Non-CAIDA Publications using CAIDA Data

This page contains a list of publications from research using CAIDA data. The purpose of this list is to provide insight into past uses of CAIDA data. We rely on researchers who download our data to comply with the Acceptable Use Policies of CAIDA datasets in reporting published papers and presentations to us. If you would like to report a publication or provide an update to information listed here, see our Data Publication Report Page. For a description of how we track down these publications see our procedure for locating publications using CAIDA data.

We would like to thank all researchers who reported their publications using CAIDA data, with a special thanks to Paolo Federico, Alberto Dainotti and Antonio Pescapè for reporting numerous publications.

For a list of all papers published by CAIDA authors, see Papers by CAIDA.

Year Author(s) Title Publication Dataset
2020
Wang, Ruohui Verifying Self-Simularity For Current Network Traffic University of Wisconsin-Madison Anonymized Internet Traces
2020
Zhou, Yu
Zhang, Dai
Gao, Kai
Sun, Chen
Cao, Jiamin
Wang, Yangyan
Xu, Mingwei
We, Jianping
Newton: intent-driven network traffic monitoring CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Reviriego, Pedro
Pontarelli, Solvatore
When Filtering is not Possible Caching Negatives with Fingerprints Comes to the Rescue CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Hypolite, Joel
Sonchack, John
Hershkop, Shlomo
Dautenhahn, Nathan
DeHon, Andre
Smith, Jonathan M.
DeepMatch: Practical Deep Packet Inspection in the Data Planeusing Network Processors CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Hwan Song, Cha
Govindan Kannan, Pravein
Kian Hsiang Low, Byan
Choon Chan, Mun
FCM-Sketch: Generic Network Measurementswith Data Plane Support CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Anonymized Internet Traces
2020
Yu, Liangcheng
Sonchack, John
Liu, Vincent
Mantis: Reactive Programmable Switches Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Rzepka, M.
Borylo, P.
Lason, A.
Szymanski, A.
PARD: Hybrid Proactive and Reactive Method Eliminating Flow Setup Latency in SDN Journal of Network and Systems Management Anonymized Internet Traces
2020
Rashelbach, Alon
Rottenstreich, Ori
Silberstein, Mark
A Computational Approach to Packet Classification Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Gong, Junzhi
Li, Yuliang
Anwer, Bilal
Shaikh, Aman
Yu, Minlan
Microscope: Queue-based Performance Diagnosis for Network Functions Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication Anonymized Internet Traces
2020
Chen, X.
Landau-Feibish, S.
Braverman, M.
Rexford, J.
BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a Time Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies Anonymized Internet Traces
2020
Turkovic, B.
Oostenbrink, J.
Kuipers, F.A.
Keslassy, I.
Orda, A.
Sequential zeroing: Online heavy-hitter detection on programmable hardware IFIP Networking Anonymized Internet Traces
2020
Sarker, I. Cybersecurity Data Science: An Overview from Machine Learning Perspective preprints.org Anonymized Internet Traces
Denial of Service Attacks
2020
Grigoryan, G.
Liu, Y.
Kwon, M.
Boosting FIB caching performance with aggregation Proc. Intl Symp. on High-Performance Parallel and Distributed Computing (HPDC) Anonymized Internet Traces
2020
Basat, R. B.
Chen, X.
Einziger, G.
Feibish, S. L.
Raz, D.
Yu, M
Routing Oblivious Measurement Analytics IFIP Networking Conference Anonymized Internet Traces
2020
Ding, D.
Savi, M.
Siracusa, D.
Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4 NOMS -2020 IEEE/IFIP Network Operations and Management Symposium Anonymized Internet Traces
2020
Czachorski, Tadeusz
Gelenbe, Erol
Kuaban Suila, Godlove
Marek, Dariusv
Dynamics of Software Defined Networks: Diffusion Models Researchgate.net Anonymized Internet Traces
2020
Oeldemann, A.
Biersack, F.
Wild, T.
Herkersdorf, A.
Inter-server RSS: Extending receive side scaling for inter-server workload distribution Euromicro Intl Conf. on Parallel, Distributed and Network-Based Processing (PDP) Anonymized Internet Traces
2020
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filters ACM J. Exp. Algorithms Anonymized Internet Traces
2020
Ding, D.
Savi, M.
Antichi, G.
Siracusa, D.
An Incrementally-deployable P4-enabled Architecture for Network-wide Heavy-hitter Detection IEEE Transactions on Network and Service Management Anonymized Internet Traces
2020
Levai, T.
Nemeth, F.
Raghavan, B.
Retvari, G.
Batchy: Batch-scheduling data flow graphs with service-level objectives USENIX NSDI Anonymized Internet Traces
2020
Wang, Toa
Zhu, Hang
Ruffym, Fabian
Jin, Xin
Sivaraman, Anirudh
Ports, Dan
Panda, Aurojit
Multitenancy for fast and programmable networks in the cloud USENIX Workshop on Hot Topics in Cloud Computing, HotCloud , co-located with USENIX ATC 2020 Anonymized Internet Traces
2020
Reviriego, P.
Martinez, J.
Pontarelli, S.
Improving packet flow counting with fingerprint counting IEEE Comm. Lett. Anonymized Internet Traces
2019
Zhou, You
Zhang, Youlin
Ma, Chaoyi
Chen, Shigang
O. Odegbile, Olufemi
Generalized Sketch Families for Network TrafficMeasurement Proceedings of the ACM on Measurement and Analysis of Computing Systems Anonymized Internet Traces
2019
Ivkin, Nikita
Yu, Zhuolong
Braverman, Vladimir
Jin, Xin
QPipe: quantiles sketch fully in the data plane CoNEXT 19: Proceedings of the International Conference on Emerging Networking Experiments And Technologies Anonymized Internet Traces
Other Datasets
Topology with Archipelago
2019
Ivkin, Nikita
Ben Basat, Ran
Liu, Zaoxing
Einziger, Gil
Friedman, Roy
Braverman, Vladimir
I Know What You Did Last Summer: Network Monitoring using Interval Queries Proceedings of the ACM on Measurement and Analysis of Computing Systems Anonymized Internet Traces
2019
Gomez, C.A.
Wang, X.
Shami, A.
Intelligent active queue management using explicit congestion notification IEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2019
Chen, X.
Feibish, S. L.
Koral, Y.
Rexford, J.
Rottenstreich, O.
Monetti, S. A.
Wang, T. Y.
Fine-grained queue measurement in the data plane International Conference on Emerging Networking Experiments And Technologies Anonymized Internet Traces
2019
Yang, T.
Zhang, H.
Li, H.
Gong, J.
Uhlig, S.
Chen, S.
Uden, L.
Li, X.
HeavyKeeper: An accurate algorithm for finding top-k elephant flows IEEE/ACM Trans. on Networking Anonymized Internet Traces
2019
Richter, Philipp
Berger, Arthur
Scanning the Scanners: Sensing the Internet from a MassivelyDistributed Network Telescope IMC 19: Proceedings of the Internet Measurement Conference Anonymized Internet Traces
2019
Iannacone, M.D.
Bridges, R.A.
Quantifiable and comparable evaluations of cyber defensive capabilities: A survey and novel, unified approach arxiv.org Anonymized Internet Traces
2019
Xu, J. READ: a three-communicating-stage distributed super points detections algorithm arxiv.org Anonymized Internet Traces
2019
Monge, M.A.S. Knowledge acquisition for autonomic network management in emerging self-organizing architectures Univ. of Madrid Anonymized Internet Traces
2019
Ivkin, N.
Liberty, E.
Lang, K.
Karnin, Z.
Braverman, V.
Streaming quantiles algorithms with small space and update time arxiv.org Anonymized Internet Traces
2019
Ding, D.
Savi, M.
Antichi, G.
Siracusa, D.
Incremental deployment of programmable switches for network-wide heavy-hitter detection IEEE Conference on Network Softwarization (NetSoft) Anonymized Internet Traces
2019
Lazaris, A.
Prasanna, V. K.
An LSTM Framework For Modeling Network Traffic IFIP/IEEE Symp. on Integrated Network and Service Management (IM) Anonymized Internet Traces
2019
Hsu, C.-Y.
Indyk, P.
Katabi, D.
Vakilian, A.
Learning-based frequency estimation algorithms Intl Conf. on Learning Representations Anonymized Internet Traces
2019
Shaikh, F.I.A. Security framework for the Internet of Things leveraging network telescopes and machine learning Univ. of South Florida Anonymized Internet Traces
2019
Dautrich, J.L.J.
Ravishankar, C.V.
Inferring insertion times and optimizing error penalties in time-decaying Bloom filters ACM Trans, on Database Systems (TODS) Anonymized Internet Traces
2019
Cohen, R.
Nezri, Y.
Cardinality estimation in a virtualized network device using online machine learning arxiv.org Anonymized Internet Traces
Denial of Service Attacks
2019
Turkovic, B.
Oostenbrink, J.
Kuipers, F.
Detecting heavy hitters in the data-plane arxiv.org Anonymized Internet Traces
2019
Narayan, A. The design and implementation of a congestion control plane Massachusetts Inst. of Technology Anonymized Internet Traces
2019
Garcia-Dorado, Jose Luis
Aracil, Javier
Flow-concurrence and bandwidth ratio on the Internet Computer Communications Anonymized Internet Traces
2019
Zhuang, Z.
Wang, J.
Qi, Q.
Sun, H.
Liao, J.
Toward Greater Intelligence in Route Planning: A Graph-Aware Deep Learning Approach IEEE Systems J. Anonymized Internet Traces
2019
Zhang, S.
Zhang, Y.
Yin, L.
Yuan, T.
Wu, Z.
Luo, H.
Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things IEEE Access Anonymized Internet Traces
2019
Yang, Y.
Eo, J.
Kim, G. W.
Kim, J. Y.
Lee, S.
Seo, J.
Song, W. W.
Chun, B. G.
Apache Nemo: A Framework for Building Distributed Dataflow Optimization Policies USENIX Anonymized Internet Traces
2019
Yang, T.
Xu, J.
Liu, X.
Liu, P.
Wang, L.
Bi, J.
Li, X.
A Generic Technique for Sketches to Adapt to Different Counting Ranges IEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Wang, S.
Bi, J.
Sun, C.
Zhou, Y.
Prophet: Real-time Queue Length Inference in Programmable Switches ACM Symp. on SDN Research Anonymized Internet Traces
2019
Tang, L.
Huang, Q.
Lee, P. P. C.
MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams IEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Park, M.
Phan, T. V.
Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud IEEE Access Anonymized Internet Traces
Denial of Service Attacks
2019
Oo, M. M.
Kamolphiwong, S.
Kamolphiwong, T.
