D. Serral-Gracia, R. Yannuzzi, M. | Self-reliant detection of route leaks in inter-domain routing | Computer Networks | Topology with Archipelago |
2015
| Johnson, A. Cortes, S. Syverson, P. Feigenbaum, J. | 20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cables | Proc. on Privacy Enhancing Technologies |
Topology with Archipelago Topology with BGP |
2015
| Donnet, B. | Towards a middlebox policy taxonomy: Path impairments | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) | Topology with Archipelago |
2015
| Fearnster, N. Bagula, A. Suleman, H. | Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networks | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | Topology with Archipelago |
2015
| Toward a robust method of presenting a rich, interconnected deceptive network topology | Naval Postgraduate School | Topology with Archipelago | |
2015
| Li, Z. Levin, D. Spring, N. | UAv6: Alias Resolution in IPv6 Using Unused Addresses | Intl Conf. on Passive and Active Network Measurement | Topology with Archipelago |
2015
| Methods for intelligent mapping of the IPv6 address space | Naval Postgraduate School | Topology with Archipelago | |
2015
| A secure and resilient communication infrastructure for decentralized networking applications | Technical Univ. of Munich | Topology with Archipelago | |
2015
| Harang, R. Gueye, A. | The resilience of the Internet to colluding country induced connectivity disruptions | Network and Distributed System Security Symp. (NDSS) | Topology with Archipelago |
2015
| Bai, M. Schoenfield, M. Berger, A. Caruso, N. Economou, G. Gilliss, S. Maggs, B. Moses, K. Duff, D. Ng, K.C. Sirer, E.G. Weber, R. Wong, B. | Alidade: IP geolocation without active probing | Duke Univ. |
Topology with Archipelago Topology with BGP |
2014
| Montero, D. Yannuzzi, M. Serral-Gracia, R. Masip-Bruin, X. Ramirez, W. | Route leak detection using real-time analytics on local BGP information | IEEE Global Communications Conf. | Topology with Archipelago |
2014
| Darst, R.K. Fortunato, S. | Community detection in networks: Structural communities versus ground truth | Phys. Rev. E |
Topology with Archipelago Topology with BGP |
2014
| Gligor, V.D. | Routing bottlenecks in the Internet: Causes, exploits, and countermeasures | Conf. on Computer and Communications Security |
Topology with Archipelago Topology with BGP |
2014
| Johnson, T Simonetto, P Lazos, P Kobourov, S. Schneider, M. Aceda, C. | IMap: Visualizing network activity over Internet maps | Visualization for Cyber Security (VizSec) |
Topology with Archipelago UCSD Network Telescope |
2014
| Sommers, J. Barford, P. | Layer 1-informed Internet topology measurement | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2014
| Brust, M.R. Phoha, V.V. | Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes | Computer Networks | Topology with Archipelago |
2014
| Beverly, R. Allman, M. | A middlebox-cooperative TCP for a non end-to-end internet | ACM SIGCOMM Computer Communication Review | Topology with Archipelago |
2014
| Warbritton, D. Sicker, D. | Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet | Conf. on Communication, Information and Internet Policy (TPRC) | Topology with Archipelago |
2014
| Pantazopoulos, P. Karaliopoulos, M. Stavrakakis, I. | Comparative assessment of centrality indices and implications on the vulnerability of ISP networks | Intl Teletraffic Congress (ITC) | Topology with Archipelago |
2014
| IPv6 network infrastructure and stability inference | Naval Postgraduate School | Topology with Archipelago | |
2014
| Mapping the whole Internet | Duke Univ. |
Topology with Archipelago Topology with BGP |
|
2014
| Allman, M. Zhang, J. Iekel-Johnson, S. Osterweil, E. Bailey, M. | Measuring IPv6 adoption | Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) | Topology with Archipelago |
2014
| Empowering bystanders to facilitate Internet censorship measurement and circumvention | Georgia Tech |
Topology with Archipelago UCSD Network Telescope |
|
2014
| Temporal comparisons of Internet topology | Naval Postgraduate School | Topology with Archipelago | |
2014
| Comparing internet probing methodologies through an analysis of large dynamic graphs | Naval Postgraduate School | Topology with Archipelago | |
2014
| Johnson, A. Syverson, P. Feigenbaum, J. | Representing network trust and using it to improve anonymous communication | arxiv.org |
Topology with Archipelago Topology with BGP |
2014
| Gligor, V.D. | Routing bottlenecks in the Internet - causes, exploits, and countermeasures | Carnegie Mellon Univ. |
Topology with Archipelago Topology with BGP |
2014
| IPv6 geolocation using latency constraints | Naval Postgraduate School | Topology with Archipelago | |
2014
| Beverly, R. Xie, G.G. | Ingress point spreading: A new primitive for adaptive active network mapping | Passive and Active Measurement (PAM) | Topology with Archipelago |
2014
| Ma, W. | Robustness analyses of Internet topology with power-law features | Intl J. of Future Generation Communication and Networking | Topology with Archipelago |
2014
| Domain relations in trees arborescence for interaction search on persistent routing availability | Symp. on Applied Machine Intelligence and Informatics (SAMI) | Topology with Archipelago | |
2014
| Krishnamurthy, B. Willinger, W. Bustamante, F.E. Sanchez, M.A. | Demo abstract: towards extracting semantics by visualizing large traceroute datasets | Computing | Topology with Archipelago |
2013
| Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets | Univ. of Victoria, Victoria, CA | Topology with Archipelago | |
2013
| Pantazopoulos, P. Karaliopoulos, M. Stavrakakis, I. | The multiple instances of node centrality and their implications on the vulnerability of ISP networks | arxiv.org | Topology with Archipelago |
2013
| Wacek, C. Jansen, R. Sherr, M. Syverson, P. | Users get routed: Traffic correlation on Tor by realistic adversaries | ACM SIGSAC Conf. on Computer and Communications Security (CCS) |
Topology with Archipelago Topology with BGP |
2013
| Pansiot, J.-J. Merindol, P. Donnet, B. | Network fingerprinting: TTL-based router signatures | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2013
| He, T. Leung, K.K. Swami, A. Towsley, D. | Identifiability of link metrics based on end-to-end path measurements | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2013
| Kwon, T. Kim, H. Choi, Y. | AS-level topology collection through looking glass servers | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2013
| Uhlig, S. | On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events | Computer Communications | Topology with Archipelago |
2013
| Toward large-graph comparison measures to understand Internet topology dynamics | Naval Postgraduate School, Monterey, CA, US | Topology with Archipelago | |
2013
| Barford, P. | Whats in a name?: decoding router interface names | ACM workshop on HotPlanet | Topology with Archipelago |
2013
| Wang, Y. Su, S. Yang, F. Han, R. | Filtering location optimization for the reactive packet filtering | Security and Communication Networks | Topology with Archipelago |
2013
| Karaliopoulos, M. Stavrakakis, I. | On the local approximations of node centrality in Internet router-level topologies | Workshop on Self-Organizing Systems (IWSOS) | Topology with Archipelago |
2013
| Chan, E.W.W. Luo, X. Fok, W.W.T. Chang, R.K.C. | An efficient approach to multi-level route analytics | IFIP/IEEE Symp. on Integrated Network Management (IM) | Topology with Archipelago |
2013
| Zhao, H. Zhang, J. Ai, J. Jia, S. Ge, x. Liu, W. | Analysis of interlayer connection catastrophe characteristics in Internet AS level topology | Telkomnika | Topology with Archipelago |
2013
| Tan, H. Bauer, K. Sherr, M. | An empirical evaluation of relay selection in Tor | Network and Distributed System Security Symp. (NDSS) |
Topology with Archipelago Topology with BGP |
2013
| Bi, J. Wu, J. | Revisiting the rich club of the Internet AS-level topology | IEICE Trans. on Communications |
Topology with Archipelago Topology with Skitter |
2012
| Jiang, W. Li, H. Stoica, I. | Tradeoffs in CDN designs for throughput oriented traffic | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with Archipelago |
2012
| Future architectures for middlebox processing services on the Internet and in the Cloud | UC Berkeley |
Topology with Archipelago Topology with BGP |
|
2012
| Wong, W. Gary Chan, S.-H. | Toward continuous push-based P2P live streaming | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with Archipelago |
2012
| Guha, R. | Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation | J. Supercomputing | Topology with Archipelago |
2012
| DEmidio, M. Frigioni, D. Romano, D. | Enhancing the computation of distributed shortest paths on real dynamic networks | Mediterranean Conf. on Algorithms | Topology with Archipelago |
2012
| Grothoff, C. Thurimella, R. | Partitioning the Internet | Conf. on Risks and Security of Internet and Systems (CRiSIS) |
Topology with Archipelago Topology with BGP |
2012
| Guha, R. | Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks | IEEE Conf. on Local Computer Networks (LCN) | Topology with Archipelago |
2012
| Kaune, S. Miles, S. El-khatib, Y. Mauthe, A. Taweel, A. | A trace-driven analysis of caching in content-centric networks | IEEE Conf. on Computer Communications and Networks (ICCCN) | Topology with Archipelago |
2012
| Papadopolous, C. Massey, D. | Epiphany: A location hiding architecture for protecting critical services from DDoS attacks | IEEE/IFIP Conf. on Dependable Systems and Networks (DSN) | Topology with Archipelago |
2012
| Simoes, P. Boavida, F. | Peer selection in P2P service overlays using geographical location criteria | Computational Science and Its Applications (ICCSA) | Topology with Archipelago |
2012
| Zhang, X. | Analysis of Internet robustness in attacks | Conf. on Systems and Informatics (ICSAI) | Topology with Archipelago |
2012
| Wong, D.S. | Anonymous overlay network supporting authenticated routing | Information Sciences | Topology with Archipelago |
2012
| Chan, S.G. | Achieving high-bitrate overlay live streaming with proxy helpers | Packet Video Workshop (PV) | Topology with Archipelago |
2012
| Fragopoulou, P. Markatos, E. Roussopoulos, M. | ITA: Innocuous topology awareness for unstructured P2P networks | IEEE Trans. on Parallel and Distributed Systems |
Topology with Archipelago Topology with BGP |
2012
| Gregori, E. Lenzini, L. Mainardi, S. Vecchio, A. | On the feasibility of measuring the internet through smartphone-based crowdsourcing | Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) | Topology with Archipelago |
2012
| Wang, Z. | Collapse by cascading failures in hybrid attacked regional Internet | J. Security and Its Applications | Topology with Archipelago |
2012
| Roca, V. Kaafar, M.A. Schuler, F. Roch, J.-L. | IBTrack: an ICMP black holes tracker | hal.archives-ouvertes.fr | Topology with Archipelago |
2012
| Zhang, B. Chan, S.-H.G. Cheung, G. Frossard, P. | Coding and replication co-design for interactive multiview video streaming | IEEE INFOCOM | Topology with Archipelago |
2012
| DAngelo, G. Di Stefano, G. Frigioni, D. Maurizio, V. | Engineering a new algorithm for distributed shortest paths on dynamic networks | Algorithmica | Topology with Archipelago |
2012
| Su, S. Yang, Y. Ren, J. | A more efficient hybrid approach for single-packet IP traceback | EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) |
Topology with Archipelago Topology with Skitter |
2012
| DEmidio, M. Frigioni, D. Maurizio, V. | Engineering a new loop-free shortest paths routing algorithm | Symp. on Experimental Algorithms (SEA) | Topology with Archipelago |
2011
| Erikson, B. Barford, P. | On the prevalence and characteristics of MPLS deployments in the open Internet | Internet Measurement Conf. (IMC) |
Topology with Archipelago Topology with BGP |
2011
| Oliveira, R. Wang, Y. Su, S. Zhang, B. Bi, J. Zhang, H. Zhang, L. | A framework to quantify the pitfalls of using traceroute in AS-level topology measurement | IEEE J. Selected Areas in Communications | Topology with Archipelago |
2011
| Merindol, P. Donnet, B. Pescape, A. Pansiot, J.-J. | Topology discovery at the router level: a new hybrid tool targeting ISP networks | IEEE J. Selected Areas in Communications |
Topology with Archipelago Topology with Skitter |
2011
| Aguiar, R.L. Steenkiste, P. | Topological implications of cascading interdomain bilateral traffic agreements | IEEE J. Selected Areas in Communications | Topology with Archipelago |
2011
| Guha, R. | Internet exchange points and Internet routing | Conf. on Network Protocols (ICNP) | Topology with Archipelago |
2011
| Laufer, R. Fernandes, N.C. Duarte, O.C.M.B. | A stateless traceback technique for identifying the origin of attacks from a single packet | IEEE Conf. on Communications (ICC) | Topology with Archipelago |
2011
| Lenzini, L. Orsini, C. | k-clique communities in the Internet AS-level topology graph | Distributed Computing Systems Workshops (ICDCSW) | Topology with Archipelago |
2011
| Weisser, M.-A. | Internet topology on as-level: Model, generation methods and tool | IEEE Performance Computing and Communications Conf. (IPCC) |
Topology with Archipelago Topology with BGP |
2011
| Lenzini, L Orsini, C. | k-dense communities in the internet AS-level topology | Conf. on Communication Systems and Networks (COMSNETS) | Topology with Archipelago |
2011
| Improta, A. Lenzini, L. Orsini, C. | The impact of IXPs on the AS-level topology structure of the Internet | Computer Communications | Topology with Archipelago |
2010
| Heidemann, J. | Selecting representative IP addresses for internet topology studies | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2010
| Berger, A. Xie, G.G. | Primitives for active internet topology mapping: toward high-frequency characterization | Internet Measurement Conf. (IMC) | Topology with Archipelago |
2010
| Guha, R. | Impact of Internet exchange points on Internet topology evolution | Conf. on Local Computer Networks (LCN) |
Topology with Archipelago Topology with Skitter |
2010
| Weisser, M.-A. | aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) | Topology with Archipelago |
2010
| Hege, G. Schmidt, T.C. Wahlisch, M. | A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP | Principles, Systems and Applications of IP Telecommunications (IPTComm) | Topology with Archipelago |
2010
| Oliveira, R. Zhang, H. Zhang, L. | Quantifying the pitfalls of traceroute in AS connectivity inference | Passive and Active Measurement (PAM) | Topology with Archipelago |
2010
| Matray, P. Haga, P. Sebok, T. Csabai, I. Vattay, G. | Spotter: a model based active geolocation service | IEEE Conf. on Computer Communications (INFOCOM) | Topology with Archipelago |
2010
| Efficient internet topology discovery techniques | Univ. Waikato, New Zealand | Topology with Archipelago | |
2010
| DAngelo, G. Di Stefanoa, G. Frigioni, D. | Partially dynamic efficient algorithms for distributed shortest paths | Theoretical Computer Science | Topology with Archipelago |
2009
| Zhang, G.-Q. Cheng, S.-Q. Zhou, T. | Symbiotic effect: A guideline for network modeling | EPL (Europhysics Letters) | Topology with Archipelago |
2009
| Dias, B. Sousa, P. | Automated and distributed network service monitoring | Asia-Pacific Network Operations and Management Symp. (APNOMS) | Topology with Archipelago |
2009
| Donnet, B. Bonaventure, O. | On the impact of clustering on measurement reduction | IFIP Networking Conf. | Topology with Archipelago |
2009
| Cao, Y. Cui, Y. Xue, Y. | On scalability of proximity-aware peer-to-peer streaming | Computer Communications |
Topology with Archipelago Topology with BGP |
2008
| Jiang, T.M. Wu, A. | A virtual service framework for service composition QoS based on active measurement | Symp. on Service-Oriented System Engineering (SOSE) | Topology with Archipelago |
2008
| Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien | Hochschule fuer Angewandte Wissenschaften Hamburg, Germany |
Topology with Archipelago Topology with Skitter |
|
2008
| Schmidt, T.C. Spalt, W. | What is happening from behind?: Making the impact of internet topology visible | Campus-Wide Information Systems |
Topology with Archipelago Topology with Skitter |
2008
| Zhao, H. Zhang, X. Ge, X. | Research on the distribution of network nodes based on multiple measurement points | Computer Science | Topology with Archipelago |
2007
| Zhao, H. Zhang, X. Yuan, S. | Analysis on traveling time of internet | China Institute of Communications | Topology with Archipelago |
2006
| Dash, D. Perrig, A. Zhang, H. | Modeling adoptability of secure BGP protocols | Joint Conf. on Measurement and Modeling of Computer Systems | Topology with Archipelago |
2005
| Zhao, H. Xu, Y. Zhang, W.-B. | Internet complex network separation degree analysis based on hops | J. China Inst. of Communications | Topology with Archipelago |
2020
| Beverly, Robert Smaragdakis, Georgios | Keep your Communities Clean: Exploring the Routing MessageImpact of BGP Communities | CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies | Topology with BGP |
2020
| Shi, Xingang Yang, Yan Yin, Xia Wang, Zhiliang Wu, Jianping | TopoScope: Recover AS Relationships From Fragmentary Observations | IMC 20: Proceedings of the ACM Internet Measurement Conference | Topology with BGP |
2020
| Gao, L | Verifying Policy-based Routing at Internet Scale | IEEE INFOCOM -IEEE Conference on Computer Communications | Topology with BGP |
2020
| Jamin, Sugih Danzig, Peter Qian, Feng | Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Topology with BGP |
2020
| Donnet, Benoit | Virtual Insanity: Linear Subnet Discovery | IEEE Transactions on Network and Service Management | Topology with BGP |
2020
| Welzl, Michael Fairhurst, Gorry Elmokashfi, Ahmed Dreibholz, Thomas Gjessing, Stein | On the usability of transport protocols other than TCP: A home gateway and internet path traversal study | Computer Networks | Topology with BGP |