Vasupongayya, S.
Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN) Journal of Computer Networks and Communications Anonymized Internet Traces
2019
Nasirian, F.
Pajouh, F. M.
Namayanja, J.
Exact algorithms for the minimum cost vertex blocker clique problem Computers and Operations Research Anonymized Internet Traces
2019
Luo, L.
Guo, D.
Zhao, X.
Wu, J.
Rottenstreich, O.
Luo, X.
Near-accurate multiset reconciliation IEEE Trans. on Knowledge and Data Engineering Anonymized Internet Traces
2019
Liu, P.
Benson, A. R.
Charikar, M.
Sampling Methods for Counting Temporal Motifs Twelfth ACM Intl Conf. on Web Search and Data Mining Anonymized Internet Traces
2019
Lin, Y. B.
Huang, C. C.
Tsai, S. C.
A SDN Soft Computing Application for Detecting Heavy Hitters IEEE Transactions on Industrial Informatics Anonymized Internet Traces
2019
Lin, H.
Wang, C. L.
Efficient low-latency packet processing using On-GPU Thread-Data Remapping Journal of Parallel and Distributed Computing Anonymized Internet Traces
2019
Li, J.
Luo, H.
Zhang, S.
Li, H.
Yan, F.
Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking Journal of Network and Computer Applications Anonymized Internet Traces
2019
Leira, R.
Gifre, L.
Gonzalez, I.
Lopez de Vergara, J. E.
Aracil, J.
Wormhole: a novel big data platform for 100 Gbit/s network monitoring and beyond Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) Anonymized Internet Traces
2019
Leira, R.
Julian-Moreno, G.
Gonzalez, I.
Gomez-Arribas, F. J.
Lopez de Vergara, J. E.
Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks Computer Networks Anonymized Internet Traces
2019
Lapolli, A. C.
Marques, J. A.
Gaspary, L. P.
Offloading Real-time DDoS Attack Detection to Programmable Data Planes IFIP/IEEE Symp. on Integrated Network and Service Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2019
Hu, H.
Zhai, X.
Wang, M.
Hu, G.
Graph analysis of network flow connectivity behaviors Turkish Journal of Electrical Engineering and Computer Science Anonymized Internet Traces
2019
Gupta, L.
Jain, R.
Erbad, A.
Bhamare, D.
The P-ART framework for placement of virtual network services in a multi-cloud environment Computer Communications Anonymized Internet Traces
2019
Fragkouli, G.
Argyraki, K.
Ford, B.
MorphIT: Morphing Packet Reports for Internet Transparency Proceedings on Privacy Enhancing Technologies Anonymized Internet Traces
2019
Dang, V.T.
Huong, T.T.
Nguyen, H.T.
Pham, N.N.
Nguyen, N.T.
Marshall, A.
SDN-based SYN proxy-A solution to enhance performance of attack mitigation under TCP SYN flood The Computer J. Anonymized Internet Traces
2019
Czekaj, M.
Jamro, E.
Flow caching effectiveness in packet forwarding applications Computer Science Journal Anonymized Internet Traces
2019
Cao, J.
Yang, X.
Wang, Y.
A Hybrid Privacy Preserving against Multi-attacks for Network Data Publication International Computer Science and Applications Conference (ICSAC ) Anonymized Internet Traces
2019
Cafaro, M.
Epicoco, I.
Pulimeno, M.
CMSS: Sketching based reliable tracking of large network flows Future Generation Computer Systems Anonymized Internet Traces
2019
Basat, R. B.
Chen, X.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation IEEE/ACM Transactions on Networking Anonymized Internet Traces
2019
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache Spark IEEE Trans. on Network and Service Management Anonymized Internet Traces
2019
Alonso, T.
Ruiz, M.
Sutter, G.
Lopez-Buedo, S.
Lopez de Vergara, J. E.
Towards 100 GbE FPGA-Based Flow Monitoring X Southern Conference on Programmable Logic (SPL) Anonymized Internet Traces
2019
Alasmar, M.
Parisis, G.
Clegg, R.
Zakhleniu, N.
On the Distribution of Traffic Volumes in the Internet and its Implications IEEE INFOCOM - IEEE Conference on Computer Communications Anonymized Internet Traces
2019
Aamir, M.
Zaidi, S. M. A.
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation International Journal of Information Security Anonymized Internet Traces
2018
Zhao, Z.
Shi, X.
Yin, X.
Wang, Z.
HashFlow for better flow record collection arxiv.org Anonymized Internet Traces
2018
Xu, J.
Ding, W.
Hu, X.
VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window arxiv.org Anonymized Internet Traces
2018
Bayati, A.
Nguyen, K. K.
Cheriet, M.
Multiple-step-ahead traffic prediction in high-speed networks IEEE Comm. Lett. Anonymized Internet Traces
2018
Pacheco, F.
Exposito, E.
Gineste, M.
Baudoin, C.
Aguilar, J.
Towards the deployment of machine learning solutions in network traffic classification: A systematic survey IEEE Comm. Surveys and Tutorials Anonymized Internet Traces
2018
Nur, A.Y. The implications of the Internets topological structure for its efficiency, security, and reliability Univ. of Louisiana at Lafayette (ProQuest Publ.) Anonymized Internet Traces
Topology with BGP
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Herreria-Alonso, S.
Matching SDN and legacy networking hardware for energy efficiency and bounded delay Sensors Anonymized Internet Traces
2018
Engel, D.
Malone, T.W.
Integrated information as a metric for group interaction Plos One Anonymized Internet Traces
2018
Wu, N.
Tseng, S.
Tang, A.
Accurate rate-aware flow-level traffic splitting Allerton Conf. on Communication, Control, and Computing Anonymized Internet Traces
2018
Liu, P.
Benson, A.
Charikar, M.
A sampling framework for counting temporal motifs arxiv.org Anonymized Internet Traces
2018
Gupta, A. Flexible and scalable systems for network management Princeton Univ. Anonymized Internet Traces
2018
Dai, H.
Li, M.
Liu, A.
Finding persistent items in distributed datasets Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2018
Brandt, M.
Dai, T.
Klein, A.
Shulman, H.
Waidner, M.
Domain validation++ for MitM-resilient PKI ACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
Topology with BGP
2018
Zhang, Z.
Qin, Q.
Ma, L.
Poularakis, K.
Le, F.
Leung, K.K.
Kompella, S.
Tassiulas, L.
Routing performance in distributed SDN under synchronization constraint dais-ita.org Anonymized Internet Traces
2018
Yang, T.
Gong, J.
Zhang, H.
Zou, L.
Shi, L.
Li, X.
HeavyGuardian: Separate and guard hot items in data streams ACM SIGKDD Intl Conf. on Knowledge Discovery and Data Mining Anonymized Internet Traces
2018
Ting, D. Count-Min: Optimal estimation and tight error bounds using empirical error distributions Conf. on Knowledge Discovery and Data Mining (SIGKDD) Anonymized Internet Traces
2018
Kostas, K. Anomaly detection in networks using machine learning Univ. of Essex Anonymized Internet Traces
2018
Gupta, A.
Harrison, R.
Canini, M.
Feamster, N.
Rexford, J.
Willinger, W.
Sonata: query-driven streaming network telemetry Conf. on Special Interest Group on Data Communication Anonymized Internet Traces
2018
Cheng, Z.
Huang, Q.
Lee, P.P.C.
On the performance and convergence of distributed stream processing via approximate fault tolerance arxiv.org Anonymized Internet Traces
2018
Chen, C. Infrastructure-based anonymous communication protocols in future internet architectures Carnegie Mellon Univ Anonymized Internet Traces
Topology with BGP
2018
Wu, H.
Hsiao, H.C.
Asoni, D.E.
Scherrer, S.
Perrig, A.
Hu, Y.C.
CLEF: Limiting the damage caused by large flows in the Internet core (technical report) arxiv.org Anonymized Internet Traces
2018
Sharafaldin, I.
Lashkari, A.H.
Ghorbani, A.A.
A detailed analysis of the CICIDS2017 data set Intl Conf. on Information Systems Security and Privacy Anonymized Internet Traces
Denial of Service Attacks
2018
Lee, J.
Choi, D.
Sael, L
CTD: Fast, accurate, and interpretable method for static and dynamic tensor decompositions PLOS One Anonymized Internet Traces
2018
Grigoryan, G.
Yaoqing Liu, Y.
PFCA: a programmable FIB caching architecture Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2018
Goehring, M.
Shulman, H.
Waidner, M.
Path MTU discovery considered harmful Conf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2018
Ferreiro, P.F. Energy-efficient carrier SDN networks Univ. of Vigo Anonymized Internet Traces
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Implementing energy saving algorithms for ethernet link aggregates with ONOS Conf. on Software Defined Systems (SDS) Anonymized Internet Traces
2018
Arthur-Durett, K.
Carroll, T. E.
Chikkagoudar, S.
Discovering significant co-occurrences to characterize network behaviors Intl Conf. on Human Interface and the Management of Information Anonymized Internet Traces
2018
Aral, A
Ovatman, T.
A decentralized replica placement algorithm for edge computing Trans. on Network and Service Management Anonymized Internet Traces
2018
Yu, Y. Ultra-fast and memory-efficient lookups for cloud, networked systems, and massive data management Univ. of Kentucky Anonymized Internet Traces
2018
Lengvinas, A. Investigation of Internet traffic anomalies by application of neural networks Vilnius Univ. Anonymized Internet Traces
2018
Kucera, J.
Popescu, D.A.
Antichi, G.
Korenek, J.
Moore, A.W.
Seek and Push: Detecting large traffic aggregates in the dataplane arxiv.org Anonymized Internet Traces
2018
Kirilin, V.
Gorinsky, S.
A protocol-ignorance perspective on incremental deployability of routing protocols IFIP Networking Conf. (NETWORKING) Anonymized Internet Traces
Topology with Archipelago
2018
Glass-Vanderlan, T.R.
Iannacone, M.E.
Vincent, M.S.
Chen, Q.
Bridges, R.A.
A survey of Intrusion Detection Systems leveraging host data arxiv.org Anonymized Internet Traces
2018
Zoder, O. Real-time detection of communication with blacklisted network hosts Masaryk Univ. Anonymized Internet Traces
2018
Suarez-Varela, J.
Barlet-Ros, P.
Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs Computer Networks Anonymized Internet Traces
2018
Sonchack, John.
Aviv, A.
Keller, E.
Smith, J.
Turboflow: information rich flow record generation on commodity switches EuroSys Conf. Anonymized Internet Traces
2018
Marnerides, A.K.
Pezaros, D.P.
Hutchison, D.
Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modelling Computer Networks Anonymized Internet Traces
2018
Dao, N.
Vu, D.
Lee, Y.
Cho, S.
Cho, C.
Kim, H.
Pattern-identified online task scheduling in multitier edge computing for industrial IoT services Mobile Information Systems Anonymized Internet Traces
2018
Bocovich, C.
Goldberg, I.
Secure asymmetry and deployability for decoy routing systems Proc. on Privacy Enhancing Technologies Anonymized Internet Traces
2018
Zhu, L.
Tang, X.
Shen, M.
Du, X.
Guizani, M.
Privacy-preserving DDoS attack detection using cross-domain traffic in Software Defined Networks IEEE J. on Selected Areas in Communications Anonymized Internet Traces
2018
Harrison, R.
Cai, Q.
Gupta, A.
Rexford, J.
Network-wide heavy hitter detection with commodity switches Symp. on SDN Research Anonymized Internet Traces
2018
Alipourfard, O.
Moshref, M.
Zhou, Y.
Yang, T.
Yu, M.
A comparison of performance and accuracy of measurement algorithms in software Symp. on SDN Research Anonymized Internet Traces
2018
Vidal, J.
Orozco, A.
Villalba, L.
Adaptive artificial immune networks for mitigating DoS flooding attacks Swarm and Evolutionary Computation Anonymized Internet Traces
Denial of Service Attacks
2018
Mastorakis, S.
Ahmed, T.
Pisharath, J.
ISA-based trusted network functions and server applications in the untrusted cloud arxiv.org Anonymized Internet Traces
2018
Lucchesi, A.
Drummond, A.
Teodoro, G.
High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach J. of Internet Services and Applications Anonymized Internet Traces
2018
Goyal, P.
Narayan, A.
Cangialosi, F.
Raghavan, D.
Narayana, S.
Alizadeh, M.
Balakrishnan, H.
Elasticity detection: A building block for Internet congestion control arxiv.org Anonymized Internet Traces
2018
Chen, C.
Asoni, D.
Perrig, A.
Barrera, D.
Danezis, G.
Troncoso, C.
TARANET: Traffic-analysis resistant anonymity at the NETwork layer arxiv.org Anonymized Internet Traces
Topology with BGP
2018
Zhou, Y.
Bi, J.
Yang, T.
Gao, K.
Zhang, C.
Cao, J.
Wang, J.
KeySight: Troubleshooting programmable switches via scalable high-coverage behavior tracking Intl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2018
Zhou, A.
Zhu, H.
Liu, L.
Zhu, C.
Detection of super nodes based on connection metrics for network data streams IEEE Intl Conf on Big Data Analysis (ICBDA) Anonymized Internet Traces
2018
Zhou, A.
Liu, L.
Zhu, H.
Zhu, C.
Chen, L.
Parallel Sketch Based Super Node Detection with Traceability Chinese Journal of Electronics Anonymized Internet Traces
2018
Zhang, C.
Feng, Y.
Song, H.
Wan, Y.
Xu, W.
Wang, Y.
Dai, H.
Li, Y.
Lin, B.
OBMA: Minimizing Bitmap Data Structure with Fast and Uninterrupted Update Processing IEEE/ACM Intl Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2018
Yang, T.
Jiang, J.
Liu, P.
Huang, Q.
Gong, J.
Zhou, Y.
Miao, R.
Li, X.
Uhlig, S.
Elastic sketch: adaptive and fast network-wide measurements ACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.C.
Matni, N.
A Control-Theoretic Approach to In-Network Congestion Management IEEE/ACM Trans. on Networking Anonymized Internet Traces
2018
Wu, J.
Chen, Y.
Zheng, H.
Approximation algorithms for dependency-aware rule-caching in Software-Defined Networks IEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Wu, H.
Hsiao, H.C.
Asoni, D.E.
Scherrer, S.
Perrig, A.
Hu, Y.C.
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core Intl Conf. on Cryptology and Network Security Anonymized Internet Traces
2018
Wang, Z.
Zhou, C.
Yu, Y.
Xingang, S.
Yin, X.
Yao, J.
Fast detection of heavy hitters in Software Defined Networking using an adaptive and learning method Intl Conf. on Cloud Computing and Security Anonymized Internet Traces
2018
Velarde-Alvarado, P.
Martinez-Pelaez, R.
Mena-Camare, L.
Ochoa-Brust, A.
Iriarte-Solis, A.
Design of a Traffic Generation Platform for Offline Evaluation of NIDS Intl Conf. On Advances In Computing, Control And Networking Anonymized Internet Traces
2018
Ullah, S.
Awan, M. D.
Khiyal, M. S. H.
Big Data in Cloud Computing: A Resource Management Perspective Hindawi Scientific Programming Anonymized Internet Traces
2018
Teixeira, D.R.
Silva, J.M.C.
Lima, S.R.
Deploying Time-based Sampling Techniques in Software-Defined Networking Intl Conf. on Software, Telecommunications and Computer Networks (SoftCOM) Anonymized Internet Traces
2018
Shin, J.Y.
Kirovski, D.
Harper, D.T.
Computing units using directional wireless communication arxiv.org Anonymized Internet Traces
2018
Sharafaldin, I.
Lashkari, A.H.
Ghorbani, A.A.
Toward generating a new intrusion detection dataset and intrusion traffic characterization. Intl Conf. on Information Systems Security and Privacy (ICISSP) Anonymized Internet Traces
Denial of Service Attacks
2018
Saavedra, M. Z.
Yu, W. E.
Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop Intl Symp. on Computing and Networking Workshops (CANDARW) Anonymized Internet Traces
2018
Remedios, R. H.
Nayak, A.
On improving measurement accuracy of DREAM framework with estimation filters IEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Quoc, D. L.
Akkus, I. E.
Bhatotia, P.
Blanas, S.
Chen, R.
Fetzer, C.
Strufe, T.
ApproxJoin: Approximate Distributed Joins ACM Symp. on Cloud Computing Anonymized Internet Traces
2018
Peng, Z.
Li, H.
Hu, C.
DIAL: Distributed Elephant Flow Counting on SDN IEEE Global Communications Conf. (GLOBECOM) Anonymized Internet Traces
2018
Nisioti, A.
Mylonas, A.
Yoo, P. D.
Katos, V.
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods IEEE Communications Surveys and Tutorials Anonymized Internet Traces
2018
Nasr, M.
Bahramali, A.
Houmansadr, A.
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning ACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2018
Narayan, A.
Cangialosi, F.
Raghavan, D.
Goyal, P.
Narayana, S.
Mittal, R.
Alizadeh, M.
Malakrishnan, H.
Restructuring endpoint congestion control Conf. of the ACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Nabiyev, A. Application of clustering methods network traffic for detecting DDoS attacks Problems of information technology Anonymized Internet Traces
2018
Moriarty, K.
Morton, A.
Effects of Pervasive Encryption on Operators Internet Engineering Task Force (IETF) Anonymized Internet Traces
2018
Mitzenmacher, M.
Pontarelli, S.
Reviriego, P.
Adaptive cuckoo filters Proc. Workshop on Algorithm Engineering and Experiments (ALENEX) Anonymized Internet Traces
2018
Meryem, A.
Samira, D.
Bouabid, E. O.
Enhancing Cloud Security using advanced MapReduce k-means on log files Intl Conf. on Software Engineering and Information Management Anonymized Internet Traces
2018
Mao, W.
Shen, Z.
Huang, X.
Facilitating network functions virtualization by exploring locality in network traffic: A proposal Intl Conf. on Computer Science and Artificial Intelligence Anonymized Internet Traces
2018
Lu, J.
Yang, T.
Wang, Y.
Dai, H.
Chen, X.
Jin, L.
Song, H.
Liu, B.
Low Computational Cost Bloom Filters IEEE/ACM Transactions on Networking (TON) Anonymized Internet Traces
2018
Li, X.
Cheng, W.
Zhang, T.
Xie, J.
Ren, F.
Yang, B.
Power efficient high performance packet I/O Intl Conf. on Parallel Processing Article No. 69 Anonymized Internet Traces
2018
Li, H.
Hu, H.
Gu, G.
Ahn, G. J.
Zhang, F.
vNIDS: Towards elastic security with safe and efficient virtualization of Network Intrusion Detection Systems ACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2018
Kumari, A.
Chandra, J.
Sairam, A.
Optimizing flow setup time in software defined network Intl Conf. on Communication Systems and Networks (COMSNETS) Anonymized Internet Traces
2018
Kim, C.
Lee, H.
A High-Bandwidth PCM-Based Memory System for Highly Available IP Routing Table Lookup IEEE Computer Architecture Letters Anonymized Internet Traces
2018
Kao, S. C.
Lee, D. Y.
Chen, T. Y.
Wu, A. Y.
Dynamically updatable ternary segmented aging Bloom filter for OpenFlow-compliant low-power packet processing IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2018
Julian-Moreno, G.
Leira, R.
Lopez de Vergara, J.E.
Gomez-Arribas, F.J.
Gonzalez, I.
On the feasibility of 40 gbps network data capture and retention with general purpose hardware Annual ACM Symp. on Applied Computing Anonymized Internet Traces
2018
Joshi, H. P.
Dutta, R.
GADFly: A fast and robust algorithm to detect P2P botnets in communication graphs IEEE Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2018
Huang, Q.
Lee, P. P. C.
Bao, Y.
Sketchlearn: relieving user burdens in approximate measurement with automated statistical inference ACM Special Interest Group on Data Communication Anonymized Internet Traces
2018
Hu, H.
Zhai, X.
Wang, M.
Hu, G.
Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs) International Conference on Cloud Computing and Security Anonymized Internet Traces
2018
Guo, H.
Heidemann, J.
Detecting IoT Devices in the Internet (Extended) University of Southern California (USC) Anonymized Internet Traces
2018
Girma, A.
Wang, P.
An Efficient Hybrid Model for Detecting Distributed Denial of Service (DDOS) Attacks in Cloud Computing using Multivariate Correlation and Data Mining Clustering Techniques Issues in Information System Anonymized Internet Traces
2018
Geng, N.
Yang, Y.
Xu, M.
Flow-level traffic engineering in conventional networks with hop-by-hop routing Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2018
Fouladi, R.
Kayatas, C.
Anarim, E.
Statistical measures: Promising features for time series based DDoS attack detection Workshop on Computational Intelligence for Multimedia Understanding (IWCIM) Anonymized Internet Traces
Denial of Service Attacks
2018
Fondo-Ferreiro, P.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
QoS-aware energye efficient algorithms for ethernet link aggregates in Software-Defined Networks Intl Conf on Software, Telecommunications and Computer Networks (SoftCOM) Anonymized Internet Traces
2018
Dai, H.
Shahzad, M.
Liu, A. X.
Li, M.
Zhong, Y.