2020
| Shavitt, Y. | Unveiling the type of relationship between Autonomous Systems using deep learning | IEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet) | Topology with BGP |
2020
| Livadariu, I. Gigis, P. | A first look at the misuse and abuse of the IPv4 Transfer Market | Intl Conf. on Passive and Active Network Measurement | Topology with BGP |
2020
| Yazid, S. | Portrait of Indonesia Internet Topology at the Autonomous System Level | Computational Science and Technology. Lecture Notes in Electrical Engineering | Topology with BGP |
2020
| Perdisci, Roberto Konte, Maria | IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points | arxiv | Topology with BGP |
2020
| A Gravitational Approach for Ranking Autonomous Systems in Large Autonomous System Networks | University of Twente | Topology with BGP | |
2020
| Ford, Bryan Basescu, Cristina | Applying Approximate Distance Oracles to Internet Routing | Swiss Federal Institute of Technology Lausanne | Topology with BGP |
2020
| Relationship between Network Traffic Topology Map and Degree of Competition | Journal of Physics: Conference Series | Topology with BGP | |
2019
| Vardi, Shai Wierman, Adam | Logarithmic Communication for DistributedOptimization in Multi-Agent Systems | Proceedings of the ACM on Measurement and Analysis of Computing Systems | Topology with BGP |
2019
| Gaeta, R. Sereno, M. | A network aware resource discovery service | ParisTech | Topology with BGP |
2019
| Durairajan, Ramakrishnan Rejaie, Reza Willinger, Walter | How Cloud Traffic Goes Hiding:A Study of Amazon Peering Fabric | IMC 19: Proceedings of the Internet Measurement Conference | Topology with BGP |
2019
| Joglekar, Sagar De Cristofaro, Emiliano Sastry, Nishanth Tyson, Gareth | Challenges in the Decentralised Web:The Mastodon Case | IMC 19: Proceedings of the Internet Measurement Conference | Topology with BGP |
2019
| Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints | Univ. of Twente | Topology with BGP | |
2019
| Cho, S. Weinberg, Z. Hoang, N.P. Razaghpanah, A. Christin, N. Gill, P. | ICLab: A global, longitudinal Internet censorship measurement platform | arxiv.org | Topology with BGP |
2019
| Bouguessa, M. Wang, S. | Modeling and predicting community structure changes in time-evolving social networks | IEEE Trans. on Knowledge and Data Engineering | Topology with BGP |
2019
| Smith, J.M. Schuchard, M. | The Maestro attack: Orchestrating malicious flows with BGP | arxiv.org | Topology with BGP |
2019
| Ikram, M. Asghar, H.J. Kaafar, M.A. Chaabane, A. Thilakarathna, K. | A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklists | arxiv.org | Topology with BGP |
2019
| Lui, J. Lin, D. Hui, D. | On the feasibility of inter-domain routing via a small broker set | IEEE Trans. on Parallel and Distributed Systems | Topology with BGP |
2019
| Yin, X. Shi, X. Wang, Z. He, J. Fu, T. Z. J. Winslett, M. | Inter-domain routing bottlenecks and their aggravation | Computer Networks | Topology with BGP |
2019
| Zhang, J. J. Wang, X. T. Liu, Y. J. Guok, C. Le, F. Newman, H. Yang, Y. R. MacAuley, J. | Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource Discovery | IEEE Journal on Selected Areas in Communications | Topology with BGP |
2019
| Kang, M. S. Hsiao, H. C. Chiang, W. H. Tung, S. P. Wang, Y. S. | On the Feasibility of Rerouting-based DDoS Defenses | IEEE Symp. on Security and Privacy | Topology with BGP |
2019
| Su, S. Shi, W. Du, X. Guizani, M. Yu, X. | A data-driven method for future Internet route decision modeling | Future Generation Computer Systems | Topology with BGP |
2019
| Kotronis, V. | Inferring Catchment in Internet Routing | ACM on Measurement and Analysis of Computing Systems | Topology with BGP |
2019
| Multi-path routing | Swiss Fed. Inst. of Technology Zurich | Topology with BGP | |
2019
| Wang, C. | An Efficient Approximation of Betweenness Centrality for Uncertain Graphs | IEEE Access | Topology with BGP |
2019
| Edwards, B. Freeman, C. Crandall, J. R. Forrest, S. | Borders and gateways: measuring and analyzing national as chokepoints | ACM SIGCAS Conf. on Computing and Sustainable Societies | Topology with BGP |
2019
| Lin, X. Zhou, R. Chen, X. | Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current Inputs | ACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc) | Topology with BGP |
2019
| Wen, S. Yu, S. Liu, B. Xiang, Y. Zhou, W. | Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator | Malicious Attack Propagation and Source Identification | Topology with BGP |
2019
| Lazos, L. Rozenblit, J. Breiger, R. | Multimodal Graph Analysis of Cyber Attacks | Spring Simulation Conference (SpringSim) | Topology with BGP |
2019
| Network Peering Dashboard for SURFnet | Univ. of Amsterdam | Topology with BGP | |
2019
| Freedman, R. Zilberstein, S. Wolf, T. | Using Natural Language Constructs and Concepts to Aid Network Management | International Conference on Computing, Networking and Communications (ICNC) | Topology with BGP |
2019
| Merindol, P. Persico, V. Pelsser, C. Pescape, A. | Filtering the noise to reveal inter-domain lies | Network Traffic Measurement and Analysis Conference (TMA) | Topology with BGP |
2019
| Canbaz, M. A. Gunes, M. H. | Investigating Characteristics of Internet Paths | Transactions on Modeling and Performance Evaluation of Computing Systems | Topology with BGP |
2018
| Toward automated worldwide monitoring of network-level censorship | Carnegie Mellon Univ. | Topology with BGP | |
2018
| Mirkovic, J. Yu, M. Zhang, Y. | SENSS against volumetric DDoS attacks | Computer Security Applications Conf. (CSAC) | Topology with BGP |
2018
| Jamin, S. Danzig, P. Shaha, J. | AP-atoms: A high-accuracy data-driven client aggregation for global load balancing | IEEE/ACM Trans. on Networking | Topology with BGP |
2018
| Dworken, D. Vaidya, T. Sherr, M. | An extensive evaluation of the Internets open proxies | Annual Computer Security Applications Conf. | Topology with BGP |
2018
| Traudt, M. Geddes, J. Wacek, C. Sherr, M. Syverson, P. | KIST: Kernel-informed socket transport for Tor | ACM Trans. on Privacy and Security (TOPS) | Topology with BGP |
2018
| Zhang, J.J. Wang, X.T. Liu, Y.J. Guok, C. Le, F. MacAuley, J. Newman, H. Yang, Y.R. | Fine-grained, multi-domain network resource abstraction as a fundamental primitive to enable high-performance, collaborative data sciences | Intl Conf. for High Performance Computing, Networking, Storage and Analysis | Topology with BGP |
2018
| Birkeland, K. McDaniel, T. Schuchard, M. | Withdrawing the BGP re-routing curtain: Understanding the security impact of BGP poisoning via real-world measurements | arxiv.org | Topology with BGP |
2018
| Pitoura, E. Terzi, E. Tsaparas, P. | Finding lasting dense subgraphs | Data Mining and Knowledge Discovery | Topology with BGP |
2018
| On interdisciplinary studies of physical information infrastructure | Research Methods for the Digital Humanities, Ch. 2 | Topology with BGP | |
2018
| Hlavacek, T. Herzberg, A. Schapira, M. Shulman, H. | Perfect is the enemy of good: Setting realistic goals for interdomain routing security | ACM Workshop on Hot Topics in Networks | Topology with BGP |
2018
| Pajevic, L. Bajpai, V. Ott, J. | Tracing the path to YouTube: A quantification of path lengths and latencies toward content caches | IEEE Communications Magazine | Topology with BGP |
2018
| Shulman, H. Waidner, M. | Internet as a source of randomness | ACM Workshop on Hot Topics in Networks | Topology with BGP |
2018
| Casas, P. | Distributed Internet paths performance analysis through machine learning | Network Traffic Measurement and Analysis Conf. (TMA) | Topology with BGP |
2018
| Lichtblau, F. Beverly, R. Max, A. F. Pelsser, C. Smaragdakis, G. Bush, R. | BGP communities: Even more worms in the routing can | Internet Measurement Conf. (IMC) | Topology with BGP |
2018
| Dunna, A. Gill, P. | Characterizing the deployment and performance of multi-CDNs | Internet Measurement Conference (IMC) | Topology with BGP |
2018
| Tozal, M. | Identifying critical autonomous systems in the Internet | J. of Supercomputing | Topology with BGP |
2018
| Nomikos, G. Kotronis, V. Sermpezise, P. Gigis, P. Manassakis, L. Dietzel, C. Konstantaras, S. Dimitropoulos, X. Giotsas, V. | O peer, where art thou?: Uncovering remote peering interconnections at IXPs | Internet Measurement Conf. (IMC) | Topology with BGP |
2018
| Chang, Q. Kulkarni, M. | D2P: Automatically creating distributed dynamic programming codes | Purdue Univ. | Topology with BGP |
2018
| Gramoli, V. Jourjon, G. | Impact of man-in-the-middle attacks on Ethereum | Symp. on Reliable Distributed Systems (SRDS) | Topology with BGP |
2018
| Asaeda, H. Dong, M. Ma, Z | Cooperative inter-domain cache sharing for information-centric networking via a bargaining game approach | IEEE Trans. on Network Science and Engineering | Topology with BGP |
2018
| Scott-Railton, J. McKune, S. Razzak, B.A. Deibert, R. | HIDE AND SEEK - Tracking NSO Group Pegasus spyware to operations in 45 countries | Univ. of Toronto | Topology with BGP |
2018
| Selcuk, A.A. | Server notaries: A complementary approach to the Web PKI trust model | IET Information Security | Topology with BGP |
2018
| Li, Z. Levin, D. Bhattacharjee, B. | Internet anycast: performance, problems, and potential | ACM SIGCOMM | Topology with BGP |
2018
| Stumptner, M. Mayer, W. Howard, C. Voigt, S. Philp, D. | Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awareness | Intl Conf. on Knowledge Science, Engineering and Management | Topology with BGP |
2018
| Jin, H. Hu, Y. C. Bailey, M. | Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control | IEEE/ACM Trans. on Networking | Topology with BGP |
2018
| Lu, C. Duan, H. Liu, Y. Li, Z. Hao, S. Yang, M. | Who is answering my queries: Understanding and characterizing interception of the DNS resolution path | USENIX Security Symp. | Topology with BGP |
2018
| BGP route leak prevention based on BGPsec | Vehicular Technology Conf. (VTC-Fall) | Topology with BGP | |
2018
| Chiesa, M. Canini, M. | Prelude: Ensuring inter-domain loop-freedom in SDN-enabled networks | Asia-Pacific Workshop on Networking | Topology with BGP |
2018
| Internet topology mining: From Big Data to Network Science | Univ. of Nevada, Reno | Topology with BGP | |
2018
| Schuchard, M. | Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing | IEEE Symp. on Security and Privacy | Topology with BGP |
2018
| Jansen, J. Vranken, H. | Resilience of the Domain Name System: A case study of the .nl-domain | Computer Networks | Topology with BGP |
2018
| Canbaz, M.A. Yuksel, M. Gunes, M.H. | On correlating ISP topologies to their businesses | Intl Conf. on Communications (ICC) | Topology with BGP |
2018
| Cuadrado, F. Uhlig, S. | Looking for hypergiants in PeeringDB | ACM SIGCOMM Computer Communication Review | Topology with BGP |
2018
| Yin, L. Wang, Z. Guo, Y. Fang, B. | Identifying the propagation sources of stealth worms | Intl Conf. on Computational Science | Topology with BGP |
2018
| Shrivastava, S. Ogan, K. Xin, Y. Baldin, I. | Evaluating path query mechanisms as a foundation for SDN network control | IEEE Conf. on Network Softwarization and Workshops (NetSoft) | Topology with BGP |
2018
| Network Science - Applications in technology, business and social media | Humboldt Univ. of Berlin | Topology with BGP | |
2018
| Vittorio, C.C. | Leveraging the nonuniform PSO network model as a benchmark for performance evaluation in community detection and link prediction | New J. of Physics | Topology with BGP |
2018
| Sadok, D.F.H. | A survey on efforts to evolve the control plane of inter-domain routing | MDPI J. | Topology with BGP |
2018
| Chow, T.W.S. Delvenne, J.C. | Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs | J. of Complex Networks | Topology with BGP |
2018
| Gramoli, V. Jourjon, G. | Double-spending risk quantification in private, consortium and public Ethereum blockchains | arxiv.org | Topology with BGP |
2018
| Delta hyperbolicity and the core-periphery structure in graphs | Lecture Notes in Social Networks (LNSN) | Topology with BGP | |
2018
| An architecture to manage incoming traffic of inter-domain routing using OpenFlow networks | Information | Topology with BGP | |
2018
| Li, L. Li, Y. | An empirical study on the privacy preservation of online social networks | IEEE Access | Topology with BGP |
2018
| Systems for characterizing Internet routing | Colorado State Univ. |
Topology with BGP UCSD Network Telescope |
|
2018
| Ocampo, R. Montes, I. Festin, C.A. | Efficient feature extraction for Internet data analysis using AS2Vec | ACM Symp. on Applied Computing | Topology with BGP |
2018
| Li, J. Tang, Y. An, B. Guan, X. | Protecting internet infrastructure against link flooding attacks: A techno-economic perspective | Information Sciences | Topology with BGP |
2018
| Drachsler-Cohen, D. Vanbever, L. Vechev, M. | Net2Text: query-guided summarization of network forwarding behaviors | USENIX Symp. on Networked Systems Design and Implementation (NSDI) | Topology with BGP |
2018
| Pintor, F. | Radiography of Internet autonomous systems interconnection in Latin America and the Caribbean | Computer Comm. | Topology with BGP |
2018
| Policy-preferred paths in AS-level Internet topology graphs | Theory and Applications of Graphs | Topology with BGP | |
2018
| Rad, T. Faloutsos, C. | Patterns and anomalies in k-cores of real-world graphs with applications | Knowledge and Information Systems | Topology with BGP |
2018
| Zhong, J. Chen, Z. Chen, B. | Optimal coupling patterns in interconnected communication networks | IEEE Trans. on Circuits and Systems | Topology with BGP |
2018
| Jia, Y. Ren, G. Liu, Y. | RISP: An RPKI-based inter-AS source protection mechanism | Tsinghua Science and Technology | Topology with BGP |
2018
| Bakhshaliyev, K. Gunes, M.H. | Router-level topologies of Autonomous Systems | Springer Proc. in Complexity | Topology with BGP |
2018
| Wang, J. Liu, S. Ma, X. Wang, H. | Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency | International Journal of Communication Systems | Topology with BGP |
2018
| Sun, Y. Johnson, A. Chiang, M. Mittal, P. | Tempest: Temporal dynamics in anonymity systems | arxiv.org | Topology with BGP |
2018
| Mani, S. K. Durairajan, R. Barford, P. Sommers, J. | Wrinkles in Time: Detecting Internet-wide Events via NTP | IFIP Networking Conference (IFIP Networking) and Workshops | Topology with BGP |
2018
| Wang, X. Lin, W. | Placement Strategy for Replicated Servers in CDN | Chinese Control Conf. (CCC) | Topology with BGP |
2018
| Doroud, H. Razaghpanah, A. Lutu, A. Vallina-Rodriguez, N. Gill, P. Widmer, J. | The cloud that runs the mobile Internet: A measurement study of mobile cloud services | Conf. on Computer Communications | Topology with BGP |
2018
| Alexander, D. Fontesca, E. Hoepers, C. Steeding-Jessen, K. Chaves, M. H. P. c. Cunha, I. Guedes, D. | The Evolution of Bashlite and Mirai IoT Botnets | IEEE Symp. on Computers and Communications (ISCC) | Topology with BGP |
2018
| Wilson-Brown, T. Jansen, R. Johnson, A. Sherr, M. | Understanding Tor Usage with Privacy-Preserving Measurement | Internet Measurement Conf. (IMC) | Topology with BGP |
2018
| Reducing third parties in the network through client-side intelligence | Columbia Univ. | Topology with BGP | |
2018
| Barton, A. Wright, M. | Guard Sets in Tor using AS Relationships | Proc. on Privacy Enhancing Technologies | Topology with BGP |
2018
| Rijswijk-Deij, R. V. de Boer, P. T. Pras, A. | Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google | Network Traffic Measurement and Analysis Conf. (TMA) | Topology with BGP |
2018
| Yagi, T. Akiyama, M. Shibahara, T. Mori, T. Goto, S. | DomainProfiler: toward accurate and early discovery of domain names abused in future | International Journal of Information Security () | Topology with BGP |
2018
| Cuadrado, F. Tyson, G. Castro, I. Uhlig, S. | Open connect everywhere: A glimpse at the Internet ecosystem through the lens of the Netflix CDN | arxiv.org | Topology with BGP |
2017
| Ma, L. Leung, K. K. Le, F. Kompella, S. Tassiulas, L. | How better is distributed SDN? An analytical approach | arxiv.org | Topology with BGP |
2017
| Taking back the Internet: Defeating DDoS and adverse network conditions via reactive BGP routing | Univ. of Tennessee | Topology with BGP | |
2017
| Agarwal, A. Chakravarty, S. Acharya, H.B. | The devils in the details: Placing decoy routers in the Internet | Computer Security Applications Conf. | Topology with BGP |
2017
| Bustamente, F. Steiner, M. | Cell spotting: Studying the role of cellular networks in the Internet | Internet Measurement Conf. (IMC) | Topology with BGP |
2017
| Chiu, Y. Hansen, R. Lu, H. Calder, M. Luckie, M. Lloyd, W. Choffnes, D. Katz-Bassett, E. | The record route option is an option! | Internet Measurement Conf. (IMC) | Topology with BGP |
2017
| Smaragdakis, G. Dietzel, C. Richter, P. Feldmann, A. Berger, A. | Inferring BGP blackholing activity in the Internet | Internet Measurement Conf. (IMC) | Topology with BGP |
2017
| Moore, C. Newman, M.E.J. | Random graph models for dynamic networks | Eur. Physical J. | Topology with BGP |
2017
| Lam, S.S. | Scalable verification of networks with packet transformers using atomic predicates | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2017
| Ermakova, T. Fabian, B. | A multilayer graph model of the Internet topology | zenodo.org | Topology with BGP |
2017
| Zolfaghari, H. Houmansadr, A. | The waterfall of liberty: Decoy routing circumvention that resists routing attacks | Conf. on Computer and Communications Security (SIGSAC) | Topology with BGP |
2017
| Nomikos, G. Manassakis, L. Mavrommatis, D. Dimitropoulos, X. | Shortcuts through colocation facilities | arxiv.org | Topology with BGP |
2017
| Scheitle, Q. Rudolph, B. Denis, C. Schriker, N. Carle, G. | The amplification threat posed by publicly reachable BACnet devices | J. of Cyber Security and Mobility | Topology with BGP |