Chen, G.
Identifying and Estimating Persistent Items in Data Streams IEEE/ACM Transactions on Networking Anonymized Internet Traces
2018
Ciftcioglu, E.
Hardy, R.
Chan, K.
Scott, L.
Oliveira, D.
Verma, G.
Chaff allocation and performance for network traffic obfuscation IEEE Intl Conf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2018
Cermak, M.
Jirsik, T.
Velan, P.
Komarkova, J.
Spacek, S.
Drasar, M.
Plesnik, T.
Towards provable network traffic measurement and analysis via semi-labeled trace datasets Network Traffic Measurement and Analysis Conf. (TMA) Anonymized Internet Traces
2018
Cao, Z.
Chen, X.
Sheng, Y.
Ni, H.
Catching the flow with locality sensitive hashing in programmable data planes Intl Conf. on Software Engineering and Service Science (ICSESS) Anonymized Internet Traces
2018
Braud, T.
Heusse, M.
Duda, A.
The virtue of gentleness: Improving connection response times with SYN priority active queue Management IFIP Networking Conf. (IFIP Networking) and Workshops Anonymized Internet Traces
2018
Ben-Basat, R.
Chen, X.
Einziger, G.
Rottenstreich, O.
Efficient Measurement on Programmable Switches Using Probabilistic Recirculation Intl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Friedman, R.
Fast flow volume estimation Pervasive and Mobile Computing Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Friedman, R.
Luizelli, M. C.
Waisbard, E.
Volumetric hierarchical heavy hitters Intl Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2018
Basat, R. B.
Einziger, G.
Feibish, S. L.
Moraney, J.
Raz, D.
Network-wide routing-oblivious heavy hitters Symp. on Architectures for Networking and Communications Systems Anonymized Internet Traces
2018
Atmaca, T.
Kamli, A.
Rataj, A.
Adaptation of the N-GREEN architecture for a bursty traffic Intl Confe. on Computer Networks Anonymized Internet Traces
2018
Amer, M.
Busson, A.
Lassous, I. G.
Association Optimization in Wi-Fi Networks based on the Channel Busy Time Estimation Networking Conf. (IFIP Networking) and Workshops Anonymized Internet Traces
2018
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE) Anonymized Internet Traces
2018
Ahmed, M. E.
Ullah, S.
Kim, H.
Statistical Application Fingerprinting for DDoS Attack Mitigation IEEE Transactions on Information Forensics and Security Anonymized Internet Traces
Denial of Service Attacks
2018
Abu, P.A.
Saavedra, M.Z.
Medalla, A.H.
Yu, W.E.
Adapting block-sized captures for faster network flow analysis on the Hadoop ecosystem IEEE Intl Conf. on Computer and Communications Anonymized Internet Traces
2017
Xu, T.
Gao, D.
Dong, P.
Foh, C.
Zhang, H.
Mitigating the table-overflow attack in Software-Defined Networking IEEE Trans. on Network and Service Management Anonymized Internet Traces
Topology with Archipelago
2017
Saavedra, M.Z.N.L.
Yu, W.E.S.
A comparison between text, Parquet, and PCAP formats for use in distributed network flow analysis on Hadoop J. of Advances in Computer Networks Anonymized Internet Traces
2017
Lee, T.H. Towards an accountable and private Internet ETH Zurich Anonymized Internet Traces
2017
Ghasemi, M. Data-driven management of CDN performance Princeton Univ. Anonymized Internet Traces
2017
Cortes, S.L. Jurisdictional arbitrage: Quantifying and counteracting the threat of government intelligence agencies against Tor Northeastern Univ. Anonymized Internet Traces
2017
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
Memory-efficient and ultra-fast network lookup and forwarding using Othello hashing arxiv.org Anonymized Internet Traces
2017
Rodriguez-Perez, M.
Herreria-Alonso, S.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Delay properties of energy efficient ethernet networks IEEE Communications Lett. Anonymized Internet Traces
2017
Matek, T. Anomaly detection in computer networks using higher-order dependencies Univ. of Ljubljana Anonymized Internet Traces
2017
Varela, J.
Ros, P.
Towards a NetFlow implementation for OpenFlow software-Defined Networks Intl Teletraffic Congress Anonymized Internet Traces
2017
Quoc, D.L.
Chen, R.
Bhatotia, P.
Fetzer, C.
Hilt, V.
Strufe, T.
Approximate stream analytics in Apache Flink and Apache Spark streaming arxiv.org Anonymized Internet Traces
2017
Macia, J.R.S.V. Design of a flow monitoring solution for OpenFlow Software-Defined Networks Univ. of Granada Anonymized Internet Traces
2017
Silveira, F.A.F. Minimizing the number of observers required for traffic matrix generation Fed. Univ. of Espirito Santo Anonymized Internet Traces
Topology with Archipelago
2017
Phan, T.
Bao, N.
Park, M.
Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks J. of Network and Computer Applications Anonymized Internet Traces
Denial of Service Attacks
2017
Luo, H.
Chen, Z.
Li, J.
Vasilakos, A.V.
Preventing distributed Denial-of-Service flooding attacks with dynamic path identifiers IEEE Trans. on Information Forensics and Security Anonymized Internet Traces
Topology with Archipelago
2017
Kim, Y.
Choi, D.
Van, T.
Long, M.
Park, M.
DDoS Detection System Based on Multiple Machine Learning Combination for Software Defined Networking J. of Korean Inst. of Communications and Information Sciences Anonymized Internet Traces
Denial of Service Attacks
2017
Huang, Q.
Lee, P.
Li, R.
Tang, L.
Chen, Y.
Zhang, G.
SketchVisor: Robust network measurement for software packet processing ACM SIGCOMM Anonymized Internet Traces
2017
Guerrero, F.G. Stochastic traffic analysis of contemporary Internet high-speed links Colombian Conf. on Computing Anonymized Internet Traces
2017
Ben-Basat, R.B.
Einziger, G.
Friedman, R.
Luizelli, M.C.
Waisbard, E.
Constant time updates in hierarchical heavy hitters ACM Special Interest Group on Data Communication (SIGCOMM) Anonymized Internet Traces
2017
Sharafaldin, I.
Gharib, A.
Lashkari, A.
Ghorbani, A.
Towards a reliable Intrusion Detection benchmark dataset Software Networking Anonymized Internet Traces
Denial of Service Attacks
2017
Meng, J.
Ren, F.
Lin, C.
Modeling and understanding burst transmission for energy efficient ethernet Computer Networks Anonymized Internet Traces
2017
Kim, T.
Lim, J.
Kim, J.
Cho, W.
Chung, E.
Lee, H.
Scalable bandwidth shaping scheme via adaptively managed parallel heaps in manycore-based network processors ACM Trans. on Design Automation of Electronic Systems Anonymized Internet Traces
2017
Iordache, M.
Jouet, S.
Marnerides, A.
Pezaros, D.
Distributed, multi-level network anomaly detection for datacentre networks IEEE ICC Next Generation Networking and Internet Symp. Anonymized Internet Traces
2017
Wu, N.
Bi, Y.
Michael, N.
Tang, A.
Doyle, J.
Matni, N.
HFTraC: High-frequency traffic control Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2017
Muhammad, A.
Alameka, F.
Integrasi metode normalized reelative network entropy dan neural network backpropagation (BP) Untuk Seteksi Dan Peramalan Serangan DDoS J. Rekayasa Teknologi Informasi Anonymized Internet Traces
Denial of Service Attacks
2017
Mirkovic, J.
Bartlett, G.
Heidemann, J.
Shi, H.
Deng, X.
Do you see me now? Sparsity in passive observations of address liveness Network Traffic Measurement and Analysis Conf. Anonymized Internet Traces
2017
Maltinsky, A.
Giladi, R.
Shavitt, Y.
On network neutrality measurements ACM Trans. on Intelligent Systems and Technology (TIST) Anonymized Internet Traces
2017
Lu, J.
Wan, Y.
Li, Y.
Zhang, C.
Dai, H.
Wang, Y.
Zhang, G.
Liu, B.
Ultra-fast Bloom filters using SIMD techniques Intl Symp. on Quality of Service (IWQoS) Anonymized Internet Traces
2017
Duan, H.
Wang, C.
Yuan, X.
Zhou, Y.
Wang, Q.
Ren, K.
LightBox: SGX-assisted secure network functions at near-native speed arxiv.org Anonymized Internet Traces
2017
Chainourov, B. Log analysis using Splunk Hadoop Connect Naval Postgraduate School Anonymized Internet Traces
2017
Albdair, M.
Addie, R.
Fatseas, D.
Social network behaviour inferred from O-D pair traffic Australian J. of Telecommunications and the Digital Economy Anonymized Internet Traces
2017
Taghouti, M.
Lucani, D.
Fitzek, F.
Bouallegue, A.
Random linear network coding schemes for reduced zero-padding overhead: Complexity and overhead analysis European Wireless Conf. Anonymized Internet Traces
2017
Lopez, E.
Navarro, L.
Tight bounds for sketches in traffic validation Conf. on Networking, Sensing and Control Anonymized Internet Traces
2017
Basat, R.B.
Einziger, G.
Friedman, R.
Kassner, Y.
Randomized admission policy for efficient top-k and frequency estimation Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2017
Basat, R.
Einziger, G.
Friedman, R.
Kassner, Y.
Optimal elephant flow detection IEEE Conf. on Computer Communications Anonymized Internet Traces
2017
Anderson, D.
Bevan, P.
Lang, K.
Liberty, E.
Rhodes, L.
Thaler, J.
A high-performance algorithm for identifying frequent items in data streams arxiv.org Anonymized Internet Traces
2017
Alonso, S.
Perez, M.
Veiga, M.
Garcia, C.
Optimizing dual-mode EEE interfaces: Deep-sleep is healthy IEEE Trans. on Communications Anonymized Internet Traces
2017
Sivaraman, V.
Narayana, S.
Rottenstreich, O.
Muthukrishnan, S.
Rexford, J.
Heavy-hitter detection entirely in the data plane Symp. on SDN Research Anonymized Internet Traces
2017
Remedios, R.H. On improving DREAM framework with estimations and ProgME Univ. of Ottawa Anonymized Internet Traces
2017
Rao, M.
Naidu, M.
A model for generating synthetic network flows and accuracy index for evaluation of anomaly network Intrusion Detection Systems Indian J. Science and Technology Anonymized Internet Traces
2017
Oeldemann, A.
Wild, T.
Herkersdorf, H.
Reducing data center resource over-provisioning through dynamic load management for virtualized network functions Architecture of Computing Systems (ARCS) Anonymized Internet Traces
2017
Lee, T.
Pappas, C.
Perrig, A.
Gligor, V.
Hu, Y.