2017
| Chakravarty, S. Gosain, D. | Few throats to choke: On the current structure of the Internet | Conf. on Local Computer Networks (LCN) | Topology with BGP |
2017
| Jin, H. Hu, Y. Bailey, M. | MiddlePolice: Fine-grained endpoint-driven in-network traffic control for proactive DDoS attack mitigation | arxiv.org | Topology with BGP |
2017
| Laszka, A. Procaccia, A. Vorobeychik, Y. Koutsoukos, X. | Monitoring stealthy diffusion | Knowledge and Information Systems | Topology with BGP |
2017
| Bakhshaliyev, K. Gunes, M. | Analysis of path stability within autonomous systems | Workshop on Measurement and Networking | Topology with BGP |
2017
| Lenzini, L. Luconi, V. | AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems | Computer Communications | Topology with BGP |
2017
| Performance evaluation and optimization of Content Delivery Networks | Julius-Maximilians-Univ. Wurzburg | Topology with BGP | |
2017
| April, T. Bailey, M. Bernhard, M. Bursztein, E. Cochran, J. Durumeric, Z. Halderman, J. Invernizzi, L. Kallitsis, M. Kumar, D. Lever, C. Ma, X. Mason, J. Menscher, D. Seaman, C. Sullivan, N. Thomas, K. Zhou, Y. | Understanding the Mirai botnet | USENIX Security Symp. | Topology with BGP |
2017
| Ivanov, A. Manco, F. Mendes, J. Volchkov, Y. Schmidt, F. Yasukata, K. Honda, M. Huici, F. | Unikernels everywhere: The case for elastic CDNs | Intl Conf. on Virtual Execution Environments (SIGPLAN) | Topology with BGP |
2017
| Carlsson, N. Shahmehri, N. | Collaborative framework for protection against attacks targeting BGP and edge networks | Computer Networks | Topology with BGP |
2017
| Francois, P. Aben, E. Mwangi, M. Goburdhan, N. Valera, F. | Four years tracking unrevealed topological changes in the African interdomain | Computer Communications | Topology with BGP |
2017
| Demmler, D. Schapira, M. Schneider, T. Segev, G. Shenker, S. Zohner, M. | Privacy-preserving interdomain routing at Internet scale | Proc. on Privacy Enhancing Technologies | Topology with BGP |
2017
| Scheitle, Q. Carle, G. | Push away your privacy: Precise user tracking based on TLS client certificate authentication | Network Traffic Measurement and Analysis Conf. | Topology with BGP |
2017
| MicroCuckoo hash engine for high-speed IP lookup | Virginia Polytechnic Inst. and State Univ. | Topology with BGP | |
2017
| Nomikos, G. Dimitropoulos, X. | Re-mapping the Internet: Bring the IXPs into play | arxiv.org | Topology with BGP |
2017
| Bush, R. Cunha, I. Katz-Bassett, E. Schmidt, T. Wahlisch, M. | Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering | arxiv.org | Topology with BGP |
2017
| Distributed optimization and data market design | California Inst. of Technology | Topology with BGP | |
2017
| Barton, A. Wright, M. | Forming guard sets using AS relationships | Proc. on Privacy Enhancing Technologies | Topology with BGP |
2017
| Donnet, B. | Towards a renewed alias resolution with space search reduction and IP fingerprinting | Network Traffic Measurement and Analysis Conf. (TMA) | Topology with BGP |
2017
| Gorinsky, S. | Ads versus regular contents: Dissecting the web hosting ecosystem | IFIP Networking Conf. | Topology with BGP |
2017
| Costa, L. d. F. Rodrigues, F. A. | Influence maximization on correlated networks through community identification | arxiv.org | Topology with BGP |
2017
| Navlakha, S. | Using inspiration from synaptic plasticity rules to optimize traffic flow in distributed engineered networks | Neural Computation | Topology with BGP |
2017
| Automatic classification of network entities | Charles Univ. | Topology with BGP | |
2017
| Characterization and monitoring of critical systems on national Internet | Tecnico Lisboa | Topology with BGP | |
2017
| Computing top-k closeness centrality in unweighted undirected graphs revisited | Kent State Univ. | Topology with BGP | |
2017
| Bi, J. Zhang, K. | A SDN-based framework for fine-grainedinter-domain routing diversity | Mobile Networks and Applications | Topology with BGP |
2017
| Huang, S. Cuadrado, F. Castro, T. Perta, V. Sathiaseelan, A. Uhlig, S. | Exploring HTTP header manipulation in-the-wild | Conf. on World Wide Web | Topology with BGP |
2017
| Autonomous system ranking by topological characteristics: A comparative study | IEEE Systems Conf. (SysCon) | Topology with BGP | |
2017
| Edmundson, A. Feamster, N. Chiang, M. Mittal, P. | Counter-RAPTOR: Safeguarding Tor against active routing attacks | arxiv.org | Topology with BGP |
2017
| Dimitropoulos, X. | Can SDN accelerate BGP convergence? A performance analysis of inter-domain routing centralization | arxiv.org | Topology with BGP |
2017
| Dan, G. | Distributed caching algorithms for interconnected operator CDNs | IEEE J. on Selected Areas in Communications | Topology with BGP |
2017
| Reischuk, R.M. Szalachowski, P. Kim, T.H. Perrig, A. | Authentication challenges in a global environment | ACM Trans. on Privacy and Security (TOPS) | Topology with BGP |
2017
| Cohen, A. Herzberg, A. Schapira, M. Shulman, H. | Are we there yet? On RPKIs deployment and security | The Network and Distributed System Security Symp. | Topology with BGP |
2017
| Gao, Y. Wu, W. Bu, J. Chen, C. Li, X. | Optimal monitor assignment for preferential link tomography in communication networks | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2017
| Goto, A. | Suspicious FQDN evaluation based on variations in malware download URLs | IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining | Topology with BGP |
2017
| Asahina, H. Haruta, S. Sasase, I. | Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination | Asia-Pacific Conference on Communications (APCC) | Topology with BGP |
2017
| Golen, E. Shenoy, N. | A modular architecture for scalable inter-domain routing | IEEE Computing and Communication Workshop and Conf. (CCWC) | Topology with BGP |
2017
| Achar, S. Camp, L. J. | Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies | Computers and Security | Topology with BGP |
2017
| On the Spectra of Scale-free and Small-World Networks | Telecom | Topology with BGP | |
2017
| Yang, B. Liu, J. Lu, Y. Zhu, K. | Forwarding degree-based AS relationship recognition algorithm | IEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC) | Topology with BGP |
2017
| Levin, D. Spring, N. Bhattacharjee, B. | Longitudinal analysis of root server anycast inefficiencies | Univ. of Maryland | Topology with BGP |
2017
| Fabian, B. | Inferring business relationships in the internet backbone | Intl J. of Networking and Virtual Organisations | Topology with BGP |
2017
| Schuchard, M. | POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States | ACM SIGSAC Conf. on Computer and Communications Security | Topology with BGP |
2017
| Wang, R. Chen, M. H. Chou, C. F. | ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networking | IEEE International Conference on Systems, Man, and Cybernetics (SMC) | Topology with BGP |
2017
| Varvello, M. Papagiannaki, K. | Mind the Gap Between HTTP and HTTPS in Mobile Networks | Intl Conf. on Passive and Active Network Measurement | Topology with BGP |
2017
| Aydin, M. N. | A country-specific analysis on internet interconnection ecosystems | Intl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) | Topology with BGP |
2017
| Towards a BitTorrent weather forecast | Univ. of Zurich | Topology with BGP | |
2017
| Rahman, M. A. U. | A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision | Intl J. of Scientific Research in Computer Science, Engineering and Information Technology | Topology with BGP |
2017
| Jaradat, Y. Maoud, M. Z. | Machine Learning Approach for Categorizing Internet Autonomous Systems Links | Intl Conf. on Green and Human Information Technology | Topology with BGP |
2016
| Vanbever, L. Le, F. Sousa, A. Rexford, J. | Scaling the Internet routing system through distributed route aggregation | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2016
| Pitoura, E. Terzi, E. Tsaparas, P. | Best friends forever (BFF): Finding lasting dense subgraphs | arxiv.org | Topology with BGP |
2016
| Dan, G. | Coordinated selfish distributed caching for peering content-centric networks | Trans. on Networking (TON) | Topology with BGP |
2016
| Xu, M. Li, Q. Yang, Y. | Measurement of large-scale BGP events: Definition, detection, and analysis | Computer Networks | Topology with BGP |
2016
| Investigating interdomain routing in the wild | Stony Brook Univ. | Topology with BGP | |
2016
| Meier, M. | Improved calculation of AS resilience against IP prefix hijacking | IEEE Conf. on Local Computer Networks Workshops (LCN Workshops) | Topology with BGP |
2016
| Casas, P. | Reverse traceroute with DisNETPerf, a distributed Internet paths performance analyzer | IEEE Conf. on Local Computer Networks (LCN) | Topology with BGP |
2016
| Casas, P. Donnet, B. Leduc, G. Mellia, M. | On the analysis of Internet paths with DisNETPerf, a distributed paths performance analyzer | IEEE Conf. on Local Computer Networks Workshops (LCN Workshops) | Topology with BGP |
2016
| Lau, S. Wahlisch, M. Roth, V. | Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection | Internet Measurement Conf. (IMC) | Topology with BGP |
2016
| Sperotto, A. van Rijswijk-Deij, R. Sadre, R. Pras, A. | Measuring the adoption of DDoS protection services | Internet Measurement Conf. (IMC) | Topology with BGP |
2016
| Terzi, E. Crovella, M. | Detecting unusually-routed ASes: Methods and applications | Internet Measurement Conf. (IMC) | Topology with BGP |
2016
| Choffnes, D. Mislove, A. | Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet | Internet Measurement Conf. (IMC) | Topology with BGP |
2016
| Liu, Y. Choffnes, D. Levin, D. Maggs, B.M. Mislove, A. Wilson, C. | Measuring and applying invalid SSL certificates: The silent majority | Internet Measurement Conf. (IMC) | Topology with BGP |
2016
| Chakraborty, A. Pal, S. Mukherjee, A. Naskar, M. | Non-autonomous dynamic network model involving growth and decay | Intl Conf. on Advanced Networks and Telecommunications Systems | Topology with BGP |
2016
| Alternative revenue sources for Internet service providers | Univ. Carlos III de Madrid | Topology with BGP | |
2016
| Durairajan, R. Barford, P. | Bigfoot: A geo-based visualization methodology for detecting BGP threats | IEEE Symp. on Visualization for Cyber Security (VizSec) | Topology with BGP |
2016
| Houmansadr, A. | Game of decoys: Optimal decoy routing through game theory | Conf. on Computer and Communications Security (SIGSAC) | Topology with BGP |
2016
| Jin, H. Hu, Y.C. Bailey, M. | MiddlePolice: Toward enforcing destination-defined policies in the middle of the Internet | Conf. on Computer and Communications Security (SIGSAC) | Topology with BGP |
2016
| Chung, T. Choffnes, D. Levin, D. Maggs, B. Mislove, A. Wilson, C. | Measurement and analysis of private key sharing in the HTTPS ecosystem | ACM SIGSAC Conf. on Computer and Communications Security | Topology with BGP |
2016
| Li, Z. Huang, X. Zhang, P. | Inferring the average as path length of the Internet | IEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC) | Topology with BGP |
2016
| Enumerating single destination, policy-preferred paths in AS-level Internet topology maps | IEEE Sarnoff Symp. | Topology with BGP | |
2016
| Korczynski, M. Ganan, C.H. Makita, G. Yoshioka, K. van Eeten, M. | Who gets the boot? Analyzing victimization by DDoS-as-a-Service | RAID : Intl Symp. on Research in Attacks, Intrusions, and Defenses | Topology with BGP |
2016
| Sereno, M. | LogNet: Extending Internet with a network aware discovery service | Inria-French Inst. for Research in Computer Science | Topology with BGP |
2016
| Agarwal, A. Acharya, H.B. Chakravarty, S. | Qi points: placing decoy routers in the internet | Indraprastha Inst. of Information Technology Delhi (IIITD) | Topology with BGP |
2016
| Shi, X. Yin, X. Wang, Z. | The power of prefix hijackings in the Internet hierarchy | IEEE Trustcom/BigDataSE/ISPA | Topology with BGP |
2016
| Towards an autonomous system monitor for mitigating correlation attacks in the Tor network | Kyoto Univ. | Topology with BGP | |
2016
| Gilad, Y. Herzberg, A. Schapira, M. | Jumpstarting BGP security with path-end validation | ACM SIGCOMM | Topology with BGP |
2016
| Resilience of the Domain Name System: A case study for .nl | Radboud Univ. | Topology with BGP | |
2016
| Bi, J. Zhang, K. Wu, Y. | A framework for fine-grained inter-domain routing diversity via SDN | Conf. on Ubiquitous and Future Networks (ICUFN) | Topology with BGP |
2016
| Ruan, L. | Computing customer cones of peering networks | Applied Networking Research Workshop | Topology with BGP |
2016
| Wegner, M. Lukarski, D. Meyerhenke, H. | Estimating current-flow closeness centrality with a multigrid Laplacian solver | arxiv.org | Topology with BGP |
2016
| Wang, X. Perrig, A. Zheng, Z. | Tumbler: Adaptable link access in the bots-infested Internet | Computer Networks | Topology with BGP |
2016
| Koo, H. Miramirkhani, N. Miraj F., Akoglu L., Gill P. | The politics of routing: Investigating the relationship between AS connectivity and Internet freedom | arxiv.org | Topology with BGP |
2016
| Wang, F. Gao, L. Fujikawa, K. Harai, H. | Distributed encoding for multiple-inherited locators to accommodate billions of objects in the Internet | IEEE Conf. on Distributed Computing Systems (ICDCS) | Topology with BGP |
2016
| Adversarial degradation of the availability of routing infrastructures and other Internet-scale distributed systems | Univ. of Minnesota | Topology with BGP | |
2016
| Hopper, N. | E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives | arxiv.org | Topology with BGP |
2016
| Determining the location of autonomous system relations among top tier Internet Service Providers in the United States | Univ. of Oregon | Topology with BGP | |
2016
| The role of topology and contracts in Internet content delivery | Univ. of Carlos III de Madrid | Topology with BGP | |
2016
| Distributed emulation in support of large networks | Naval Postgraduate School | Topology with BGP | |
2016
| Yagi, T. Akiyama, M. Shibahara, T. Yada, T. Mori, T. Goto, S. | DomainProfiler: Discovering domain names abused in future | Conf. on Dependable Systems and Networks | Topology with BGP |
2016
| Inter-domain traffic management in an evolving Internet peering ecosystem | Univ. Carlos III de Madrid | Topology with BGP | |
2016
| Mudrakarta, P.K. Kondor, R. | Multiresolution matrix compression | Conf. on Artificial Intelligence and Statistics | Topology with BGP |
2016
| Duan, H. Wang, Z. Liang, J. Li, X. | An accurate distributed scheme for detection of prefix interception | Science China Information Sciences | Topology with BGP |
2016
| Xu, M. Yang, Y. | Revolutionizing the inter-domain business model by information-centric thinking | IEEE Conf. on Communications (ICC) | Topology with BGP |
2016
| Goodrich, M.T. Lam, J. Mamano, N. Mitzenmacher, M. Torres, M. | Models and algorithms for graph watermarking | arxiv.org |
Topology with BGP Topology with Skitter |
2016
| Zhou, W. Gurney, A.J.T. Haeberlen, A. Sherr, M. Loo, B.T. | Private and verifiable interdomain routing decisions | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2016
| The Internet: A system of interconnected autonomous systems | IEEE Systems Conf. (SysCon) | Topology with BGP | |
2016
| Ricci, M.A. Donnet, B. Alvarez-Hamlin, J.I. | Unveiling the MPLS structure on Internet topology | Workshop on Traffic Monitoring and Analysis (TMA) | Topology with BGP |
2016
| Karsten, M. | On the feasibility of core-rooted path addressing | IEEE/IFIP Network Operations and Management Symp. (NOMS) | Topology with BGP |
2016
| Rami, P. Konstantin, K. | Comparative network analysis using KronFit | Complex Networks | Topology with BGP |
2016
| Estimating Internet-scale Quality of Service parameters for VoIP | Linkoping Univ. | Topology with BGP | |
2016
| Kloti, R. Rost, M. Georgopoulos, P. Ager, B. Schmid, S. Dimitropoulos, X. | Stitching inter-domain paths over IXPs | Symp. on SDN Research | Topology with BGP |
2016
| Elkhatib, Y. Rashid, A. Follis, K. Vidler, J. Race, N. Edwards, C. | It bends but would it break? Topological analysis of BGP infrastructures in Europe | IEEE European Symp. on Security and Privacy (EuroSP) | Topology with BGP |
2016
| Vissicchio, S. Lucente, P. Francois, P. | I cant get no satisfaction: Helping autonomous systems identify their unsatisfied interdomain interests | IEEE Trans. on Network and Service Management | Topology with BGP |
2016
| Antichi, G. Eberhardt, F. Eggert, L. Hasselmeyer, P. Hohlfeld, O. Honda, M. Ivanov, A. Kimmerlin, M. Klauck, S. Kommeri, J. Lettieri, G. Oechsner, S. Plauth, M. Raiciu, C. Ripke, A. Sarolahti, P. Schulte, L. Tsolakou, E. Wojcik, M. | Initial design of cloud infrastructure and federation mechanisms | SSICLOPS | Topology with BGP |
2016
| Accountability in distributed systems with incomplete information | Univ. of Pennsylvania | Topology with BGP | |
2016
| Analysis of the degree ranking stability in scale-free networks | Federal Univ. of Rio de Janeiro | Topology with BGP | |
2016
| Diaz-Perez, A. Morales-Luna, G. | Characterization and coarsening of Autonomous System networks: Measuring and simplifying the Internet | Advanced Methods for Complex Network Analysis | Topology with BGP |
2016
| Leveraging Internet background radiation for opportunistic network analysis | Univ. of California San Diego |
Topology with BGP UCSD Network Telescope |
|
2015
| Casas, P. Donnet, B. | Towards DisNETPerf: a distributed Internet paths performance analyzer | ACM CoNEXT Student Workshop | Topology with BGP |
2015
| Zhou, H. Chen, J. | OpenISMA: An approach of achieving a scalable OpenFlow network by identifiers separating and mapping | Symp. on Parallel Architectures, Algorithms and Programming (PAAP) | Topology with BGP |
2015
| Network operation system, network operation method and network operation program | Nec Corp. | Topology with BGP | |
2015
| Duan, H. Li, X. | Real-time system for detecting inter-domain routing man-in-the-middle attacks | J. of Tsinghua Univ. | Topology with BGP |
2015
| Understanding and defending against internet infrastructures supporting cybecrime operations | Georgia Inst. of Technology | Topology with BGP | |
2015
| Wu, D. Wang, Z. Shi, X. Wu, J. | DIMR: Disjoint Interdomain Multipath Routing | Computer Networks | Topology with BGP |
2015
| Grumberg, O. Nakibly, G. | Analyzing Internet routing security using model checking | Lecture Notes in Computer Science | Topology with BGP |
2015
| Papadopoulos, C. | Characterizing international BGP detours | Colorado State Univ. Technical Report | Topology with BGP |
2015
| Network designing system, network designing method, data transfer path determination method and network designing program | Nec Corp. | Topology with BGP | |
2015
| Schmidt, T.C. Steinbach, T. | On performance and robustness of Internet-based smart grid communication: A case study for Germany | Conf. on Smart Grid Communications (SmartGridComm) | Topology with BGP |
2015
| Jansen, R. Jaggard, A.D. Feigenbaum, J. Syverson, P. | Avoiding the Man on the Wire: Improving Tors security with trust-aware path selection | arxiv.org | Topology with BGP |
2015
| Toyoda, K. Sasase, I. | Fast target link flooding attack detection scheme by analyzing traceroute packets flow | Workshop on Information Forensics and Security (WIFS) | Topology with BGP |
2015
| Gilad, Y. Herzberg, A. Schapira, M. | One hop for RPKI, one giant leap for BGP security | Workshop on Hot Topics in Networks | Topology with BGP |
2015
| Bi, J. Fu, Y. Wang, Y. Xu, A. | MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN | Conf. on Network Protocols (ICNP) | Topology with BGP |
2015
| Inter-domain traffic management in and evolving Internet peering eco-system | Univ. Carlos III de Madrid | Topology with BGP | |
2015
| Korosi, A. Biro, J. Gulyas, A. | Deductive way of reasoning about the Internet AS level topology | Chin. Phys. B | Topology with BGP |
2015
| Efficient resources management in a distributed computer system, modeled as a dynamic complex system | Le Havre Univ. | Topology with BGP | |
2015
| Efficient resources management in a ditributed computer system, modeled as a dynamic complex system | Univ. du Havre | Topology with BGP | |
2015
| Duan, H. Wang, Z. Li, X. | Route leaks identification by detecting routing loops | Conf. on Security and Privacy in Communication Systems (SecureComm) | Topology with BGP |
2015
| Petropoulos, G. Burger, V. Seufert, M. Soursos, S. Stiller, B. | Augmenting home routers for socially-aware traffic management | Conf. on Local Computer Networks (LCN) | Topology with BGP |
2015
| Perdisci, R. Feamster, N. | ASwatch: An AS reputation system to expose bulletproof hosting ASes | ACM SIGCOMM Computer Communication Review | Topology with BGP |
2015
| Gong, J. | Multipath inter-domain routing for named data networking | J. on Communications | Topology with BGP |
2015
| Xu, M. Yang, Y. Li, Q. Wang, Y. Li, Q. Ohlman, B. Chen, M. | Joint optimization of content replication and traffic engineering in ICN | Conf. on Local Computer Networks (LCN) | Topology with BGP |
2015
| Schlinker, B. Radhakrishnan, A.B. Katz-Bassett, E. Govindan, R. | Are we one hop away from a better Internet? | Internet Measurement Conf. (IMC) | Topology with BGP |
2015
| Niaz, H. Choffnes, D. Cunha, I. Gill, P. Katz-Bassett, E. | Investigating interdomain routing policies in the wild | Internet Measurement Conf. (IMC) | Topology with BGP |
2015
| Sarac, K. | An experimental study on inter-domain routing dynamics using IP-level path traces | Conf. on Local Computer Networks (LCN) | Topology with BGP |
2015
| Bi, J. | DISCS: A DIStributed Collaboration System for inter-AS spoofing defense | Intl Conf. on Parallel Processing (ICPP) | Topology with BGP |
2015
| Decision-centric foundations for complex systems engineering and design | Purdue Univ. | Topology with BGP | |
2015
| Szalachowski, P. Barrera, D. Perrig, A. Lee, H. Watrin, D. | Bootstrapping real-world deployment of future Internet architectures | arxiv.org | Topology with BGP |
2015
| Tahboub, R. | Internet scale DoS attacks | Intl J. of Applied Mathematics, Electronics and Computers | Topology with BGP |
2015
| Kotronis, V. Ager, B. Dimitropoulos, X. | Policy-compliant path diversity and bisection bandwidth | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2015
| Kendler, A. Zohar, A. Goldberg, S. | Eclipse attacks on bitcoins peer-to-peer network | Usenix Security Symp. | Topology with BGP |
2015
| Coudert, D. Lancin, A. | On computing the Gromov hyperbolicity | J. of Experimental Algorithmics | Topology with BGP |
2015
| Dragan, F.F. | Metric tree-like structures in real-world networks: an empirical study | Networks |
Topology with BGP Topology with Skitter |
2015
| Ruan, L. | A machine learning approach to edge type prediction in Internet AS graphs | Iowa State Univ. | Topology with BGP |
2015
| Asano, Y. Yoshikawa, M. | Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor | Conf. on Advanced Communication Technology (ICACT) | Topology with BGP |
2015
| Glacet, C. Hanusse, N. Ilcinkas, D. | Brief announcement: Routing the Internet with very few entries | Symp. on Principles of Distributed Computing (PODC) | Topology with BGP |
2015
| Evaluating the limits of network topology inference via virtualized network emulation | Naval Postgraduate School | Topology with BGP | |
2015
| Reischuk, R.M. Szalachowski, P. Kim, T.H.-J. Perrig, A. | Designing a global authentication infrastructure | arxiv.org | Topology with BGP |
2015
| Glacet, C. Hanusse, N. Ilcinkas, D. | Routing the Internet with fifteen entries | Meeting on Algorithmic Aspects of Telecommunications (ALGOTEL) | Topology with BGP |
2015
| BGP routing security and deployment strategies | Univ. of Amsterdam | Topology with BGP | |
2015
| Thai, M.T. | Network under joint node and link attacks: Vulnerability assessment methods and analysis | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2015
| Matsumoto, S. Perrig, A. | ECO-DNS: Expected consistency optimization for DNS | Intl. Conf. on Distributed Computing Systems (ICDCS) | Topology with BGP |
2015
| Chen, X. Fu, X. | AS path inference: From complex network perspective | Networking Conf. (IFIP) | Topology with BGP |
2015
| Measuring routing policies on the Internet | Stony Brook Univ. | Topology with BGP | |
2015
| Oh, J.C. | A node-centric reputation computation algorithm on online social networks | Applications of Social Media and Social Network Analysis | Topology with BGP |
2015
| Fazzion, E. Cunha, I. Las-Casas, P. Guedes, D. Meira, W. Hoepers, C. Steding-Jessen, K. Chaves, M.H.P.C. | A spam traffic cost analysis for network operators | Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) | Topology with BGP |
2015
| Giovannetti, E. | Predicting internet commercial connectivity wars: The impact of trust and operators asymmetry | Intl J. of Forecasting | Topology with BGP |
2015
| Rohrer, J. | Graph reduction for emulated network experimentation | Naval Postgraduate School | Topology with BGP |
2015
| Francois, P. Aben, E. | On the diversity of interdomain routing in Africa | Lecture Notes in Computer Science (LNCS) | Topology with BGP |
2015
| Kaneko, K. Taraoka, F. | Performance evaluation of host-based mobility management schemes in the Internet | Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU) | Topology with BGP |
2015
| Cui, W. Xiao, Y. Tong, H. | Robust network construction against intentional attacks | Conf. on Big Data and Smart Computing (BIGCOMP) | Topology with BGP |
2015
| Arakawa, S. Murata, M. | A provider and peer selection policy for the future sustainable internet | Intl J. of Management and Network Economics | Topology with BGP |
2015
| Centralizing routing control across domains: Architectural approach and prominent use cases | ETH Zurich | Topology with BGP | |
2015
| Holder, L. | Scalable anomaly detection in graphs | Intelligent Data Analysis | Topology with BGP |
2015
| Design of a scalable path service for the Internet | Univ. of Kentucky | Topology with BGP | |
2015
| Evolution of the Internet topology from a regional perspective | Univ. of Arizona | Topology with BGP | |
2014
| Bikfalvi, A. Oliver, M. | Mercury: Revealing hidden interconnections between access ISPs and content providers | EUNICE | Topology with BGP |
2014
| Lazos, L. | Network anomaly detection using autonomous system flow aggregates | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with BGP |
2014
| Kamil, Sarac | Measuring path divergence in the Internet | Conf. on Performance Computing and Communications (IPCCC) | Topology with BGP |
2014
| The economics of internet peering interconnections | Georgia Inst. of Technology | Topology with BGP | |
2014
| Carlsson, N. Shahmehri, N. | PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based security | ACM Workshop on Information Sharing and Collaborative Security | Topology with BGP |
2014
| Lam, S.S. | Collaborative verification of forward and reverse reachability in the Internet data plane | IEEE Conf. on Network Protocol (ICNP) | Topology with BGP |
2014
| Scaling the Internet routing system through route aggregation | Tecnico Lisboa | Topology with BGP | |
2014
| Panchal, J. | Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode | Conf. on Systems, Man, and Cybernetics (SMC) | Topology with BGP |
2014
| Szabo, D. Gulyas, A. Korosi, A. Tapolcai, J. | An information-theoretic approach to routing scalability | Workshop on Hot Topics in Networks (HotNets) | Topology with BGP |
2014
| Kotronis, V. Dimitropoulos, X. | Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework | SIGCOMM Computer Communication Review | Topology with BGP |
2014
| Holder, L. | A partitioning approach to scaling anomaly detection in graph streams | Intl. Conf. on Big Data | Topology with BGP |
2014
| Aura, T. Sarela, M. | Denial-of-service attacks in bloom-filter-based forwarding | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2014
| Dai, X. Bensaou, B. | Content peering in content centric networks | IEEE Conf. on Local Computer Networks | Topology with BGP |
2014
| Griffioen, J. | Supporting application-based route selection | Conf. on Computer Communication and Networks (ICCCN) | Topology with BGP |
2014
| Tiered based addressing in internetwork routing protocols for the future Internet | Rochester Inst. of Technology | Topology with BGP | |
2014
| Peng, W. Su, J. Wang, Z. | Assessing the impact of cascading failures on the interdomain routing system of the Internet | New Generation Computing | Topology with BGP |
2014
| Wright, M. | Dovetail: stronger anonymity in next-generation Internet routing | Symp. on Privacy Enhancing Technologies (PETS) | Topology with BGP |
2014
| Schapira, M. Hummon, P. Rexford, J. | How secure are secure interdomain routing protocols? | Computer Networks | Topology with BGP |
2014
| Massey, D. Papadopoulos, C. | Incremental deployment strategies for effective detection and prevention of BGP origin hijacks | Conf. on Distributed Computing Systems (ICDCS) | Topology with BGP |
2014
| Gorinsky, G. | Economics of traffic attraction by transit providers | IFIP Networking Conf. | Topology with BGP |
2014
| Calvert, K.L. Griffioen, J.N. | On the scalability of interdomain path computations | Networking Conf. (IFIP) | Topology with BGP |
2014
| Bernardo, L. Pinto, P.F. | Multipath policy routing for the inter-domain scenario | Intl Conf. on Communications (ICC) | Topology with BGP |
2014
| Liu, Y. Li, J. Wu, J. | CCOF: Congestion control on the fly for inter-domain routing | Workshop on Local and Metropolitan Area Networks (LANMAN) | Topology with BGP |
2014
| Li, J. Liu, Y. Li, D. Wu, J. | TED: Inter-domain traffic engineering via deflection | Symp. of Quality of Service (IWQoS) | Topology with BGP |
2014
| Moors, T. | Disjoint-path selection in Internet: What traceroutes tell us? | arxiv.org | Topology with BGP |
2014
| Wang, H. Yang, J. Li, C. | A value based framework for provider selection of regional ISPs | Symp. on Network Operations and Management (NOMS) |
Topology with BGP Topology with Skitter |
2014
| Thomo, A. | Semantic graph compression with hypergraphs | Conf. on Advanced Information Networking and Applications (AINA) | Topology with BGP |
2014
| Tree-like structure in graphs and embedability to trees | Kent State Univ. | Topology with BGP | |
2014
| Keating, A. Khan, R.H. | Models and tools for the high-level simulation of a name-based interdomain routing architecture | Computer Communications Workshops (INFOCOM WKSHPS) | Topology with BGP |
2014
| Panchal, J.H. | Estimating local decision-making behavior in complex evolutionary systems | J. of Mechanical Design | Topology with BGP |
2014
| Tavernier, W. Colle, D. Pickavet, M. Demeester, P. | Availability analysis of resilient geometric routing on Internet topology | Conf. on Design of Reliable Communication Networks (DRCN) | Topology with BGP |
2014
| Gorinsky, S. Dovrolis, C. Sitaraman, R.K. | Trade-offs in optimizing the cache deployments of CDNs | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2014
| Fhoffnes, D.R. Potharaju, R. Chen, Y. Bustamante, F.E. Pei, D. Zhao, Y. | Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users | IEEE Trans. on Computers | Topology with BGP |
2014
| Buob, M.-O. Auge, J. Baynat, B. Ross, D. Friedman, T. | Violation of interdomain routing assumptions | Passive and Active Measurement (PAM) | Topology with BGP |
2014
| Johnson, B. Grossklags, J. Felegyhazi, M. | Estimating systematic risk in real-world networks | Conf. on Financial Cryptography and Data Security | Topology with BGP |
2014
| Zhang, B. | Making inter-domain routing power-aware? | Conf. on Computing, Networking and Communications (ICNC) | Topology with BGP |
2014
| Wong, E.L. Shmatikov, V. | No direction home: The true cost of routing around decoys | Network and Distributed System Security Symp. (NDSS) | Topology with BGP |
2014
| Wu, J. Xia, Y. Tse, C.K. | Traffic congestion in interconnected complex networks | arxiv.org | Topology with BGP |
2014
| Herzberg, A. Gev, Y. | Bandwidth Distributed Denial of Service: Attacks and defenses | IEEE Security and Privacy | Topology with BGP |
2013
| Kang, M.S. Gligor, V.D. | CoDef: Collaborative defense against large-scale link-flooding attacks | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2013
| Durairajan, R. Barford, P. | RiskRoute: A framework for mitigating network outage threats | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2013
| Holder, L. | Incremental anomaly detection in graphs | Conf. on Data Mining Workshops | Topology with BGP |
2013
| Massey, D. | Characterizing vulnerability to IP hijack attempts | IEEE Conf. on Technologies for Homeland Security (HST) | Topology with BGP |
2013
| Aditya, P. Chen, A. Lin, Y. Haeberlen, A. Druschel, P. Maggs, B. Wishon, B. Ponec, M. | Peer-assisted content distribution in Akamai NetSession | Internet Measurement Conf. (IMC) | Topology with BGP |
2013
| Theodoridis, G. Tzovaras, D. | BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies | Visualization for Cyber Security (VizSec) | Topology with BGP |
2013
| Perez, A.G. Siaterlis, C. | Recreating a large-scale BGP incident in a realistic environment | Information Sciences and Systems , Proc Symp. on Computer and Information Sciences | Topology with BGP |
2013
| Gorinsky, S. | An economic perspective on traffic attraction by Internet transit providers | IEEE Conf. on Network Protocols (ICNP) | Topology with BGP |
2013
| Kim, S.H. Wang, Q.-H. | Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack | Hong Kong Univ. of Science and Technology |
Topology with BGP UCSD Network Telescope |
2013
| Mannor, S. Orda, A. | Network formation games and the Internet structure | arxiv.org | Topology with BGP |
2013
| Rescorla, E. Shacham, H. Savage, S. | Measuring the practical impact of DNSSEC deploymen | Usenix Security Conf. (SEC) | Topology with BGP |
2013
| Oh, J.C. | A model for recursive propagations of reputations in social networks | IEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM) | Topology with BGP |
2013
| Wang, Z. Zhang, L. | An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system | Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA) | Topology with BGP |
2013
| Rafique, M.Z. Caballero1, J. | Driving in the cloud: An analysis of drive-by download operations and abuse reporting | Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) | Topology with BGP |
2013
| Peng, W. Su, J. Wang, Z. | Assessing survivability of inter-domain routing system under cascading failures | Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC) | Topology with BGP |
2013
| Kahlon, K.S. Sharma, S. | Inter-domain routing with shielded infrastructure and buzzer technique | Intl J. of Computer Applications | Topology with BGP |
2013
| Dan, G. | Stable content-peering of autonomous systems in a content-centric network | Swedish National Computer Networking Workshop (SNCNW) | Topology with BGP |
2013
| Gojmerac, I. Rougier, J.-L. | IDRD: Enabling inter-domain route diversity | IEEE Conf. on Communications (ICC) | Topology with BGP |
2013
| Performance evaluation and optimization of content distribution using overlay networks | Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE | Topology with BGP | |
2013
| Dovetail: stronger anonymity in next-generation Internet routing | Univ. Texas, Arlington, TX, US | Topology with BGP | |
2013
| Luo, J. Li, W. Lu, Y. | Constraint conditions to eliminate AS incentive of lying in interdomain routing | Symp. on Integrated Network Management (IM) | Topology with BGP |
2013
| Kim, T.H. Yoo, S. Zhang, X. Lee, S.B. Gligor, V. Perrig, A. | STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment | ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) | Topology with BGP |
2013
| Dan, G. | Content-peering dynamics of autonomous caches in a content-centric network | IEEE INFOCOM | Topology with BGP |