The case for in-network replay suppression Asia Conf. on Computer and Communications Security Anonymized Internet Traces
Paper Data and Tools
2017
Halas, F. Performance measurement of stream data processing in Apache Spark Masaryk Univ. Anonymized Internet Traces
2017
Ghasemi, M.
Benson, T.
Rexford, J.
Dapper: Data plane performance diagnosis of TCP Symp. on SDN Research Anonymized Internet Traces
2017
Birkner, R.
Gupta, A.
Feamster, N.
Vanbever, L.
SDX-based flexibility or Internet correctness?: Pick two! Symp. on SDN Research (SOSR) Anonymized Internet Traces
Topology with BGP
2017
Skrastins, A. Resource and admission management in Next Generation Networks Riga Tech. Univ. Anonymized Internet Traces
2017
Duffield, N.
Xu, Y.
Xia, L.
Ahmed, N.
Yu, M.
Stream aggregation through order sampling arxiv.org Anonymized Internet Traces
2017
Cascone, C.
Bifulco, R.
Pontarelli, S.
Capone, A.
Relaxing state-access constraints in stateful programmable data planes arxiv.org Anonymized Internet Traces
2017
Boro, D.
Bhattacharyya, D.K
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks Microsystem Technologies Anonymized Internet Traces
Denial of Service Attacks
2017
Bhaya, W.
Manaa, M.E.
DDoS attack detection approach using an efficient cluster analysis in large data scale Conf. on New Trends in Information and Communications Technology Applications (NTICT) Anonymized Internet Traces
Denial of Service Attacks
2017
Vasiliadis, G.
Koromilas, L.
Polychronakis, M.
Ioannidis, S.
Design and implementation of a stateful network packet processing framework for GPUs IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2017
Suarez-Varela, J.
Barlet-Ros, P.
Reinventing NetFlow for OpenFlow Software-Defined Networks arxiv.org Anonymized Internet Traces
2017
Lazarou, G.
Alam, M.
Picone, J.
Measuring the variability of CAIDA internet traffic traces Conf. on Computer and Information Technology Anonymized Internet Traces
2017
Engel, D.
Malone, W.
Integrated information as a metric for group interaction: Analyzing human and computer groups using a technique developed to measure consciousness arxiv.org Anonymized Internet Traces
2017
Deng, J.
Li, H.
Hu, H.
Wang, K.C.
Ahn, G.J.
Zhao, Z.
Han, W.
On the safety and efficiency of virtual firewall elasticity control Network and Distributed System Security Symp. (NDSS) Anonymized Internet Traces
2017
Afek, Y.
Barr, A.
Feibish, S.
Schiff, L.
Detecting heavy flows in the SDN match and action model arxiv.org Anonymized Internet Traces
2017
Zazo, J.F.
Lopez-Buedo, S.
Ruiz, M.
Sutter, G.
A single-FPGA architecture for detecting heavy hitters in 100 Gbit/s ethernet links Intl Conf. on ReConFigurable Computing and FPGAs (ReConFig) Anonymized Internet Traces
2017
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A concise forwarding information base for scalable and fast name lookups Intl Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2017
Xiao, Q.
Chen, S.
Zhou, Y.
Chen, M.
Luo, J.
Li, T.
Ling, Y.
Cardinality estimation for elephant flows: A compact solution based on virtual register sharing IEEE/ACM Trans. on Networking Anonymized Internet Traces
2017
Vannucci, L. Indexing and compression of network flows Univ, of Pisa Anonymized Internet Traces
2017
Tai, K. S.
Sharan, V.
Bailis, P.
Valiant, G.
Finding Heavily-Weighted Features in Data Streams arxiv.org Anonymized Internet Traces
2017
Suarez-Varela, J.
Barlet-Ros, P.
Carela-Espanol, V.
A NetFlow/IPFIX implementation with OpenFlow SDN-Polygraph Anonymized Internet Traces
2017
Quoc, D. L.
Chen, R.
Bhatotia, P.
Fetzer, C.
Hilt, V.
Strufe, T.
StreamApprox: approximate computing for stream analytics ACM/IFIP/USENIX Middleware Conf. Anonymized Internet Traces
2017
Norige, E. Hardware algorithms for high-speed packet processing Michigan State Univ. Anonymized Internet Traces
2017
Nasr, M.
Houmansadr, A.
Mazumdar, A.
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis ACM SIGSAC Conf. on Computer and Communications Security Anonymized Internet Traces
2017
Monge, M. A. S.
Vidal, J. M.
Villalba, L. J. G.
Reasoning and Knowledge Acquisition Framework for 5G Network Analytics Sensors Anonymized Internet Traces
2017
Mirkovic, J.
Kline, E.
Reiher, P.
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense Annual Computer Security Applications Conf. Anonymized Internet Traces
Topology with BGP
2017
Lee, K. Towards precise network measurements Cornell Univ. Anonymized Internet Traces
2017
Lazaris, A.
Prasanna, V. K.
DeepFlow: a deep learning framework for software-defined measurement Workshop on Cloud-Assisted Networking Anonymized Internet Traces
2017
Kolesnikov, A. Load modelling and generation in IP-based networks arxiv.org Anonymized Internet Traces
2017
Joo, Y.I.
Park, M.
An efficient DDoS attack detection mechanism based on distributed self organizing map Intl J. of Applied Engineering Research Anonymized Internet Traces
Denial of Service Attacks
2017
Huong, T.
Thanh, N.
Software defined networking-based one-packet DDoS mitigation architecture Conf. on Ubiquitous Information Management and Communication (IMCOM) Anonymized Internet Traces
2017
Fu, J.
Zhang, K.
Practical Concurrent Self-Organizing Lists Intl Conf. on Parallel and Distributed Systems (ICPADS) Anonymized Internet Traces
2017
Conti, M.
Gangwal, A.
Blocking intrusions at border using software defined-internet exchange point (SD-IXP) Conf. on Network Function Virtualization and Software Defined Networks (NFV-SDN) Anonymized Internet Traces
2017
Conti, M.
Gangwal, A.
Gaur, M. S.
A comprehensive and effective mechanism for DDoS detection in SDN Intl Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob) Anonymized Internet Traces
2017
Chen, S.
Chen, M.
Xiao, Q.
Per-flow cardinality measurement Traffic Measurement for Big Network Data Anonymized Internet Traces
2017
Cenedese, A.
Tramarin, F.
Vitturi, S.
An energy efficient ethernet strategy based on traffic prediction and shaping IEEE Trans. on Communications Anonymized Internet Traces
UCSD Network Telescope
2017
Atifi, A.
Bou-Harb, E.
On correlating network traffic for cyber threat intelligence: A Bloom filter approach Intl Wireless Communications and Mobile Computing Conf. (IWCMC) Anonymized Internet Traces
2016
Xia, Q.
Chen, T.
Xu, W.
CIDS: Adapting legacy Intrusion Detection Systems to the cloud with hybrid sampling Intl Conf. on Computer and Information Technology Anonymized Internet Traces
2016
Saldana, J. What to do with the Wi-Fi wild west Horizon Anonymized Internet Traces
2016
Javadi, M.M. Timely, accurate, and scalable network management for data centers Univ. of Southern California Anonymized Internet Traces
2016
Hendawi, A.
Alali, F.
Wang, X.
Guan, Y.
Zhou, T.
Liu, X.
Basit, N.
Stankovic, J.
Hobbits: Hadoop and Hive based Internet traffic analysis IEEE Conf. on Big Data Anonymized Internet Traces
2016
Gharib, A.
Sharafaldin, I.
Lashkari, A.
Ghorbani, A.
An evaluation framework for Intrusion Detection dataset Conf. on Information Science and Security Anonymized Internet Traces
Denial of Service Attacks
2016
Chen, C.
Perrig, A.
PHI: Path-hidden lightweight anonymity protocol at network layer Proc. on Privacy Enhancing Technologies Anonymized Internet Traces
Topology with BGP
2016
Bayati, A.
Asghari, V.
Nguyen, K.
Cheriet, M.
Gaussian process regression based traffic modeling and prediction in high-speed networks Global Comm. Conf. (GLOBECOM) Anonymized Internet Traces
2016
Aral, A. Resource mapping optimization for distributed cloud services Istanbul Technical Univ. Anonymized Internet Traces
2016
Albdair, M.
Addie, R.
Fatseas, D.
Inference of social network behavior from Internet traffic traces Conf. on Telecommunication Networks and Applications (ITNAC) Anonymized Internet Traces
2016
Narayana, S.
Sivaraman, A.
Nathan, V.
Alizadeh, M.
Walker, D.
Rexford, J.
Jeyakumar, V.
Kim, C.
Hardware-software co-design for network performance measurement ACM Workshop on Hot Topics in Networks Pages Anonymized Internet Traces
2016
Moraney, J.
Raz, D.
Efficient detection of flow anomalies with limited monitoring resources Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2016
Li, C.
Chen, Z.
Zheng, W.
Wu, Y.
Cao, J.
BAH: A bitmap index compression algorithm for fast data retrieval Conf. on Local Computer Networks (LCN) Anonymized Internet Traces
2016
Lee, T.
Pappas, C.
Szalachowski, P.
Perrig, A.
Communication based on per-packet one-time addresses Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2016
Katta, N. Building efficient and reliable software-defined networks Princeton Univ. Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
A probabilistic sampling method for efficient flow-based analysis J. of Communications and Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Huang, Q.
Lee, P.
Toward high-performance distributed stream processing via approximate fault tolerance Proc. of the Very Large Data Bases Endowment Anonymized Internet Traces
2016
Dey, P.
Yuksel, M.
CAR: Cloud-assisted routing Conf. on Network Function Virtualization and Software Defined Networks Anonymized Internet Traces
2016
Nguyen, H.
Begin, T.
Busson, A.
Lassous, I.
Evaluation of an end-to-end delay estimation in the case of multiple flows in SDN networks Conf. on Network and Service Management Anonymized Internet Traces
2016
Namayanja, J.
Janeja, V.
Characterization of evolving networks for cybersecurity Information Fusion for Cyber-Security Analytics, Ch. 5 Anonymized Internet Traces
2016
Retnaswamy, B.
Ponniah, K.
A new ontology?based multi agent framework for intrusion detection Intl J. of Communication Systems Anonymized Internet Traces
2016
Hintze, D
Rice, A.
Picky: efficient and reproducible sharing of large datasets using Merkle-trees Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2016
Zhou, Z. Per-flow cardinality estimation based on virtual LogLog sketching Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2016
Yu, Y.
Belazzougui, D.
Qian, C.
Zhang, Q.
A concise forwarding information base for scalable and fast flat name switching arxiv.org Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Sketch-guided filtering support for detecting superspreaders in high-speed networks Electronics Letters Anonymized Internet Traces
2016
Song, T.