2013
| Shavitt, Y. Zilberman, N. | Improving AS relationship inference using PoPs | IEEE INFOCOM | Topology with BGP |
2013
| Miyachi, T. Taenaka, Y. Hazeyama, H. | PhishCage: reproduction of fraudulent websites in the emulated Internet | ICST Conf. on Simulation Tools and Techniques (SimuTools) | Topology with BGP |
2013
| Miyachi, T. | COSMO - Emulation of Internet traffic (poster abstract) | ICST Conf. on Simulation Tools and Techniques (SimuTools) | Topology with BGP |
2013
| Miwa, S. | Design and implementation of XBurner | ICST Conf. on Simulation Tools and Techniques (SimuTools) | Topology with BGP |
2013
| de Donato, W. Pescape, A. | Detecting third-party addresses in traceroute traces with IP timestamp option | Passive and Active Measurement (PAM) | Topology with BGP |
2013
| Garcia-Martinez, A. Bagnulo, M. Valera, F. | BGP-XM: BGP eXtended multipath for transit Autonomous Systems | Computer Networks | Topology with BGP |
2013
| Hasegawa, G. Kamei, S. Murata, M. | A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement | IEICE Trans. on Information and Systems | Topology with BGP |
2013
| Peng, W. Su, J. | A study of IP prefix hijacking in cloud computing networks | Security Comm. Networks | Topology with BGP |
2013
| Yang, J. Wang, H. | Experimental study on diversity and novelty of interdomain paths | Chinese J. of Electronics | Topology with BGP |
2013
| Oliver, M. Infante, J. Oechsner, S. Bikfalvi, A. | The impact of content delivery networks on the Internet ecosystem | J. of Information Policy | Topology with BGP |
2013
| Improving IP-based geo-location through Internet topology and geospatial datasets | Duke Univ., Durham, NC, US | Topology with BGP | |
2013
| Koppula, H.S. Gummadi, K.P. Druschel, P. Bhattacharjee, B. | An empirical validation of growth models for complex networks | Dynamics On and Of Complex Networks | Topology with BGP |
2013
| Gomez, S. Arenas, A. | On the routability of the Internet | Dynamics On and Of Complex Networks | Topology with BGP |
2013
| Complex networks under attacks: Vulnerability assessment and optimization | Florida Univ. | Topology with BGP | |
2013
| Toh, W.S.B. Teow, L.N. | Efficient extraction of high-Betweenness vertices from heterogeneous networks | The Influence of Technology on Social Network Analysis and Mining, Ch. 11 | Topology with BGP |
2012
| Katsaros, K. Xylomenos, G. | Cloud computing for global name-resolution in information-centric networks | IEEE Symp. on Network Cloud Computing and Applications (NCCA) | Topology with BGP |
2012
| Wahlisch, M. Schmidt, T.C. | Exploring reachability via settlement-free peering | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2012
| Investigating the mutual impact of the P2P overlay and the AS-level underlay | Univ. Oregon, Eugene, OR, US | Topology with BGP | |
2012
| Geddes, J. Thompson, C. Hopper, N. | Routing around decoys | ACM Conf. on Computer and Communications Security (CCS) | Topology with BGP |
2012
| Shen, Y. Thai, M.T. | An efficient spectral bound for link vulnerability assessment in large-scale networks | IEEE Military Communications Conf. (MILCOM) | Topology with BGP |
2012
| Guha, R. | A tale of nine Internet exchange points: studying path latencies through major regional IXPs | IEEE Conf. on Local Computer Networks (LCN) | Topology with BGP |
2012
| Wang, H. Yang, J. | Flattening and preferential attachment in the Internet evolution | Network Operations and Management Symp. (APNOMS) | Topology with BGP |
2012
| Protecting anonymity in the presence of autonomous system and internet exchange level adversaries | Univ. Illinois, Urbana-Champaign | Topology with BGP | |
2012
| Couderty, D. Lancin, A. | Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs | Project-Team MASCOTTE, INRIA | Topology with BGP |
2012
| Lehrieder, F. Hossfeld, T. Seedorf, J. | Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms | Teletraffic Congress (ITC) | Topology with BGP |
2012
| Inter-domain incentives and Internet architecture | Aalto Univ., FI | Topology with BGP | |
2012
| Labatut, V. Cherifi, H. | Comparative evaluation of community detection algorithms: a topological approach | J. Stat. Mechanics: Theory and Experiment | Topology with BGP |
2012
| Kurant, M. Markopoulou, A. | 2.5K-graphs: from sampling to generation | arxiv.org | Topology with BGP |
2012
| Batalla, J.M. Chai, W.K. Sliwinski, J. | Multi-criteria decision algorithms for efficient content delivery in content networks | Ann. Telecommunications | Topology with BGP |
2012
| Chatzis, N. Feldmann, A. Sarrar, N. Uhlig, S. Willinger, W. | Anatomy of a large European IXP | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications | Topology with BGP |
2012
| Kim, D. Mahalingam, S. Tang, A. Wang, S. Ratnasamy, S. | Netcalls: End host function calls to network traffic processing services | UC Berkeley | Topology with BGP |
2012
| Tazaki, H. Harai, H. | Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network | Symp. on Applications and the Internet (SAINT) | Topology with BGP |
2012
| Guha, R. | Evaluating end-user network benefits of peering with path latencies | IEEE Conf. on Computer Communications and Networks (ICCCN) | Topology with BGP |
2012
| Weisser, M.-A. | The inter-domain hierarchy in measured and randomly generated AS-level topologies | IEEE Conf. on Communications (ICC) | Topology with BGP |
2012
| Tiago Quelhas, T. | A theory for the connectivity discovered by routing protocols | IEEE/ACM Trans. on Networking (TON) | Topology with BGP |
2012
| Models for the simulation of a name-based interdomain routing architecture | Aalto Univ., FI | Topology with BGP | |
2012
| Kim, T. Yoo, S. Zhang, X. Lee, S.B. Gligor, V.D. Perrig, A. | Sanctuary trail: refuge from Internet DDoS entrapment | Carnegie Mellon Univ. | Topology with BGP |
2012
| Muhlbauer, W. Yang, Y. Zhu, P. Lu, X. Plattner, B. | Shedding light on the use of AS relationships for path inference | J. Communications and Networks | Topology with BGP |
2012
| Optimizing implicit proxy placement to evade traffic filters | Princeton Univ. | Topology with BGP | |
2012
| Karlin, J. Schapira, M. Rexford, J. | Optimizing the placement of implicit proxies | Princeton Univ. | Topology with BGP |
2012
| Sarac, K. | Estimating network layer subnet characteristics via statistical sampling | IFIP TC 6 Networking Conf. | Topology with BGP |
2012
| Security and economic implications of localizing traffic in overlay networks | Purdue Univ. | Topology with BGP | |
2012
| Donnet, B. | On the dynamics of locators in LISP | Networking | Topology with BGP |
2012
| Tuncer, H. Shenoy, N. | ISP tiered model based architecture for routing scalability | IEEE Conf. on Communications (ICC) | Topology with BGP |
2012
| Su, J. Chang, R.K.C. | LDC: Detecting BGP prefix hijacking by load distribution change | Parallel and Distributed Processing Symp. Workshops (IPDPSW) | Topology with BGP |
2012
| Gorinsky, S. | Obscure giants: detecting the provider-free ASes | Networking | Topology with BGP |
2012
| Basuchowdhuri, P. Majumder, S. | Spread of information in a social network using influential nodes | Advances in Knowledge Discovery and Data Mining | Topology with BGP |
2012
| He, D. Psaras, I. Pavlou, G. | Cache less for more in information-centric networks | Networking | Topology with BGP |
2012
| Verdi, F.L. Magalhaes, M.F. | Towards local routing state in the future internet | WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) | Topology with BGP |
2012
| Hu, X. Zhao, D. Lu, X. | Failure isolation based defense against Internet CXPST-like attack | J. Hybrid Information Technology | Topology with BGP |
2012
| Perkins, C. | Harnessing Internet topological stability in Thorup-Zwick compact routing | IEEE INFOCOM | Topology with BGP |
2012
| Le, F. | A fresh look at inter-domain route aggregation | IEEE INFOCOM | Topology with BGP |
2012
| Basu, P. Towsley, D. | Multiple random walks to uncover short paths in power law networks | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) | Topology with BGP |
2012
| Yang, J. Liu, Z. Wang, H. Zhang, B. Zhang, W. | AMIR: Another multipath interdomain routing | IEEE Conf. on Advanced Information Networking and Applications (AINA) | Topology with BGP |
2012
| Bagnulo, M. Stanojevic, R. | An economic side-effect for prefix deaggregation | IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) | Topology with BGP |
2012
| Rossberg, M. Schaefer, G. | Automatic creation of VPN backup paths for improved resilience against BGP-attackers | ACM Symp. on Applied Computing (SAC) | Topology with BGP |
2012
| Yang, J. Wang, H. Zhang, B. Gao, L. Liu, Z. | Multipath interdomain routing via deviation from primary path | Conf. on Information Networking (ICOIN) | Topology with BGP |
2012
| Hofmeyr, S. Stelle, G. Forrest, S. | Internet topology over time | arxiv.org | Topology with BGP |
2012
| Yingjie, X. Yabo, D. | ASTVA: DDoS-limiting architecture for Next Generation Internet | Adv. Materials Research | Topology with BGP |
2012
| Le Merrer, E. Li, Z. Yaning Liu, Y. Simon, G. | OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV | Computer Networks | Topology with BGP |
2011
| Can we study the topology of the Internet from the vantage points of large and small content providers? | Youngstown State Univ. | Topology with BGP | |
2011
| Peng, W. Su, J. | Study on IP prefix hijacking in cloud computing networks based on attack planning | Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom) | Topology with BGP |
2011
| Yu, L. Bai, H. | Two propositions about geographical distributions of BitTorrent file resources | Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE) | Topology with BGP |
2011
| Ishibashi, K. | Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic | Conf. on Network Games, Control and Optimization (NetGCooP) | Topology with BGP |
2011
| Markopoulou, A. | Towards unbiased BFS sampling | IEEE J. Selected Areas in Communications | Topology with BGP |
2011
| Kurant, M. Butts, C.T. Markopoulou, A. | Practical recommendations on crawling online social networks | IEEE J. Selected Areas in Communications | Topology with BGP |
2011
| Li, Y. Liu, Y.-J. Su, J.-S. | Analysis of prefix hijacking based on AS hierarchical model | Conf. on Network and System Security (NSS) | Topology with BGP |
2011
| Multi-path inter-domain routing: The impact on BGPs scalability, stability and resilience to link failures | Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam | Topology with BGP | |
2011
| Anunziata, D. Beiro, M.G. Barrat, A. DallAsta, L. Vespignani, A. | http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) | Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires | Topology with BGP |
2011
| Shmatikov, V. | Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing | Conf. on Dependable Systems and Networks (DSN) | Topology with BGP |
2011
| Mooney, G. Perkins, C. | Compact routing on the Internet AS-graph | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2011
| Dai, B. Zhu, P. Su, J. | Whom to convince? It really matters in BGP prefix hijacking attack and defense | Future Information Technology | Topology with BGP |
2011
| Yuksel, M. Gunes, M.H. | On the scalability of path exploration using opportunistic path-vector routing | IEEE Conf. on Communications (ICC) | Topology with BGP |
2011
| Interactive visualization of global routing dynamics | Technische Univ. Muenchen, Faculty of Informatics | Topology with BGP | |
2011
| Silva, E. Bernardo, L. Pinto, P. | Inter-domain traffic engineering using an AS-level multipath routing architecture | IEEE Conf. on Communications (ICC) | Topology with BGP |
2011
| Kitisin, S. Gertphol, S. | A study of autonomous system relationships within Thailand | Conf. on Computer Science and Software Engineering (JCSSE) | Topology with BGP |
2011
| Analysis of cooperative management strategies against route-hijacking | IFIP/IEEE Symp. on Integrated Network Management (IM) |
Topology with BGP Topology with Skitter |
|
2011
| Greiner, M. | Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics | EPL (Europhysics Letters) |
Topology with BGP Topology with Skitter |
2011
| Karaliopoulos, M. Muehlbauer, W. Zhu, P. Lu, X. Plattner, B. | k-Fault tolerance of the Internet AS graph | Computer Networks | Topology with BGP |
2011
| Zhu, P. Xiong, N. Xiao, Y. Xiaofeng, H. | How resilient are individual ASes against AS-level link failures? | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2011
| Kvizhinadze, G. | Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies | Statistics and Probability Letters | Topology with BGP |
2011
| Hackett, A. Porter, M.A. Mucha, P.J. Gleeson, J.P. | The unreasonable effectiveness of tree-based theory for networks with clustering | Phys. Rev. E |
Topology with BGP Topology with Skitter |
2011
| Gorinsky, S. | Impact of prefix hijacking on payments of providers | Conf. on Communication Systems and Networks (COMSNETS) | Topology with BGP |
2010
| Bofeng, Z. Fei, W. Jinshu, S. | Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system | J. of Next Generation Information Technology | Topology with BGP |
2010
| Magharei, N. Rejaie, R. Willinger, W. | Eyeball ASes: from geography to connectivity | Internet Measurement Conf. (IMC) | Topology with BGP |
2010
| Zhao, J. Wang, X. | Trading bandwidth for playback lag: Can active peers help? | Multi-media Conf. | Topology with BGP |
2010
| Schapira, M. Hummon, P. Rexford, J. | How secure are secure interdomain routing protocols? | ACM SIGCOMM Computer Communication Review | Topology with BGP |
2010
| Esaki, H. | Towards interdomain transit traffic reduction in peer-assisted content delivery networks | Symp. on Telecommunications Network Strategy and Planning (NETWORKS) | Topology with BGP |
2010
| Esaki, H. | Estimating AS relationships for application-layer traffic optimization | Workshop on Incentives, Overlays, and Economic Traffic Control (ETM) | Topology with BGP |
2010
| Impact of topology on BGP convergence | Dept. Computer Science, VU Univ. Amsterdam | Topology with BGP | |
2010
| Wang, N. Tafazolli, R. Moessner, K. | Policy-aware virtual relay placement for inter-domain path diversity | IEEE Symp. on Computers and Communications (ISCC) | Topology with BGP |
2010
| Toh, W.S.B. Teow, L.N. | Efficient extraction of high-betweenness vertices | Conf. on Advances in Social Networks Analysis and Mining (ASONAM) | Topology with BGP |
2010
| Rougier, J. Secci, S. | Characterisation of AS-level path deviations and multipath in Internet routing | EURO-NF Conf. on Next Generation Internet (NGI) | Topology with BGP |
2010
| Novak, R. Kandus, G. | The impact of network topology on the performance of MAP selection algorithms | Computer Networks | Topology with BGP |
2010
| Antikainen, M. | Canopy: publish/subscribe with upgraph combination | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2010
| Incentive-informed inter-domain multicast | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP | |
2010
| Chen, K. Chen, Y. Liu, B. | Evaluating potential routing diversity for internet failure recovery | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2010
| Wang, X-G Zhang, S-Y | Robustness of networks against cascading failures | Physica A: Statistical Mechanics and its Applications | Topology with BGP |
2010
| Du, F. Wu, T-J | Partially ordered sets in complex networks | J. Phys. A: Math. Theor. | Topology with BGP |
2010
| Merindol, P. Donnet, B. Bonaventura, O. | Extracting intra-domain topology from mrinfo probing | Passive and Active Measurement (PAM) | Topology with BGP |
2010
| Stone, A. Strout, M. Massey, D. | Simulating internet scale topologies with metarouting | Colorado State Univ. | Topology with BGP |
2010
| Hu, C. Zhang, W. Chen, Y. Liu, B. | On the eyeshots of BGP vantage points | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with BGP |
2010
| Ganhao, F. Assuncao, C. Bernardo, L. Pinto, P. | Scalable multi-region routing at inter-domain level | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with BGP |
2010
| Bofeng, Z. Fei, W. Jinshu, S. | A study of hinge-transmit property of BGP routing system | Forum on Computer Science-Technology and Applications (IFCSTA) | Topology with BGP |
2009
| Perkins, C. | Deterministic, reduced-visibility inter-domain forwarding | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2009
| Sarela, M. Visala, K. Riihijarvi, J. | Inter-domain rendezvous service architecture | PSIRP (TR09-003) | Topology with BGP |
2009
| Eliassi-Rad, T. | Continuous time group discovery in dynamic graphs | Workshop on Analyzing Networks and Learning with Graphs (NIPS) | Topology with BGP |
2009
| Choffnes, D.R. Potharaju, R. Chen, Y. Bustamante, F.E. Pei, D. Zhao, Y. | Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2009
| Van den Schrieck, V. Donnet, B. Bonaventure, O. Pansiot, J.-J. | Quantifying ASes multiconnectivity using multicast information | Internet Measurement Conf. (IMC) | Topology with BGP |
2009
| Perrig, A. | The coremelt attack | Symp. on Research in Computer Security (ESORICS) | Topology with BGP |
2009
| Changjia, C. | Backup routing for BGP: Virtual ring routing scheme | IEEE Conf. on Computer Science and Information Technology (ICCSIT) | Topology with BGP |
2009
| Suchara, M. | Protecting DNS from routing attacks: a comparison of two alternative anycast implementations | IEEE Security and Privacy | Topology with BGP |
2009
| Suzuki, M. Hazeyama, H. Uda, S. Miyachi, T. Kadobayashi, Y. Shinoda, Y. | Experiences in emulating 10K AS topology with massive VM multiplexing | ACM workshop on Virtualized infrastructure systems and architectures | Topology with BGP |
2009
| Wenhua, D. | An efficient algorithm for AS path inferring | Conf. on Hybrid Information Technology | Topology with BGP |
2009
| Rimondini, M. Corea, M. Di Battista, G. | On the feasibility of static analysis for BGP convergence | IFIP/IEEE Symp. on Integrated Network Management (IM) | Topology with BGP |
2009
| Esaki, H. | AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs | Asia Future Internet summer school, Jeju, Korea | Topology with BGP |
2009
| Bernardo, L. Pinto, P. | DTIA: An Architecture for Inter-Domain Routing | IEEE Conf. on Communications (ICC) | Topology with BGP |
2009
| Jennings, A. | Relay node selection in large-scale VoIP overlay networks | Conf. on Ubiquitous and Future Networks (ICUFN) | Topology with BGP |
2009
| Zhang, W. | A power-law approach on router-level internet macroscopic topology modeling | Fuzzy Information and Engineering, Volume 2 | Topology with BGP |
2009
| Shir, E. Weinsberg, U. | Near-deterministic inference of AS relationships | Conf. on Telecommunications (ConTEL) | Topology with BGP |
2009
| Esaki, H. | A methodology for magnitude-based inter-AS distance estimation | WIT, Hokkaido, Japan | Topology with BGP |
2009
| Giovannetti, E. | Asymmetry and discrimination in Internet peering: evidence from the LINX | J. Industrial Organization | Topology with BGP |
2009
| Refice, T. Cittadini, L. Di Battista, G. | Measuring route diversity in the internet from remote vantage points | IEEE Conf. on Networking (ICN) | Topology with BGP |
2009
| Shavitt, Y. Shir, E. | Near-deterministic inference of AS relationships | IEEE Conf. on Computer Communications (INFOCOM) | Topology with BGP |
2009
| Cui, Y. Lu, Y. Xue, Y. | Locality-awareness in BitTorrent-like P2P applications | IEEE Trans. on Multimedia | Topology with BGP |
2009
| Hiraoka, Y. Murata, M. | Evaluation of free-riding traffic problem in overlay routing and its mitigation method | Conf. on Networking and Services (ICNS) | Topology with BGP |
2009
| Avramopoulos, I. Rexford, J. Druschel, P. | NetReview: detecting when interdomain routing goes wrong | Usenix Symp. on Networked Systems Design and Implementation (NSDI) | Topology with BGP |
2009
| Holder, L. Cook, D. | Identifying threats using graph-based anomaly detection | Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 | Topology with BGP |
2009
| Measuring the impacts of sampling bias on internet AS-level topology inference | WRI Conf. on Communications and Mobile Computing (CMC) | Topology with BGP | |
2009
| Baden, R. Spring, N. Bhattacharjee, B. | Triangle inequality and routing policy violations in the internet | Passive and Active Measurement (PAM) | Topology with BGP |
2009
| Lang, K.J. Dasgupta, A. Mahoney, M.W. | Large-scale community structure in social and information networks | Carnegie Mellon Univ. |
Topology with BGP Topology with Skitter |
2009
| Yagil, D. Elovici, Y. Braha, D. | Collaborative attack on internet users anonymity | Internet Research | Topology with BGP |
2008
| Tsourakakis, C. Appel, A.P. Faloutsos, C. Leskovec, J. | HADI: Fast diameter estimation and mining in massive graphs with Hadoop | Carnegie Mellon Univ. | Topology with BGP |
2008
| Nakao, A. Hasegawa, T. Ogishi, T. Yamamoto, S. | AS alliance: cooperatively improving resilience of intra-alliance communication | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2008
| De Los Rios, P. | Structural efficiency of percolated landscapes in flow networks | Plos One | Topology with BGP |
2008
| Sanchez-Garcia, R.J. Anderson, J.W. | Symmetry in complex networks | Discrete Applied Mathematics | Topology with BGP |
2008
| Novak, R. | Policy relationship annotations of predefined AS-level topologies | Computer Networks | Topology with BGP |
2008
| Border Gateway modeling and simulation | Dep. Computer Science, VU Univ. Amsterdam | Topology with BGP | |
2008
| Riley, G. Jaafar, T. | Realistic topology modeling for the internet BGP infrastructure | IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) | Topology with BGP |
2008
| Suzuki, M. Miwa, S. Miyamoto, D. Kadobayashi, Y. | Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures | Conf. on Cyber Security Experimentation and Test | Topology with BGP |
2008
| Kider, J.T. | All-pairs shortest-paths for large graphs on the GPU | ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware | Topology with BGP |
2008
| Chen, C. | Exploring possible strategies for competitions between Autonomous Systems | IEEE Conf. on Communications (ICC) | Topology with BGP |
2008
| Katz-Bassett, E. Krishnamurthy, A. Anderson, T. Venkataramani, A. | Consensus routing: the internet as a distributed system | Usenix Symp. on Networked Systems Design and Implementation (NSDI) | Topology with BGP |
2008
| MacArthur, B.D. Wang, H. Xiong, M. Wang, W. | Network quotients: structural skeletons of complex systems | Phys. Rev. E | Topology with BGP |
2007
| Moors, T. | Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with BGP |
2007
| Uhlig, S. Fu, B. Meulle, M. Maennel, O. | In search for an appropriate granularity to model routing policies | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications | Topology with BGP |
2007
| Francis, P. Zhang, X. | A study of prefix hijacking and interception in the internet | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications | Topology with BGP |
2007
| Zhang, Y. Mao, Z.M. Shin, K.G. | Internet routing resilience to failures: analysis and implications | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with BGP |
2007
| Li, J. Ross, K.W. | Can internet video-on-demand be profitable? | ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications | Topology with BGP |
2006
| Ott, E. Hunt, B.R. | Characterizing the dynamical importance of network nodes and links | Phys. Rev. Lett. | Topology with BGP |
2006
| Giovannetti, E. | Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach | J. Competition Law and Economics | Topology with BGP |
2020
| Durairajan, Ramakrishnan Rejale, Reza Willinger, Walter | A First Comparative Characterization of Multi-cloud Connectivity in Today Internet | Passive and Active Measurement | Topology with Skitter |
2018
| Zhu, Y. Yuan, J. Zhao, J. Wang, X. Wolf, T. | ParaPLL: Fast parallel shortest-path distance query on large-scale weighted graphs | Intl Conf. on Parallel Processing | Topology with Skitter |
2018
| Shalini, M. Yang, M.H. | Design and analysis of hybrid single packet IP traceback scheme | IET Networks | Topology with Skitter |
2018
| Saghiri, A. M. Vahidipour, S. M. Esnaashari, M. Meybodi, M. R. | Learning Automata for Cognitive Peer-to-Peer Networks | Recent Advances in Learning Automata | Topology with Skitter |
2018
| Selvaraj, M. S. Yang, M. H. | HPSIPT: A high-precision single-packet IP traceback scheme | Computer Networks | Topology with Skitter |
2018
| Selvaraj, M. | UDP based IP Traceback for Flooding DDoS Attack | The International Arab Journal of Information Technology | Topology with Skitter |
2018
| Luo, J. Z. Liu, Y. Wei, W. Lei, F. | A network community restructuring mechanism for transport efficiency improvement in scale-free complex networks | Concurrency and Computation Practice and Experience | Topology with Skitter |
2018
| On the Eccentricity Function in Graphs | Intl Workshop on Complex Networks | Topology with Skitter | |
2017
| Engelbrecht, H.A. | Pithos: Distributed storage for nassive nulti-user virtual environments | ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM) | Topology with Skitter |
2017
| Goodrich, M.T. Mitzenmacher, M. Torres, M.R. | 2-3 Cuckoo filters for faster triangle listing and set intersection | ACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems | Topology with Skitter |
2017
| Yang, M.H. | Improved single packet traceback scheme with Bloom filters | Intl Conf. on Internet of Things as a Service | Topology with Skitter |
2016
| Lee, H. Perrig, A. | Coordination of anti-spoofing mechanisms in partial deployments | J. of Communications and Networks | Topology with Skitter |
2016
| Anschelevich, E. Kar, K. | Coalitionally stable pricing schemes for inter-domain forwarding | Computer Networks | Topology with Skitter |
2016
| Selvi, C. Kogilavani, S. | Low storage and traceback overhear IP traceback system | J. of Information Science and Engineering | Topology with Skitter |
2015
| Gleich, D.F. | Seeded PageRank solution paths | arxiv.org | Topology with Skitter |
2015
| Festor, O. | Anomaly traceback using software defined networking | Intl. Workshop on Information Forensics and Security (WIFS) | Topology with Skitter |
2015
| Sazonovs, A. Meyerhenke, H. | NetworKit: A tool suite for large-scale complex network analysis | arxiv.org | Topology with Skitter |
2015
| Efficient methods on reducing data redundancy in the Internet | Aalto Univ., FI | Topology with Skitter | |
2015
| Sun, B.Q. | The impact of the Internet on global industry: New evidence of Internet measurement | Research in Intl Business and Finance | Topology with Skitter |
2015
| Sha, W. | Dynamic ring for seamless mobility in identity centric networks | Computers and Communication (ISCC) | Topology with Skitter |
2015
| Random graphs and applications | Univ. of Barcelona | Topology with Skitter | |
2014
| Storage-efficient 16-bit hybrid IP traceback with single packet | The Scientific World J. | Topology with Skitter | |
2014
| Yang, M.C. Luo, J.-N. Hsu, W.C. | High accuracy and low storage hybrid IP traceback | Conf. on Computer, Information and Telecommunication Systems (CITS) | Topology with Skitter |
2014
| Perez-Cortes, E. Lopez-Guerrero, M. | A performance comparison of Chord and Kademlia DHTs in high churn scenarios | Peer-to-Peer Networking and Applications | Topology with Skitter |
2014
| Statistical inference on network data | Univ. Illinois, Urbana-Champaign | Topology with Skitter | |
2014
| Verigin, A. Godkin, T. Neville, S.W. | Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets | Conf. on Advanced Information Networking and Applications (AINA) | Topology with Skitter |
2014
| Kahani, N. | TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks | Security and Communication Networks | Topology with Skitter |
2014
| Tomasevic, M. | Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols | Concurrency Computation: Practice and Experience | Topology with Skitter |
2013
| Keller, M. Tommasi, M. | Probability estimation over large-scale random networks via the Fiedler delta statistic | J. of Machine Learning Research | Topology with Skitter |
2013
| Lee, H. Perrig, A. | APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks | Computers and Security | Topology with Skitter |
2013
| Jadbabaie, A. | Moment-based spectral analysis of large-scale networks using local structural information | IEEE/ACM Trans. on Networking (TON) | Topology with Skitter |
2013
| Statistical assessment of peer-to-peer botnet features | Univ. of Victoria, Victoria, CA | Topology with Skitter | |
2013
| Wu, H. Cheng, J. Wong, R.C. | IS-Label: an independent-set based labeling scheme for point-to-point distance querying | VLDB Endowment | Topology with Skitter |
2013
| Lukyanenko, A. Polishchuk, T. Polishchuk, V. Gurtov, A. | isBF: scalable in-packet Bloom filter based multicast | ACM Symp. on Applied Computing (SAC) | Topology with Skitter |
2013
| Kawadia, V. Urgaonkar, R. | Detecting overlapping temporal community structure in time-evolving networks | arxiv.org | Topology with Skitter |
2013
| Zhang, G. Lin, T. Liu, J. | HDLBR: A name-independent compact routing scheme for power-law networks | Computer Communications | Topology with Skitter |
2013
| Jin, G. | CTFPi: A new method for packet filtering of firewall | Conf. on Information Technology and Software Engineering, Ch. 48 | Topology with Skitter |
2012
| Soshi, M. Miyaji, A. | A novel hybrid IP traceback scheme with packet counters | Conf. on Internet and Distributed Computing Systems (IDCS) | Topology with Skitter |
2012
| Zhou, Z. Perrig, A. | Using trustworthy host-based information in the network | Workshop on Scalable trusted computing (STC) | Topology with Skitter |
2012
| Draief, M. Jadbabaie, A. | Structural analysis of viral spreading processes in social and communication networks using egonets | arxiv.org | Topology with Skitter |
2012
| Dorogovtsev, S.N. Oliveira, J.G. Mendes, J.F.F. | Localization and spreading of diseases in complex networks | Phys. Rev. Lett. | Topology with Skitter |
2012
| Haddadi, H. Moore, A.W. Mortier, R. Thomason, A.G. Uhlig, S. | Weighted spectral distribution: A metric for structural analysis of networks | Statistical and Machine Learning Approaches for Network Analysis, Ch. 6 | Topology with Skitter |
2012
| Yang, M.-C. | RIHT: A novel hybrid IP traceback scheme | IEEE Trans. on Information Forensics and Security | Topology with Skitter |
2012
| Ziviani, A. | Distributed assessment of the closeness centrality ranking in complex networks | Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX) | Topology with Skitter |
2011
| ELHajj, I. | Hop count variability | Conf. for Internet Technology and Secured Transactions (ICITST) | Topology with Skitter |
2011
| Ziviani, A. | Distributed location of the critical nodes to network robustness based on spectral analysis | Latin American Network Operations and Management Symp. (LANOMS) | Topology with Skitter |
2011
| Examining change in Internet topology in terms of external events, April 2001 - April 2002 | Univ. Nebraska at Omaha | Topology with Skitter | |
2011
| Kooij, R. Scoglio, C. | Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics | J. Computational Science | Topology with Skitter |
2011
| Beiro, M.G. Busch, J.R. | Understanding edge connectivity in the Internet through core decomposition | Internet Mathematics | Topology with Skitter |
2010
| Zhao, H. Yang, B. Sun, H. | AS-level Internet macroscopic topology centralization evolvement analysis | J. Software Engineering and Applications | Topology with Skitter |
2010
| Soto, M. Viennot, L. | Autour du caractere arborescent dInternet | MajecSTIC | Topology with Skitter |
2010
| Wang, Z. | On an IBA topology model for internet topology structure | Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) | Topology with Skitter |
2010
| Eidenbenz, S. Thulasidasan, S. Datta, P. Ramaswamy, V. | Criticality analysis of Internet infrastructure | Computer Networks | Topology with Skitter |
2010
| Botev, J. Esch, M. Hohfeld, A. Schloss, H. Zech, B. | TopGen - internet router-level topology generation based on technology constraints | Conf. on Simulation Tools and Techniques for Communications, Networks and Systems | Topology with Skitter |
2010
| Haddadi, H. Thomason, A. Moore, A.W. Mortier, R. Jamakovic, A. Uhlig, S. Rio, M. | Weighted spectral distribution for Internet topology analysis: Theory and applications | IEEE/ACM Trans. on Networking | Topology with Skitter |
2009
| Krishnamurthy, B. Willinger, W. | IXPs: mapped? | Internet Measurement Conf. (IMC) | Topology with Skitter |
2009
| Zhang, F. Li, Y. Zhang, H. Qian, J. | A hash-based path identification scheme for DDoS attacks defense | Conf. on Computer and Information Technology | Topology with Skitter |
2009
| Fay, D. Uhlig, S. Moore, A. Jamakovic, A. Mortier, R. | Analysis of the Internets structural evolution | Univ. of Cambridge | Topology with Skitter |
2009
| Fay, D. Jamakovic, A. Maennel, O. Moore, A. Mortier, R. Uhlig, S. | On the importance of local connectivity for Internet topology models | Intl Teletraffic Congress | Topology with Skitter |
2009
| Moonen, L.S. Spieksma, F.C.R. Vukadinovic, D. | Connectivity measures for internet topologies on the level of autonomous systems | Operations Research | Topology with Skitter |
2009
| Schubert, A. Telcs, A. | Lobby index in networks | Physica A: Statistical Mechanics and its Applications | Topology with Skitter |
2009
| Zhao, H. | An improved BA model for router-level internet macroscopic topology | IAENG J. Computer Science | Topology with Skitter |
2009
| Katz-Bassett, E. Anderson, T. Krishnamurthy, A. Venkataramani, A. | iPlane Nano: path prediction for peer-to-peer applications | USENIX Symp. on Networked Systems Design and Implementation (NSDI) | Topology with Skitter |
2009
| Sarac, K. | Analyzing router responsiveness to active measurement probes | Passive and Active Measurement (PAM) | Topology with Skitter |
2009
| Paruchuri, V. Barolli, L. | Fast autonomous system traceback | J. Network and Computer Applications | Topology with Skitter |
2009
| Liu, L. Guo, X. Xu, K. | Modeling the IPv6 internet AS-level topology | Physica A: Statistical Mechanics and its Applications | Topology with Skitter |
2009
| Pussep, K. Leng, C. Kovacevic, A. Tyson, G. Steinmetz, R. | Modelling the internet delay space based on geographical locations | Conf. on Parallel, Distributed and Network-based Processing | Topology with Skitter |
2008
| Xu, J. Li, J. Li, L. | Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation | IEEE/ACM Trans. on Networking (TON) | Topology with Skitter |
2008
| Huang, C. Liu, N. | A novel two-step traceback scheme for DDoS attacks | Intl. Symp. on Intelligent Information Technology Application | Topology with Skitter |
2008
| Durresi, A. Chellappan, S. | TTL based Packet Marking for IP traceback | Global Telecommunications Conf. | Topology with Skitter |
2008
| Xu, K. | Time series of Internet AS-level topology graphs: four patterns and one model | arxiv.org | Topology with Skitter |
2008
| Alvarez-Hamelin, J.I. Busch, J.R. | A low complexity visualization tool that helps to perform complex systems analysis | New J. Physics | Topology with Skitter |
2008
| Li, Y. Zhang, H. Qian, J. | A Pi2HC mechanism against DDoS attacks | Conf. on Communications and Networking in China | Topology with Skitter |
2008
| Zhao, H. Zhang, X. Wang, L. | Correctness of sampling bias on Internet router-level topology | Conf. on Wireless Communications, Networking and Mobile Computing | Topology with Skitter |
2008
| Tan, W. Xiao, R. | A DDoS-oriented distributed defense framework based on edge router feedbacks in Autonomous Systems | Symp. on Computer and Computational Sciences (IMSCSS) | Topology with Skitter |
2008
| Dong, Y. Lu, D. Jin, G. | Optimal control of DDoS defense with multi-resource max-min fairness | Conf. on Cybernetics and Intelligent Systems | Topology with Skitter |