Jiang, Z.
Wei, Y.
Shi, X.
Ma, X.
Ormond, O.
Traffic aware energy efficient router: Architecture, prototype and algorithms IEEE J. on Selected Areas in Communications Anonymized Internet Traces
2016
Singh, N.
Singh, K.
De, T.
Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection Conf. on Informatics and Analytics Anonymized Internet Traces
Denial of Service Attacks
2016
Meitei, I.
Singh, K.
De, T.
Detection of DDoS DNS amplification attack using classification algorithm Conf. on Informatics and Analytics Anonymized Internet Traces
2016
Liu, Z.
Manousis, A.
Vorsanger, X.
Sekar, V.
Braverman, V.
One sketch to rule them all: Rethinking network flow monitoring with UnivMon ACM SIGCOMM Anonymized Internet Traces
2016
Liu, P.
Li, Y.
Sang, Y.
Zhang, J.
Anonymity-based privacy preserving network data publication Trustcom/BigDataSE/ISPA Anonymized Internet Traces
2016
Dao, N.-N.
Kim, J.
Park, M.
Cho, S.
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks PLoS One Anonymized Internet Traces
2016
Pontarelli, S.
Reviriego, P.
Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput IEEE Internet Computing Anonymized Internet Traces
2016
Phan, T.
Toan, T.
Tuyen, D.
Huong, T.
Nguyen, T.
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks Conf. on Communications and Electronics Anonymized Internet Traces
Denial of Service Attacks
2016
Phan, T.
Bao, N.
Park, M.
A novel hybrid flow-based handler with DDoS attacks in Software-Defined Networking Conf. on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Anonymized Internet Traces
Denial of Service Attacks
2016
Foroushani, V.A. A security framework based on flow marking IP-traceback techniques Dalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Chen, Y.
Wang, S.
A novel network flow watermark embedding model for efficient detection of stepping-stone intrusion based on entropy Conf. on e-Learning, e-Business, Enterprise Information Systems, and e-Government Anonymized Internet Traces
2016
Cermak, M.
Tovarnak, D.
Lastovicka, M.
Caleda, P.
A performance benchmark for NetFlow data analysis on distributed stream processing systems Network Operations and Management Symp. Anonymized Internet Traces
2016
Xu, X.
Zhang, J.
Li, Q.
Equalized interval centroid based watermarking scheme for stepping stone traceback Conf. on Data Science in Cyberspace Anonymized Internet Traces
2016
Xing, C
Ding, K.
Hu, C.
Chen, M.
Sample and fetch-based large flow detection mechanism in Software Defined Networks IEEE Comm. Letters Anonymized Internet Traces
2016
Wu, Y.
Chen, Z.
Cao, J.
Li, H.
Li, C.
Wang, Y.
Zheng, W.
Chang, J.
Zhou, J.
Hu, Z.
Guo, J.
CAMP: A new bitmap index for data retrieval in traffic archival IEEE Comm. Letters Anonymized Internet Traces
2016
Sahri, N.
Okamura, K.
Adaptive query rate for anomaly detection with SDN Intl J. of Computer Science and Network Security Anonymized Internet Traces
2016
Huang, T.
Sethu, H.
Kandasamy, N.
A new approach to dimensionality reduction for anomaly detection in data traffic arxiv.org Anonymized Internet Traces
2016
Hofstede, R. Flow-based compromise detection Univ. of Twente Anonymized Internet Traces
2016
Einziger, G.
Fellman, B.
Friedman, R.
Kassner, Y.
ICE buckets: improved counter estimation for network measurement arxiv.org Anonymized Internet Traces
2016
Cermak, M.
Celeda, P.
Detecting advanced network threats using a similarity search Conf. on Autonomous Infrastructure, Management, and Security Anonymized Internet Traces
2016
Abada, A. Resource optimization of TCAM-based SDN measurements via diminishing-points autodetection European Conf. on Networks and Communications Anonymized Internet Traces
2016
Wellem, T.
Lai, Y.-K.
Huang, C.-Y.
Chung, Y.-W.
Toward hardware support for a flexible sketch-based network traffic monitoring system IEEE Region 10 Symp. (TENSYMP) Anonymized Internet Traces
2016
Fairbanks, J. Graph analysis combining numerical, statistical, and streaming techniques Georgia Inst. of Technology Anonymized Internet Traces
2016
Asoni, D.E.
Chen, C.
Barrera, D.
Perrig, A.
On building onion routing into future Internet architectures Workshop on Open Problems in Network Security (iNetSec) Anonymized Internet Traces
2016
Sahri, N. Research on performance and security improvements by Software Defined Network Kyushu Univ. Anonymized Internet Traces
2016
Pan, T.
Huang, T.
Liu, J.
Zhang, J.
Yang, F.
Li, S.
Liu, Y.
Fast content store lookup using locality-aware skip list in Content-Centric Networks Conf. on Computer Comm. Workshops Anonymized Internet Traces
2016
Krishnan, D.
Quoc, D.
Bhatotia, P.
Fetzer, C.
Rodrigues, R.
IncApprox: A data analytics system for incremental approximate computing Conf. on World Wide Web Anonymized Internet Traces
2016
Bozakov, Z.
Rizk, A.
Bhat, D.
Zink, M.
Measurement-based flow characterization in centrally controlled networks Conf. on Computer Communications Anonymized Internet Traces
2016
Ben-Basat, R.
Einziger, G.
Friedman, R.
Heavy hitters in streams and sliding windows IEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2016
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Autonomous system based flow marking scheme for IP-Traceback IEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
Denial of Service Attacks
Topology with Skitter
2016
Zhao, T.
Li, T.
Han, B.
Sun, Z.
Huang, J.
Design and implementation of Software Defined Hardware Counters for SDN Computer Networks Anonymized Internet Traces
2016
Qian, S.
Wu, G.
Huang, J.
Das, T.
Benchmarking modern distributed streaming platforms Conf. on Industrial Technology (ICIT) Anonymized Internet Traces
2016
Liu, X.
Shirazipour, M.
Yu, M.
Zhang, Y.
MOZART: Temporal coordination of measurement Proc. Symp. on SDN Research (SOSR) Anonymized Internet Traces
2016
Lim, H.
Sekar, V.
Abe, Y.
Anderson, D.G.
NetMemex: Providing full-fidelity traffic archival arxiv.org Anonymized Internet Traces
2016
Lei, C.
Zhang, H.
Liu, Y.
Du, X.
Net-flow fingerprint model based on optimization theory Arabian J. for Science and Engineering Anonymized Internet Traces
2016
Katta, N.
Alipourfard, O.
Rexfor, J.
Walker, D.
CacheFlow: Dependency-aware rule-caching for Software-Defined Networks Symp. on SDN Research Anonymized Internet Traces
2016
Boro, D.
Basumatary, H.
Goswami, T.
Bhattacharyya, D.K.
UDP Flooding attack detection using information metric measure Conf. on ICT for Sustainable Development Anonymized Internet Traces
2016
Xie, Y.
Wang, Y.
He, H.
Xiang, Y.
Yu, S.
Liu, X.
A general collaborative framework for modeling and perceiving distributed network behavior IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2016
Silva, J.M.C. A modular traffic sampling architecture for flexible network measurements Univ. do Minho, Braga, PT Anonymized Internet Traces
2016
Perakovic, D.
Perisa, M.
Cvitic, I.
Husnjak, S.
Artificial neuron network implementation in detection and classification of DDoS traffic Telecommunications Forum (TELFOR) Anonymized Internet Traces
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Performance of flow-based anomaly detection in sampled traffic J. of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Intelligent sampling using an optimized neural network J. of Networks Anonymized Internet Traces
Denial of Service Attacks
2016
Garroppo, R.G.
Nencioni, G.
Procissi, G.
Tavanti, L.
The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs J. Computer Networks Anonymized Internet Traces
2016
Einziger, G.
Friedman, R.
Counting with TinyTable: Every Bit Counts! Intl Conf. on Distributed Computing and Networking (ICDN) Anonymized Internet Traces
2016
Abaci, H.
Parr, G.
McClean, S.
Moore, A.
Krug, L.
Using genetic algorithms to optimise dynamic power saving in communication links subject to quality of service requirements Sustainable Computing: Informatics and Systems Anonymized Internet Traces
2015
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
SCREAM: Sketch Resource Allocation for Software-defined Measurement ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2015
Li, C.
Yang, J.
Wang, Z.
Li, F.
Yang, Y.
A lightweight DDoS flooding attack detection algorithm based on synchronous long flows Global Communications Conf. (GLOBECOM) Anonymized Internet Traces
Denial of Service Attacks
2015
Jadidi, Z.
Muthukkumarasamy, V.
Sithirasenan, E.
Singh, K.
Flow-based anomaly detection using semisupervised learning Conf. on Signal Processing and Communication Systems (ICSPCS) Anonymized Internet Traces
Denial of Service Attacks
2015
Huang, T. Adaptive sampling and statistical inference for anomaly detection Drexel Univ. Anonymized Internet Traces
2015
Chen, Z.
Luo, H.
Zhang, M.
Li, J.
Improving network security by dynamically changing path identifiers in future Internet Global Communications Conf. (GLOBECOM) Anonymized Internet Traces
2015
Chen, X.-F.
Yu, S.-Z.
CIPA: A collaborative intrusion prevention architecture for programmable network and SDN Computers and Security Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Zhang, Z.
Guo, Z.
Yang, Y.
Bounded-reorder packet scheduling in optical cut-through switch IEEE Trans. on Parallel and Distributed Systems Anonymized Internet Traces
2015
Venkatesh, B.
Choudhury, S.H.
Nagajara, S.
Balakrishnan, N.
BotSpot: fast graph based identification of structured P2P bots J. Computer Virology and Hacking Techniques Anonymized Internet Traces
2015
Righi, M.
Nunes, R.
Deteccao de DDoS Atraves da Analise da Recorrencia Baseada na Extracao de Caracteristicas Dinamicas Simposio Brasileiro em Seguranca da Informacao e Sistemas Anonymized Internet Traces
Denial of Service Attacks
2015
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Statistical analysis on aggregate and flow based traffic features distribution Conf. on Wireless and Telematics (ICWT) Anonymized Internet Traces
Denial of Service Attacks
2015
Liu, Z.
Vorsanger, G.
Braverman, V.
Sekar, V.
Enabling a RISC approach for Software-Defined Monitoring using universal streaming ACM Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Lei, C.
Zhang, H.
Li, M.
Liu, Y.
Network watermarking model based on optimization theory Conf. on Cloud Computing and Big Data (CCBD) Anonymized Internet Traces
2015
Jadidi, Z. Flow-based anomaly detection in high-speed networks Griffith Univ. Anonymized Internet Traces
2015
Huang, T.