2008
| Shiry, S. Bagherzadeh, M. | Detecting Denial of Service attacks utilizing machine learning methods | Conf. on the Applications of Digital Information and Web Technologies | Topology with Skitter |
2008
| Zhao, H. Wang, L. Li, C. | On the Internet AS-level topology evolution basing on hierarchy characteristic | Chinese Control and Decision Conf. | Topology with Skitter |
2008
| Zhao, H. Zhou, Y. | The study on characteristics of the coreness of router-level internet nodes | Chinese Control and Decision Conf. (CCDC) | Topology with Skitter |
2008
| Fay, D. Jamakovic, A. Maennel, O. Moore, A. Mortier, R. Rio, M. Uhlig, S. | Beyond node degree: Evaluating AS topology models | arxiv.org | Topology with Skitter |
2008
| Manimaran, G. | Distributed divide-and-conquer techniques for effective DDoS attack defenses | Conf. on Distributed Computing Systems | Topology with Skitter |
2008
| Uhlig, S. | On the relationships between topological measures in real-world networks | Networks and Heterogeneous Media | Topology with Skitter |
2008
| Fay, D. Uhlig, S. Moore, A. Mortier, R. Jamakovic, A. Rio, M. | Tuning topology generators using spectral distributions | Intl Performance Evaluation Workshop (SPEC) | Topology with Skitter |
2008
| Magnien, C. | Complex network measurements: estimating the relevance of observed properties | IEEE Conf. on Computer Communications (INFOCOM) | Topology with Skitter |
2008
| Febhar, E. Viennot, F. | The inframetric model for the internet | IEEE Conf. on Computer Communications (INFOCOM) | Topology with Skitter |
2008
| Jamakovic, A. Van Kesteren, F. De Koning, T. Theisler, I. Veldhoven, P. | Het Nederlands elftal als complex netwerk | Delft Univ. | Topology with Skitter |
2008
| Hutchinson, N. Ito, M. | RealNet: A topology generator based on real Internet topology | Conf. on Advanced Information Networking and Applications Workshops (AINA) | Topology with Skitter |
2008
| El-Beltagy, M. Helmy, M. | Analyzing Internet connectivity data using modified k-shell analysis | Intl Conf. on Informatics and Systems (INFOS) | Topology with Skitter |
2007
| Vera, J. | Bias reduction in traceroute sampling - Towards a more accurate map of the Internet | Algorithms and Models for the Web-Graph | Topology with Skitter |
2007
| Modeling and simulations of worms and mitigation techniques | Georgia Inst. of Technology | Topology with Skitter | |
2007
| Durresi, A. Jain, R. | On the (in)effectiveness of probabilistic marking for IP traceback under DDoS attacks | Global Telecommunications Conf. | Topology with Skitter |
2007
| Fukuda, K. Hirotsu, T. Sugawara, T. | Analysis of diagnostic capability for hijacked route problem | Intl Workshop on IP Operations and Management | Topology with Skitter |
2007
| Zhang, B. Zhang, L. | Observing the evolution of internet as topology | Conf. on Applications, technologies, architectures, and protocols for computer communications | Topology with Skitter |
2007
| Hiebert, J. Maennel, O. Roughan, M. Uhlig, S. | Testing the reachability of (new) address space | SIGCOMM workshop on Internet network management | Topology with Skitter |
2007
| Milliken, W. Santivanez, C. Condell, M. Strayer, T. | A topological analysis of monitor placement | Int. Symp. on Network Computing and Applications (NCA) | Topology with Skitter |
2007
| Moon, S. Cruz, R. Zhang, Z. Diot, C. | Quantile sampling for practical delay monitoring in Internet backbone networks | Computer Networks | Topology with Skitter |
2007
| Latapy, M. Friedman, T. Salamatiana, K. | Describing and simulating internet routes | Computer Networks | Topology with Skitter |
2007
| Barrat, A. Dallasta, L. Zhang, C. Kolaczyk, E. | What is the real size of a sampled network? The case of the Internet | Physical Review | Topology with Skitter |
2007
| Chiang, J. Xu, J. | Scalable hash-based IP traceback using rate-limited Probabilistic Packet Marking | Georgia Inst. of Technology | Topology with Skitter |
2007
| Ngo, H. | On the trade-off between the expected number of infected nodes and expected propagation time of malcodes | State Univ. of New York at Buffalo | Topology with Skitter |
2007
| Zhang, G.-Q. | Chinese Internet AS-level topology | IET Communications | Topology with Skitter |
2007
| Wahlisch, M. Zhang, Y. | On the correlation of geographic and network proximity at internet edges and its implications for mobile unicast and multicast routing | IEEE Conf. on Networking (ICN) | Topology with Skitter |
2007
| Nagel, R. Hossfeld, T. Binzenhofer, A. Eger, K. | Efficient simulation of large-scale P2P networks: modeling network transmission times | EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) | Topology with Skitter |
2007
| Ansari, N. | A practical and robust inter-domain marking scheme for IP traceback | Computer Networks | Topology with Skitter |
2007
| Mechanisms for generating realistic annotated Internet topologies | Univ. of California, San Diego | Topology with Skitter | |
2006
| Fallah, M. | Distributed packet filtering based on IP traceback | Cairo Univ. | Topology with Skitter |
2006
| Raoult, P. Friedman, T. Crovella, M. | Deployment of an algorithm for large-scale topology discovery | IEEE J. Selected Areas in Communications | Topology with Skitter |
2006
| Bayant, B. Friedman, T. | Retouched Bloom filters: allowing networked applications to trade off selected false positives against false negatives | ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) | Topology with Skitter |
2006
| Xiang, Y. He, D. | Simulation and analysis of DDoS in Active Defense Environment | Conf. on Computational and Information Science | Topology with Skitter |
2006
| Xiang, Y. | Mathematical analysis of active DDoS defense systems | Conf. on Computational Intelligence and Security | Topology with Skitter |
2006
| Latapy, M. Magoni, D. | Relevance of massively distributed explorations of the internet topology: qualitative results | Computer Networks | Topology with Skitter |
2006
| Perrig, A. Song, D. | StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense | IEEE J. Selected Areas in Communications | Topology with Skitter |
2006
| Magnien, C. | Measuring fundamental properties of real-world complex networks | arxiv.org | Topology with Skitter |
2006
| Protecting TCP services from denial of service attacks | SIGCOMM workshop on Large-Scale Attack Defense (LSAD) | Topology with Skitter | |
2006
| Guan, Y. | TOPO: a topology-aware single packet attack traceback scheme | Securecomm and Workshops | Topology with Skitter |
2006
| Characterising and modelling the internet topology - The rich-club phenomenon and the PFP model | BT Technology J. | Topology with Skitter | |
2006
| Friedman, T. | Topology discovery using an address prefix based stopping rule | UNICE : Networks and Applications Towards a Ubiquitously Connected World | Topology with Skitter |
2006
| Dynamical phenomena on complex networks | Univ. Paris Sud | Topology with Skitter | |
2006
| Raoult, P. Friedman, T. | Efficient route tracing from a single source | arxiv.org | Topology with Skitter |
2006
| Zegura, E. | RouteSeer: Topological placement of nodes in service overlays | Georgia Inst. of Technology | Topology with Skitter |
2006
| Bestavros, A. | Small-world characteristics of internet topologies and implications on multicast scaling | Computer Networks | Topology with Skitter |
2006
| Dovrolis, C. | ISP and egress path selection for multihomed networks | Conf. on Computer Communications | Topology with Skitter |
2006
| Lee, M. | Towards an adaptive packet marking scheme for IP traceback | e-Business and Telecommunication Networks | Topology with Skitter |
2006
| Siganos, G. Faloutsos, M. Krishnamurthy, S. | Putting the links together: Measurements and impact | Univ. of California Riverside | Topology with Skitter |
2006
| Fan, Z. Li, X. | Modelling the complex Internet topology | Complex Dynamics in Communication Networks | Topology with Skitter |
2005
| Hong, M. Lhee, K. | PMS an expeditious marking scheme to combat with the DDoS attack | Pakistan Section Multitopic Conf. | Topology with Skitter |
2005
| Moonen, L.S. Spieksma, F. Vukadinovic, D. | Connectivity measures for internet topologies | K.U. Leuven | Topology with Skitter |
2005
| Zhou, W. | Mark-aided distributed filtering by using neural network for DDoS defense | IEEE Global Telecommunications Conf. (GLOBECOM) | Topology with Skitter |
2005
| Van Mieghem, P. | On properties of multicast routing trees | J. Communication Systems | Topology with Skitter |
2005
| Binzenhoefer, A. Schlosser, D. Eger, K. Oberender, J. Dedinski, I. Kunzmann, G. | Towards efficient simulation of large scale P2P networks | Univ. of Wuerzburg | Topology with Skitter |
2005
| Park, J.-M. | Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources | IEEE Conf. on Computer Communications and Networks (ICCCN) | Topology with Skitter |
2005
| Building and maintaining overlay networks for bandwidth-demanding applications | Univ. of Texas at Austin | Topology with Skitter | |
2005
| Affecting IP traceback with recent Internet topology maps | Iowa State Univ. | Topology with Skitter | |
2005
| Raoult, P. Friedman, T. Crovella, M. | Efficient algorithms for large-scale topology discovery | ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) | Topology with Skitter |
2005
| Friedman, T. | A CIDR stopping rule for topology discovery | Algotel | Topology with Skitter |
2005
| Aijun, A. Wang, X. | Multi-layer increasing coherence clustering of Autonomous Systems with MULICsoft | York Univ. | Topology with Skitter |
2005
| Perrig, A. Song, D. | FIT: Fast Internet Traceback | IEEE Conf. on Computer Communications (INFOCOM) | Topology with Skitter |
2005
| Friedman, T. Crovella, M. | Improved algorithms for network topology discovery | Passive and Active Measurement (PAM) | Topology with Skitter |
2005
| Visualizing geo-related data using cartograms | Univ. of Konstanz | Topology with Skitter | |
2005
| Goyette, S. Madden, C. | Visualising Internet traffic data with three-dimensional spherical display | Asia-Pacific Symp. on Information visualisation (APVis) | Topology with Skitter |
2005
| Zhou, W. | Safeguard information infrastructure against DDos attacks: Experiments and modeling | Intl Conf. on Cryptology and Network Security | Topology with Skitter |
2005
| Lim, H. Hong, M. Lee, D. | A dynamic path identification mechanism to defend against DDoS attacks | Intl Conf. on Information Networking (ICOIN) | Topology with Skitter |
2004
| Wyatt, D. | Confidence-weighted marginal utility analyses for improved internet mapping | Univ. Washington, CSE Dept. | Topology with Skitter |
2004
| Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking | Texas A and M Univ. | Topology with Skitter | |
2004
| Reiter, M. | Mitigating bandwidth-exhaustion attacks using congestion puzzles | ACM Conf. on Computer and Communications Security (CCS) | Topology with Skitter |
2004
| Babu, S. Pasztor, A. | Robust synchronization of software clocks across the Internet | Internet Measurement Conf. (IMC) | Topology with Skitter |
2004
| Perrig, A. Song, D. | SIFF: a Stateless Internet Flow Filter to mitigate DDoS flooding attacks | IEEE Symp. on Security and Privacy | Topology with Skitter |
2004
| Crovella, M. | Geometric exploration of the landmark selection problem | Passive and Active Measurement (PAM) | Topology with Skitter |
2004
| Hong, M. Kim, D. | A study on marking bit size for path identification method: Deploying the Pi filter at the end host | Conf. on Computational Science and Its Applications | Topology with Skitter |
2004
| Reiter, M. | An empirical analysis of target-resident DoS filters | IEEE Symp. on Security and Privacy | Topology with Skitter |
2004
| Duan, Z. Zhang, Z.-L. Chandrashekar, J. | On properties of Internet Exchange Points and their impact on AS topology and relationship | IFIP-TC6 Networking Conf. (NETWORKING) | Topology with Skitter |
2004
| An analysis on the Internet topology | Linkoping Univ. | Topology with Skitter | |
2004
| Shaikh, A. Schulzrinne, H. | Effective peering for multi-provider content delivery services | Conf. of the IEEE Computer and Communications Societies (INFOCOM) | Topology with Skitter |
2004
| Mondragon, R.J. | Redundancy and robustness of AS-level Internet topology and its models | Electronics Letters | Topology with Skitter |
2004
| Madden, C. Ziegler, R. | Direct rotational interaction with a spherical projection | TUM, Muenchen | Topology with Skitter |
2003
| Crovella, M. | Virtual landmarks for the internet | Internet Measurement Conf. (IMC) | Topology with Skitter |
2003
| Bestavros, A. | Small-world characteristics of the Internet and multicast scaling | Intl Symp. on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS) | Topology with Skitter |
2003
| Xu, J. | IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks | IEEE Trans. on Parallel and Distributed Systems | Topology with Skitter |
2003
| Byers, J.W. Crovella, M. Matta, I. | On the geographic location of internet resources | J. on Selected Areas in Communications | Topology with Skitter |
2003
| Gummadi, R. Gribble, S. Ratnasamy, S. Shenker, S. Stoica, I. | The impact of DHT routing geometry on resilience and proximity | ACM SIGCOMM Applications, technologies, architectures, and protocols for computer communications | Topology with Skitter |
2003
| Mondragon, R. | Analyzing and modelling the AS-level Internet topology | arxiv.org | Topology with Skitter |
2003
| Marzullo, K. Savage, S. Voelker, G.M. | Characterizing and measuring path diversity of internet topologies | ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) | Topology with Skitter |
2003
| Perrig, A. Song, D. | Pi: a path identification mechanism to defend against DDoS attacks | IEEE Symp. on Security and Privacy | Topology with Skitter |
2003
| Krapivsky, P. Byers, J.W. Crovella, M. Finkel, D. Redner, S. | On the emergence of highly variable distributions in the autonomous system topology | ACM SIGCOMM Computer Communication Review | Topology with Skitter |
2002
| Wetherall, D. Anderson, T. | Understanding BGP misconfiguration | Proc. SIGCOMM Conf. | Topology with Skitter |
2020
| Jha, Sudan | A novel approach for Spam Email Filtering Using Machine Learning | Journal of Cybersecurity and Information Management (JCIM) | UCSD Network Telescope |
2020
| Bou-Harb, E. Assi, C. Debbabi, M. | A scalable platform for investigating exploited IoT devices and fingerprinting unsolicited activities | Forensic Sci. Int.: Digital Investigation | UCSD Network Telescope |
2020
| Mangino, A. Friday, K. Rathbun, M. Bou-Harb, E. Iqbal, F. Samtani, S. Crichigno, J. Ghani, N. | On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild | Computers and Security | UCSD Network Telescope |
2020
| Pour, M.S. Bou-Harb, E. | Internet-scale insecurity of consumer Internet of Things: An empirical measurements perspective | ACM Transactions on Management Information Systems (TMIS) | UCSD Network Telescope |
2020
| Bou-Harb, E. Assi, C. Karbab, E. Boukhtouta, A. Debbabi, M. | Inferring and investigating IoT-generated scanning campaigns targeting a large Network Telescope | Trans. on Dependable and Secure Computing | UCSD Network Telescope |
2019
| Mangino, A. Friday, K. Rathbun, M. Bou-Harb, E. Iqbal, F. Shaban, K. Erradi, A. | Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild | Intl Conf. on Availability, Reliability and Security | UCSD Network Telescope |
2019
| Kumar, V. Sheen, Shina | Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm | SN Computer Science | UCSD Network Telescope |
2019
| Bou-Harb, E. Crichigno, J. Kaddoum, G. Ghani, N. | Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations | Comm. Surveys and Tutorials | UCSD Network Telescope |
2019
| Sood, K. Xiang, Y. | ERM: An Accurate Approach to Detect DDoS Attacks using Entropy Rate Measurement | IEEE Communications Letters | UCSD Network Telescope |
2019
| Bou-Harb, E. Varma, K. Neshenko, N. Pados, D. A. Choo, K. K. R. | Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns | Digital Investigation | UCSD Network Telescope |
2019
| Wen, S. Liu, B. Yu, S. Xiang, Y. Zhou, W. | Malicious Attack Propagation and Source Identification | Advances in Information Security | UCSD Network Telescope |
2019
| Kyurkchiev, N. Rahnev, A. Terzieva, T. | Some New Approaches for Modelling Large-scale Worm Spreading on the Internet. II | Neural, Parallel and Scientific Computations | UCSD Network Telescope |
2019
| Stavrou, A. Stolfo, S. J. Keromytis, A. D. | Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models | Google Patents | UCSD Network Telescope |
2018
| Komarkova, J. Bou-Harb, E. Celeda, P. | Survey of attack projection, prediction, and forecasting in cyber security | IEEE Communications Surveys and Tutorials | UCSD Network Telescope |
2018
| A Network Intrusion Detection System (NIDS) based on information centrality to identify systemic cyber attacks in large systems | Rensselaer Polytechnic Inst. (ProQuest Publ.) | UCSD Network Telescope | |
2018
| A Network Telescope approach for inferring and characterizing IoT exploitations | Florida Atlantic Univ. | UCSD Network Telescope | |
2018
| Bou-Harb, E. Assi, C. Galluscio, M. Boukhtouta, A. Debbabi, M. | Inferring, characterizing, and investigating Internet-scale malicious IoT device activities: A Network Telescope perspective | Int. Conf. on Dependable Systems and Networks (DSN) | UCSD Network Telescope |
2018
| Khaled, B. Bou-Harb, E. Fachkha, C. Zouari, B. | On the collaborative inference of DDoS: An information-theoretic distributed approach | Intl Wireless Comm. and Mobile Computing Conf. (IWCMC) | UCSD Network Telescope |
2018
| Neshenko, N. Bou-Harb, E. Huang, Y. Ghani, N. Crichigno, J. Kaddoum, G. | A first empirical look on internet-scale exploitations of IoT devices | Intl Symp. on Personal, Indoor, and Mobile Radio Communications (PIMRC) | UCSD Network Telescope |
2018
| Tsunoda, H. Keeni, G. M. | Analyzing darknet TCP traffic stability at different timescales | Intl Conf. on Information Networking (ICOIN) | UCSD Network Telescope |
2018
| Maiti, R. R. Tippenhauer, N. O. | WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic | ACM Conf. on Security and Privacy in Wireless and Mobile Networks | UCSD Network Telescope |
2018
| Bou-Harb, E. Crichigno, J. Ghani, N. | A machine learning model for classifying unsolicited IoT devices by observing Network Telescopes | Intl Wireless Comm. and Mobile Computing Conf. (IWCMC) | UCSD Network Telescope |
2018
| Bou-Harb, E. Neshenko, N. Wright, A. P. Ghani, N. | Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices | IEEE Communications Magazine | UCSD Network Telescope |
2018
| Sairam, A. S. | Inferring the deployment of source address validation filtering using silence of path-backscatter | Natl Conf. on Communications (NCC) | UCSD Network Telescope |
2018
| Drummond, A. C. | A Survey of Random Forest Based Methods for Intrusion Detection Systems | ACM Computing Surveys (CSUR) | UCSD Network Telescope |
2018
| Bou-Harb, E. | Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation | IEEE International Conference on Communications (ICC) | UCSD Network Telescope |
2018
| Husak, M. Bou-Harb, E. Celeda, P. Al-Mulla, S. Fachkha, C. | Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations | IEEE Globecom Workshops (GC Wkshps) | UCSD Network Telescope |
2018
| Neshenko, N. Bou-Harb, E. Celeda, P. | Assessing Internet-wide Cyber Situational Awareness of Critical Sectors | Intl Conf. on Availability, Reliability and Security | UCSD Network Telescope |
2018
| Identifying traffic anomalies interfering with IBR based outage detection | Univ. of California, San Diego | UCSD Network Telescope | |
2018
| Bou-Harb, E. | Passive Inference of Attacks on CPS Communication Protocols | Journal of Information Security and Applications | UCSD Network Telescope |
2017
| Zseby, T. | Pattern discovery in Internet background radiation | IEEE Trans. on Big Data | UCSD Network Telescope |
2017
| Husak, M. Debbabi, M. Assi, C. | Big data sanitization and cyber situational awareness: A Network Telescope perspective | IEEE Trans. on Big Data | UCSD Network Telescope |
2017
| Heywood, A. | Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform? | Intl J. of Network Management | UCSD Network Telescope |
2017
| Ismail, A. Waweru, M. Orero, J. | Detecting scanning computer worms using machine learning and darkspace network traffic | Pan African Conf. on Science, Computing and Telecommunications (PACT) | UCSD Network Telescope |
2017
| Nucit, A. | Some estimation problems in epidemic modeling | Communications in Statistics - Simulation and Computation | UCSD Network Telescope |
2017
| Mehr, H. Cetin, A. | Diagnosis of chronic kidney disease based on Support Vector Machine by Feature Selection Methods | J. of Medical Systems | UCSD Network Telescope |
2017
| Liao, M. Yuan, C. Zhang, H. | Low-Rate DDoS Attack Detection Using Expectation of Packet Size | Security and Communication Networks | UCSD Network Telescope |
2017
| Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks | Univ. of Stirling | UCSD Network Telescope | |
2016
| Hua, L. Xu, S. | A vine copula model for predicting the effectiveness of cyber defense early-warning | Technometrics | UCSD Network Telescope |
2016
| Xu, M. Xu, S. Hu, T. | Modeling and predicting extreme cyber attack rates via marked point processes | J. Applied Statistics | UCSD Network Telescope |
2016
| Wu, C. Huang, M. Wen, Z. Cheng, Q. | Adaptive IP mutation: A proactive approach for defending against worm propagation | IEEE Symp. onReliable Distributed Systems Workshops (SRDSW) | UCSD Network Telescope |
2016
| Investigating a behaviour analysis-based early warning system to identify botnets using machine learning algorithms | Dalhousie Univ. | UCSD Network Telescope | |
2016
| Kim, S.H. Wang, Q.-H. | Cybercrime deterrence and international legislation: Evidence from Distributed Denial of Service attack | Management Information Systems Quarterly | UCSD Network Telescope |
2016
| Debbabi, M. | Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization | IEEE Communications Surveys and Tutorials | UCSD Network Telescope |
2016
| Mauthe, A. | Analysis and characterisation of botnet scan traffic | Conf. on Computing, Networking and Communications (ICNC) | UCSD Network Telescope |
2016
| Haverkort, B. Remke, A. de Boer, P. | Fitting a code-red virus spread model: An account of putting theory into practice | Conf. on the Design of Reliable Communication Networks (DRCN) | UCSD Network Telescope |
2016
| Anitha, R. | Botnet detection via mining of traffic flow characteristics | Computers and Electrical Engineering | UCSD Network Telescope |
2016
| Chen, C. | Characterising heterogeneity in vulnerable hosts on worm propagation | Intl J. Security and Networks | UCSD Network Telescope |
2015
| Saso, A. Mori, T. Goto, S. | Increasing the darkness of darknet traffic | Global Communications Conf. (GLOBECOM) | UCSD Network Telescope |
2015
| Darknet as a source of cyber threat intelligence: Investigating distributed and reflection Denial of Service attacks | Concordia Univ. | UCSD Network Telescope | |
2015
| Hahn, B. Xu, H. Kroeger, T. Zage, D. Johnson, R. | Tracking network events with Write Optimized Data Structures. The design and implementation of TWIAD: the Write-Optimized IP Address Database | arxiv.org | UCSD Network Telescope |
2015
| Gupta, B.B. | Cross-site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art | Intl J. System Assurance Engineering and Management | UCSD Network Telescope |
2015
| Xu, M. Xu, S. | Predicting cyber attack rates with extreme values | IEEE Trans. on Information Forensics and Security | UCSD Network Telescope |
2015
| 2001-2013: Survey and analysis of major cyberattacks | arxiv.org | UCSD Network Telescope | |
2015
| Zhou, S. Chain, B. | Hybrid epidemics - A case study on computer worm Conficker | Plos One | UCSD Network Telescope |
2015
| Le Cong, D. Porter, L. Zincir-Heywood, A. | On the effectiveness of different botnet detection approaches | Information Security Practice and Experience (ISPE) | UCSD Network Telescope |
2015
| Zincir-Heywood, A.N. | Highlights on analyzing one-way traffic using different tools | IEEE Symp. on Computational Intelligence for Security and Defense Applications (CISDA) | UCSD Network Telescope |
2015
| Zhou, S. Miller, J. Cox, I. Chain, B. | Optimizing hybrid spreading in metapopulations | Nature Scientific Reports | UCSD Network Telescope |
2015
| Bi, J. Vasilakos, A.V. | Passive IP Traceback: disclosing the locations of IP spoofers from path backscatter | IEEE Trans. on Information Forensics and Security | UCSD Network Telescope |
2015
| Toward hardware-oriented defensive network infrastructure | Binghamton Univ. | UCSD Network Telescope | |
2014
| Xu, M. Xu, S. | A characterization of cybersecurity posture from Network Telescope data | Conf. on Trustworthy Systems (InTrust) | UCSD Network Telescope |
2014
| Model-checking mean-field models: algorithms and applications | Univ. of Twente | UCSD Network Telescope | |
2014
| Zseby, T. | Entropy-based characterization of Internet background radiation | Entropy | UCSD Network Telescope |
2014
| Alves, J. Zincir-Heywood, A.N. | Supervised learning to detect DDoS attacks | IEEE Computational Intelligence in Cyber Security (CICS) | UCSD Network Telescope |
2014
| Du, H. Holsopple, J. Sudit, M. | Attack Projection | Advances in Information Security | UCSD Network Telescope |
2014
| Zseby, T. | Modelling IP darkspace traffic by means of clustering techniques | Communications and Network Security (CNS) | UCSD Network Telescope |
2014
| Grill, M. Stiborek, J. Zunino, A. | An empirical comparison of botnet detection methods | Computers and Security | UCSD Network Telescope |
2014
| Zincir-Heywood, A.N. | On the analysis of backscatter traffic | IEEE Local Computer Networks Workshops (LCN Workshops) | UCSD Network Telescope |
2014
| Probabilistic modeling and inference for obfuscated network attack sequences | Rochester Inst. of Technology | UCSD Network Telescope | |
2014
| Choudhari, D.M. | DDOS attack detection based on an ensemble of neural classifier | Intl J. Computer Science and Network Security (IJCSNS) | UCSD Network Telescope |
2014
| Information theoretic measures for the detection of anomalies in IP darkspace traffic | Barcelona Tech | UCSD Network Telescope | |
2014
| Yang, S.J. | Probabilistic Inference for Obfuscated Network Attack Sequences | Conf. on Dependable Systems and Networks | UCSD Network Telescope |
2014
| A statistical framework for analyzing cyber attacks | Univ. Texas, San Antonio, TX, US | UCSD Network Telescope | |
2014
| Guan, X. Zhao, J. Tao, J. Qin, T. | A new sketch method for measuring host connection degree distribution | IEEE Trans. on Information Forensics and Security | UCSD Network Telescope |
2014
| Yang, S. | Segmenting large-scale cyber attacks for online behavior model generation | Social Computing, Behavioral-Cultural Modeling and Prediction (SBP) | UCSD Network Telescope |
2014
| Hosein, N. Ghiasi, S. Chuah, C. Sharma, P. | Streaming solutions for fine-grained network traffic measurements and analysis | IEEE/ACM Trans. on Networking (TON) | UCSD Network Telescope |
2014
| Guntuku, S.C. Thakur, A. Hota, C. | Big data analytics framework for peer-to-peer botnet detection using random forests | Information Sciences | UCSD Network Telescope |
2014
| Kim, K. Lee, Y. Song, J. | A classification method of darknet traffic for advanced security monitoring and response | Lecture Notes in Computer Science | UCSD Network Telescope |
2014
| Askoxylakis, I.G. Fragkiadakis, A. | A Network Telescope for Early Warning Intrusion Detection | Lecture Notes in Computer Science | UCSD Network Telescope |
2013
| Network forensic analysis using growing hierarchical SOM | IEEE ICDM workshop on Incremental clustering, concept drift and novelty detection (IClaNov) | UCSD Network Telescope | |
2013
| Yang, S.J. | Temporal and spatial analyses for large-scale cyber attacks | Handbook of Computational Approaches to Counterterrorism | UCSD Network Telescope |
2013
| Woodhead, S. Wetherall, J. | Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet | J. Defense Modeling and Simulation: Applications, Methodology, Technology | UCSD Network Telescope |
2013
| Segmentation and model generation for large-scale cyber attacks | Rochester Inst. of Technology | UCSD Network Telescope | |
2013
| Narang, P. Hota, C. | Real-time peer-to-peer botnet detection framework based on Bayesian regularized neural network | arxiv.org | UCSD Network Telescope |
2013
| A source analysis of the Conficker outbreak from a Network Telescope | SAIEE Africa Research J. | UCSD Network Telescope | |
2013
| Yang, Y. Guo, X. | Improved SEIR viruses propagation model and the patchs impact on the propagation of the virus | J. of Computational Information Systems | UCSD Network Telescope |
2013
| Woodhead, S. Wetherall, J. | A large-scale zero-day worm simulator for cyber-epidemiological analysis | Conf. on Advances in Computer Science and Electronics Engineering (CSEE) | UCSD Network Telescope |
2013
| Zhang, Y. Guo, H. Wang, C. | Combating good point set scanning-based self-learning worms by using predators | J. Network Security | UCSD Network Telescope |
2013
| Saganowski, L. Choras, M. | DDoS attacks detection by means of greedy algorithms | Image Processing and Communications Challenges 4 | UCSD Network Telescope |
2012
| Hsu, W. Lee, M.L. Patel, D. | Top-k maximal influential paths in network data | Database and Expert Systems Applications | UCSD Network Telescope |
2012
| Chiarello, L. Leduc, G. | DISco: A distributed information store for network challenges and their outcome | IEEE Network Operations and Management Symp. (NOMS) | UCSD Network Telescope |
2012
| Zou, P. Jia, Y. Han, W. | Traffic anomaly detection improvement based on spatial-temporal characteristics | Advanced Science Lett. | UCSD Network Telescope |
2011
| Yang, S.J. | Characterizing transition behaviors in Internet attack sequences | IEEE Conf. on Computer Communications and Networks (ICCCN) | UCSD Network Telescope |
2011
| Anitha, R. | Evaluating machine learning algorithms for detecting DDoS attacks | Advances in Network Security and Applications (CNSA) | UCSD Network Telescope |
2011
| Chen, H. Christianson, B. | An enhanced fuzzy ARM approach for intrusion detection | J. Digital Crime and Forensics | UCSD Network Telescope |
2011
| Katoh, T. Bista, B.B. Takata, T. | Evaluation of a distributed detecting method for SYN flood attacks using a real Internet trace | Advanced Information Networking and Applications (WAINA) | UCSD Network Telescope |
2011
| Yang, S.J. | Discovering collaborative cyber attack patterns using social network analysis | Conf. on Social computing, behavioral-cultural modeling and prediction (SBP) | UCSD Network Telescope |
2011
| Andrysiak, T. Choras, M. Renk, R. | Expansion of matching pursuit methodology for anomaly detection in computer networks | Advances in Intelligent and Soft Computing | UCSD Network Telescope |
2011
| Saganowski, L. Renk, R. Holubowicz, W. | Statistical and signal-based network traffic recognition for anomaly detection | Expert Systems | UCSD Network Telescope |
2010
| Bi, J. Zhou, Z. | Passive IP traceback: capturing the origin of anonymous traffic through network telescopes | ACM SIGCOMM Computer Communication Review | UCSD Network Telescope |
2010
| Bakar, A. | A chi-square testing-based intrusion detection model | Conf. on Cybercrime Forensics Education and Training (CFET ) | UCSD Network Telescope |
2010
| Taleb, T. Vasilakos, A.V. Guizani, M. Kato, N. | DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis | IEEE/ACM Trans. on Networking (TON) | UCSD Network Telescope |
2010
| Hu, P. Li, P. | Study on classification and characteristics of source address spoofing attacks in the Internet | IEEE Conf. on Networking (ICN) | UCSD Network Telescope |
2010
| Ramamritham, K. Mohania, M. | Ratio threshold queries over distributed data sources | Conf. on Data Engineering (ICDE) | UCSD Network Telescope |
2009
| Parish, D.J. | Using wavelets for compression and detecting events in anomalous network traffic | Conf. on Systems and Networks Communication | UCSD Network Telescope |
2009
| Mahonen, P. Wellens, M. | Measuring complexity and predictability in networks with multiscale entropy analysis | IEEE Conf. on Computer Communications (INFOCOM) | UCSD Network Telescope |
2008
| Parameswaran, S. | MCAD: Multiple connection based anomaly detection | IEEE Conf. on Communication Systems (ICCS) | UCSD Network Telescope |
2008
| Lee, H. Kim, H. | Fast detection and visualization of network attacks on parallel coordinates | Computers and Security | UCSD Network Telescope |
2008
| Mahonen, P. Wellens, M. | Metrics for characterizing complexity of network traffic | Conf. on Telecommunications (ICT) | UCSD Network Telescope |
2008
| Pilkington, N. | High level internet scale traffic visualization using Hilbert curve mapping | Visualization for Computer Security (VizSec) | UCSD Network Telescope |
2008
| Mirkovic, J. | Correcting congestion-based error in network telescopes observations of worm dynamics | Internet Measurement Conf. (IMC) | UCSD Network Telescope |
2008
| Bi, J. Zhou, Z. | A backscatter technology based study on source address spoofing | Periodical of Ocean Univ. of China | UCSD Network Telescope |
2008
| State, R. Festor, O. | Activity monitoring for large honeynets and network telescopes | J. Advances in Systems and Measurements | UCSD Network Telescope |
2007
| Pescape, A. Ventre, G. | Worm traffic analysis and characterization | IEEE Conf. on Communications (ICC) | UCSD Network Telescope |
2007
| Ji, C. | Measuring network-aware worm spreading ability | IEEE Conf. on Computer Communications (INFOCOM) | UCSD Network Telescope |
2007
| Gupta, V. Karagiannis, T. Gkantsidis, C. | Sampling strategies for epidemic-style information dissemination | IEEE Conf. on Computer Communications (INFOCOM) | UCSD Network Telescope |
2007
| Ji, C. | Optimal worm-scanning method using vulnerable-host distributions | J. Security and Networks | UCSD Network Telescope |
2006
| Monrose, F. Terzis, A. | Fast and evasive attacks: highlighting the challenges ahead | Symp. on Recent Advances in Intrusion Detection (RAID) | UCSD Network Telescope |
2006
| State, R. Festor, O. | Tracking global wide configuration errors | IEEE Workshop on Monitoring, Attack Detection and Mitigation | UCSD Network Telescope |
2006
| Kesidis, G. | Toward a framework for forensic analysis of scanning worms | Emerging Trends in Information and Communication Security (ETRICS) | UCSD Network Telescope |
2006
| Gong, J. Yang, W. Liu, W. | Disclosing the element distribution of Bloom filter | Conf. on Computational Science (ICCS) | UCSD Network Telescope |
2005
| Monrose, F. Terzis, A. | Worm evolution tracking via timing analysis | ACM workshop on Rapid Malcode (WORM) | UCSD Network Telescope |
2005
| Ji, C. | Importance-scanning worm using vulnerable-host distribution | IEEE Global Telecommunications Conf. (GLOBECOM) | UCSD Network Telescope |
2005
| Lin, C. Ni, J. Ruan, D.-H. Zheng, B. Jiang, Y.-X. Peng, X. Wang, Y. Luo, A. Zhu, B. Yue, Y. Ren, F.-Y. | Antiworm NPU-based parallel Bloom filters for TCP/IP content processing in giga-ethernet LAN | IEEE Conf. on Local Computer Networks (LCN) | UCSD Network Telescope |
2005
| Paxson, V. Weaver, N. | Exploiting underlying structure for detailed reconstruction of an internet-scale event | Internet Measurement Conf. (IMC) | UCSD Network Telescope |
2005
| Monrose, F. Terzis, A. | On the effectiveness of distributed worm monitoring | Usenix Security Conf. (SEC) | UCSD Network Telescope |
2005
| John, A. Saran, H. | PISA: Automatic extraction of traffic signatures | IFIP Networking Conf. | UCSD Network Telescope |