Sethu, H.
Kandasamy, N.
A fast algorithm for detecting anomalous changes in network traffic Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Alipourfard, O.
Moshref, M.
Yu, M.
Re-evaluating measurement algorithms in software Workshop on Hot Topics in Networks (HotNets) Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Deterministic flow marking for IPv6 traceback (DFM6) Conf. on Network and Service Management (CNSM) Anonymized Internet Traces
2015
Wu, H. Efficient large flow detection over arbitrary windows: an exact algorithm outside an ambiguity region Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2015
Saldana, J.
Forcen, I.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Improving network efficiency with Simplemux Conf. on Computer and Information Technology (CIT) Anonymized Internet Traces
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A method to protect Bloom filters from soft errors Symp. on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) Anonymized Internet Traces
2015
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, M.
Frame coalescing in dual-mode EEE arxiv.org Anonymized Internet Traces
2015
Erazo, M.A.
Rong, R.
Liu, J.
Symbiotic network simulation and emulation ACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2015
Chen, C.
Asoni, D.E.
Barrera, D.
Danezis, G.
Perrig, A.
HORNET: High-speed onion routing at the network layer Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
Topology with BGP
2015
Basescu, C.
Reischuk, R.M.
Szalachowski, P.
Perrig, A.
Zhang, Y.
Hsiao, H.-C.
Kubota, A.
Urakawa, J.
SIBRA: Scalable Internet Bandwidth Reservation Architecture arxiv.org Anonymized Internet Traces
Topology with BGP
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Probabilistic flow marking for IP traceback (PFM) Workshop on Reliable Networks Design and Modeling (RNDM) Anonymized Internet Traces
Denial of Service Attacks
2015
Rivetti, N.
Busnel, Y.
Mostefaoui, A.
Efficiently summarizing data streams over sliding windows Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
Denial of Service Attacks
2015
de Oliviera Schmidt, R.
Sadre, R.
Sperotto, A.
van den Berg, H.
Pras, A.
Impact of packet sampling on link dimensioning IEEE Trans. on Network and Service Management Anonymized Internet Traces
2015
Anceaume, E.
Busnel, Y.
Rivetti, N.
Sericola, B.
Identifying global icebergs in distributed streams Symp. on Reliable Distributed Systems (SRDS) Anonymized Internet Traces
Denial of Service Attacks
2015
Moreno, V.
Ramos, J.
Santiado del Rio, P.M.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Commodity packet capture engines: tutorial, cookbook and applicability IEEE Communications Surveys and Tutorials Anonymized Internet Traces
2015
Moreno, V.
Leira, R.
Gonzalez, I.
Gomez-Arribas, F.J.
Towards high-performance network processing in virtualized environments Symp. on High Performance Computing and Communications (HPCC) Anonymized Internet Traces
2015
Liu, Q.
Lui, J.C.S.
He, C.
Pan, L.
Fan, W.
Shi, Y.
SAND: A fault-tolerant streaming architecture for network traffic analytics J. Systems and Software Anonymized Internet Traces
2015
Li, X.
Qian, C.
The virtual network function placement problem Computer Communications Student Workshops Anonymized Internet Traces
2015
Li, X.
Qian, C.
Low-complexity multi-resource packet scheduling for network function virtualization Conf. on Computer Communications Anonymized Internet Traces
2015
Kim, M.
Jung, S.
Park, M.
A distributed self-organizing map for DoS attack detection Conf. on Ubiquitous and Future Networks Anonymized Internet Traces
Denial of Service Attacks
2015
Albiltaje, H. Detecting DDoS attack using a multilayer data mining techniques Islamic Univ. of Gaza Anonymized Internet Traces
2015
Popescu, I.
Miyazaki, T.
Chino, M.
Wang, X.
Okamoto, S.
Gravey, A.
Gravey, P.
Veeraraghavan, M.
Brandt-Pearce, M.
Yamanaka, N.
Application-centric energy-efficient Ethernet with quality of service support Electronics Letters Anonymized Internet Traces
2015
Ding, H.
Rabinovich, M.
TCP stretch acknowledgements and timestamps: Findings and implications for passive RTT measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2015
Xiao, Q.
Chen, S.
Chen, M.
Ling, Y.
Hyper-compact virtual estimators for Big Network Data based on register sharing Intl Conf. on Measurement and Modeling of Computer Systems Anonymized Internet Traces
2015
Padreny, I.G. Sistema de deteccion de ataques DDoS en Tor Univ. Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Osuna, R. Estudio de captura y almacenamiento de trafico en redes fisicas y virtuales multi-Gigabit Univ. Autonoma de Madrid Anonymized Internet Traces
2015
Martin, J. Sistema de deteccion de ataques DDoS en Tor Univ. Complutense de Madrid Anonymized Internet Traces
Denial of Service Attacks
2015
Addanki, R.
Maji, S.
Veeraraghavan, M.
Tracy, C.
A measurement-based study of big-data movement Conf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2015
Zhang, Z.
Wang, B.
Lan, J.
Identifying elephant flows in internet backbone traffic with bloom filters and LRU Computer Communications Anonymized Internet Traces
2015
Wellem, T.
Lai, Y.-K.
Chung, W.-Y.
A software defined sketch system for traffic monitoring Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2015
Sharma, S. Shuffling based mechanism for DDoS prevention on cloud environment Natl Inst. of Technology, Rourkela Anonymized Internet Traces
Denial of Service Attacks
2015
Namayanja, J.M.
Janeja, V.P.
Change detection in evolving computer networks: Changes in densification and diameter over time Conf. on Intelligence and Security Informatics (ISI) Anonymized Internet Traces
2015
Mokgolodi, K. Traffic prediction in cloud computing using time series models Univ. of Botswana Anonymized Internet Traces
2015
Mijumbi, R.
Serrat, J.
Gorricho, J.-L.
Self-managed resources in network virtualisation environments Symp. on Integrated Network Management (IM) Anonymized Internet Traces
2015
Ayesta, U.
Bertaux, L.
Carvin, D.
Non-intrusive scheduling of TCP flows IFIP Networking Conf. Anonymized Internet Traces
2015
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
Investigating unique flow marking for tracing back DDoS attacks Symp. on Integrated Network Management (IM) Anonymized Internet Traces
Denial of Service Attacks
2015
Steinert, R.
Hess, A.
Observing software-defined networks using a decentralized link monitoring approach Conf. on Network Softwarization (NetSoft) Anonymized Internet Traces
2015
Saldana, J.
de Hoz, D.
Fernandez-Navajas, J.
Ruiz-Mas, J.
Pascual, F.
Lopez, D.R.
Florez, D.
Castell, J.A.
Nunez, M.
Small-packet flows in Software Defined Networks: Traffic profile optimization J. of Networks Anonymized Internet Traces
2015
Radan, M.
Keslassy, I.
Tapping into the routers unutilized processing power Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2015
Einziger, G.
Fellman, B.
Kassner, Y.
Independent counter estimation buckets Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2015
Danelutto, M.
De Sensi, D.
Torquati, M.
Energy driven adaptivity in stream parallel computations Euromicro Conf. on Parallel, Distributed, and Network-Based Processing Anonymized Internet Traces
2015
Balkanli, E. A comprehensive study on one-way backscatter traffic analysis Dalhousie Univ., Halifax, CA Anonymized Internet Traces
Denial of Service Attacks
UCSD Network Telescope
2015
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
A synergetic use of Bloom filters for error detection and correction IEEE Trans. on Very Large Scale Integration (VLSI) Systems Anonymized Internet Traces
2015
Papapetrou, O.
Garofalakis, M.
Deligiannakis, A.
Sketching distributed sliding-window data streams VLDB J. Anonymized Internet Traces
2015
Fairbanks, J.
Kannan, R.
Park, H.
Bader, D.
Behavioral clusters in dynamic graphs Parallel Computing Anonymized Internet Traces
2015
Chen, J.
Addie, R.G.
Zukerman, M.
Neame, T.D.
Performance evaluation of a queue fed by a Poisson Lomax burst process IEEE Communications Letters Anonymized Internet Traces
2015
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Shen, M.
Xu, K.
Yang, K.
A neuro-fuzzy approach to self-management of virtual network resources J. Expert Systems with Applications Anonymized Internet Traces
2015
Singh, S.A. Techniques for online analysis of large distributed data Iowa State Univ., Ames, IO, US Anonymized Internet Traces
2015
Sahri, N.M.
Okamura, K.
Adaptive anomaly detection for SDN Asia-Pacific Advanced Network Anonymized Internet Traces
2015
Kulbis, A. Distributed port scan detection in network traffic Kauno Technologijos Univ. Anonymized Internet Traces
2014
Lu, R.
Wu, G.
Xie, B.
Hu, J.
StreamBench: Towards benchmarking modern distributed stream computing frameworks Conf. on Utility and Cloud Computing (UCC) Anonymized Internet Traces
2014
Barik, R.
Divakaran, D.M.
Development and experimentation of TCP initial window function Conf. on Network of the Future (NOF) Anonymized Internet Traces
2014
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
The CB tree: a practical concurrent self-adjusting search tree Distributed Computing Anonymized Internet Traces
2014
Wang, H.
Lee, K.S.
Li, E.
Lum, C.L.
Tang, A.
Weatherspoon, K.
Timing is everything: Accurate, minumum overhead, available bandwidth estimation in high-speed wired networks Internet Measurement Conf. (IMC) Anonymized Internet Traces
2014
Lai, Y.
Wellem, T.
You, H.-P.
Hardware-assisted estimation of entropy norm for high-speed network traffic IET Electronics Lett. Anonymized Internet Traces
2014
Xiao, Q.
Qiao, Y.
Zhen, M.
Chen, S.
Estimating the persistent spreads in high-speed networks IEEE Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Tuyen, D.V.
Truong, T.H.
Hung, N.T.
Puype, B.
Colle, D.
Steenhaut, K.
Thanh, N.H.
An enhanced deterministic flow marking technique to efficiently support detection of network spoofing attacks Conf. on Advanced Technologies for Communications (ATC) Anonymized Internet Traces
2014
Song, T.
Shi, X.
Ma, X.
Fine-grained power scaling algorithms for energy efficient routers Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2014
Pontarelli, S.
Reviriego, P.
Maestro, J.A.
Efficient flow sampling with back-annotated cuckoo hashing IEEE Communications Letters Anonymized Internet Traces
2014
Namayanja, J.M.
Janeja, V.P.
Change detection in temporally evolving computer networks: A big data framework Conf. on Big Data Anonymized Internet Traces
2014
Korosi, A.
Tapolcai, J.
Mihalka, B.
Meszaros, G.
Retvari, G.
Compressing IP forwarding tables: Realizing information-theoretical space bounds and fast lookups simultaneously Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2014
Gardiner, J.
Nagaraja, S.
On the reliability of network measurement techniques Used for malware traffic analysis Cambridge Intl Workshop on Security Protocols Anonymized Internet Traces
2014
Ekiz, N.
Amer, P.D.
Transport layer reneging Computer Communications Anonymized Internet Traces
2014
Yu, Y.
Qian, C.
Li, X.
Distributed and collaborative traffic monitoring in software defined networks Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2014
Tunc, C.
Akar, N.
Mapping time-varying IP traffic to flexible optical paths in flexgrid optical networks Photonic Network Communications Anonymized Internet Traces
2014
Privalov, A.Y.
Tsarev, A.
Analysis and simulation of WAN traffic by self-similar traffic model with OMNET Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Pecori, R
Veltri, L.
A statistical blind technique for recognition of internet traffic with dependence enforcement Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2014
Moshref, M.
Yu, M.
Govindan, R.
Vahdat, A.
DREAM: Dynamic Resource Allocation for Software-defined Measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2014
McHale, L.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for SDN data plane matching ICNP14 Workshop on Control, Operation, and Application in SDN Protocols (CoolSDN) Anonymized Internet Traces
2014
Luao, H.
Cui, J.
Chen, G.
Chen, Z.
Zhang, H.
On the applicability of software defined networking to large scale networks Conf. on Computer Communication and Networks (ICCCN) Anonymized Internet Traces
2014
Barati, M.
Abdullah, A.
Udzir, N.I.
Mahmod, R.
Mustapha, N.
Distributed Denial of Service detection using hybrid machine learning technique Symp. on Biometrics and Security Technologies (ISBAST) Anonymized Internet Traces
Denial of Service Attacks
2014
Schmidt, R.
Sadre, R.
A. Sperotto, A.
van den Berg, H.
Pras, A.
A hybrid procedure for efficient link dimensioning Computer Networks Anonymized Internet Traces
2014
Moreno, V.
Santiado del Rio, P.M.
Ramos, J.
Muelas, B.
Garcia-Dorado, J.L.
Gomez-Arribas, F.J.
Aracil, J.
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems Intl J. Network Management Anonymized Internet Traces
2014
Frangoudis, P.A.
Hadjadj-Aoul, Y.
Ksentini, A.
Rubino, G.
Etame, T.
Brun, C.
PTPv2-based network load estimation and its application to QoE monitoring for Over-the-Top services Conf. on Information, Intelligence, Systems and Applications (IISA) Anonymized Internet Traces
2014
Shahzad, M.
Liu, A.X.
Noise can help: Accurate and efficient per-flow latency measurement without packet probing and time stamping ACM Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS) Anonymized Internet Traces
2014
Schmidt, R.
Sadre, R.
Melnikov, N.
Schonwalder, J.
Pras, A.
Linking network usage patterns to traffic Gaussianity fit IFIP Networking Conf. Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Contributions to efficient resource management in virtual networks IFIP Conf. on Autonomous Infrastructure, Management and Security (AIMS) Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
Famaey, J.
De Turck, F.
Neural network-based autonomous allocation of resources in virtual networks European Conf. on Networks and Communications (EuCNC) Anonymized Internet Traces
2014
Hsiao, H.-C. Toward a highly available future Internet Carnegie Mellon Univ. Anonymized Internet Traces
Topology with BGP
Topology with Skitter
2014
Zhou, X.
Petrovic, M.
Eskridge, T.
Carvalho, M.
Tao, X.
Exploring Netflow data using Hadoop ASE BigData/SocialCom/Cybersecurity Conf. Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Energy efficient exact matching for flow identification with cuckoo affinity hashing IEEE Communications Letters Anonymized Internet Traces
2014
Mijumbi, R.
Gorricho, J.-L.
Serrat, J.
Claeys, M.
De Turck, F.
Latre, S.
Design and evaluation of learning algorithms for dynamic resource management in virtual networks IEEE/IFIP Network Operations and Management Symp. (NOMS) Anonymized Internet Traces
2014
Liu, B.
Lu, J.
Kai, Y.
Wang, Y.
Pan, T.
Power-proportional router: Architectural design and experimental evaluation Quality of Service (IWQoS) Symp. Anonymized Internet Traces
2014
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
TDFA: Traceback-based defense against DDoS flooding attacks IEEE Int Conf. on Advanced Information Networking and Applications (AINA) Anonymized Internet Traces
Denial of Service Attacks
2014
Wang, H.
Lee, K.S.
Weatherspoon, H.
PHY convert channels: Can you see the idles? Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Handigol, N.
Heller, B.
Jeyakumar, V.
Mazieres, D.
McKeown, N.
I know what your packet did last hop: Using packet histories to troubleshoot networks Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2014
Masud, M.M.
Mustafa, U.
Trabelsi, Z.
A data driven firewall for faster packet filtering Conf. on Communications and Networking (ComNet) Anonymized Internet Traces
2014
Kim, J.-S.
Ko, M.-C.
Nam, J.
Kim, J.
Bitmap-based prefix caching for fast IP lookup KSII Trans on Internet and Information Systems Anonymized Internet Traces
2014
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Efficient implementation of error correction codes in hash tables Microelectronics Reliability Anonymized Internet Traces
2014
Kudo, T.
Takin, T.
On-line detection of persistently high packet-rate flows via a sliding window scheme with random packet sampling Intl J. of Network Management Anonymized Internet Traces
UCSD Network Telescope
2013
Zhang, Y.
Sun, Y.
Zhang, J.
Xu, J.
Wu, Y.
An efficient framework for parallel and continuous frequent item monitoring Concurrency Computation: Practice and Experience Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Socket overloading for fun and cache-poisoning Computer Security Applications Conf. (ACSAC) Anonymized Internet Traces
2013
Larsen, R. Slow port scanning with Bro Gjovik Univ. College, Gjovik, Norway Anonymized Internet Traces
2013
Chen, J.
Addie, R.G.
Zukerman, M.
Performance evaluation and service rate provisioning for a queue with fractional Brownian input Performance Evaluation Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation EURASIP J. on Information Security Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Sperotto, A.
Pras, A.
Lightweight link dimensioning using sFlow sampling Conf. on Network and Services Management (CNSM) Anonymized Internet Traces
2013
Retvari, G.
Tapolcai, J.
Korosi, A.
Majdan, A.
Heszberger, Z.
Compressing IP forwarding tables: towards entropy bounds and beyond ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2013
Lee, M.
Duffield, N.
Kompella, R.R.
High-fidelity per-flow delay measurements with reference latency interpolation IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2013
Iqbal, M.F.
Holt, J.
Ryoo, J.H.
John, L.K.
de Veciana, G.
Flow migration on multicore network processors: Load balancing while minimizing packet reordering Conf. on Parallel Processing (ICPP) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Shulman, H.
Off-path hacking: the illusion of challenge-response authentication IEEE Security and Privacy Anonymized Internet Traces
2013
Casey, C.J.
Sutton, A.
Dos Reis, G.
Sprintson, A.
Eliminating network protocol vulnerabilities through abstraction and systems language design Conf. on Network Protocols (ICNP) Anonymized Internet Traces
2013
Karpowicz, M. On the design of energy-efficient service rate control mechanisms: CPU frequency control for Linux Tyrrhenian Intl Workshop on Digital Communications - Green ICT (TIWDC) Anonymized Internet Traces
2013
Herzberg, A.
Shulman, H.
Vulnerable delegation of DNS resolution European Symp. on Research in Computer Security (ESORICS) Anonymized Internet Traces
2013
Garfinkel, S.L.
Shick, M.
Passive TCP reconstruction and forensic analysis with tcpflow Naval Postgraduate School, Monterey, CA, US Anonymized Internet Traces
2013
Frangoudis, P.A.
Ksentini, A.
Hadjadj-Aoul, Y.
Boime, G.
PTPv2-based metwork load estimation Symp. on Precision Clock Synchronization for Measurement Control and Communication (ISPCS) Anonymized Internet Traces
2013
Moshref, M.
Yu, M.
Govindan, R.
Resource/accuracy tradeoffs in software-defined measurement ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2013
Megyesi, P.
Molnar, S.
Analysis of elephant users in broadband network traffic EUNICE/IFIP WG 6.6 Workshop: Advances in Communication Networking Anonymized Internet Traces
2013
Iqbal, M.F. Workload-aware network processors: improving performance while minimizing power consumption Univ. Texas, Austin Anonymized Internet Traces
2013
Hu, Y.-H. A fluid-based approach for modeling network activities J Electr Electron Syst Anonymized Internet Traces
2013
Coelho, N.
Salvador, P.
Nogueira, A.
Inter-operator traffic differentiation based on multiscale analysis ThinkMind, Conf. on Advances in Future Internet (AFIN) Anonymized Internet Traces
2013
Reviriego, P.
Pontarelli, S.
Maestro, J.A.
Ottavi, M.
Reducing the cost of implementing error correction codes in content addressable memories IEEE Trans. on Circuits and Systems II: Express Briefs Anonymized Internet Traces
2013
Guo, Z.
Yang, Y.
High-speed multicast scheduling for all-optical packet switches Conf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2013
Ghoshal, P.
Casey, C.J.
Gratz, P.V.
Sprintson, A.
Stochastic pre-classification for Software Defined Firewalls IEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2013
Santiago, S.S. Latency estimation of IP flows using NetFlow Univ. Politecnica de Catalunya, Barcelona, Spain Anonymized Internet Traces
2013
Namayanja, J.M.
Janeja, V.P.
Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks IEEE Conf. on Intelligence and Security Informatics Anonymized Internet Traces
2013
Leira, R.
Gomez, P.
Gonzalez, I.
Lopez de Vergara, J.E.
Multimedia flow classification at 10 Gbps using acceleration techniques on commodity hardware Conf. on Smart Communications in Network Technologies (SaCoNeT) Anonymized Internet Traces
2013
Joslyn, C.
Choudhury, S.
Haglin, D.
Howe, B.
Nickless, B.
Olsen, B.
Massive scale cyber traffic analysis: A driver for graph database research Workshop on Graph Data Management Experiences and Systems (GRADES) Anonymized Internet Traces
Denial of Service Attacks
2013
Iacovazzi, A.
Baiocchi, A.
Investigating the trade-off between overhead and delay for full packet traffic privacy IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2013
Handigol, N.A. Using packet histories to troubleshoot networks Stanford Univ., Stanford, CA, US Anonymized Internet Traces
2013
Fokkema, J. A study of impacts of flow timeouts on link provisioning Twente Student Conf. on IT Anonymized Internet Traces
2013
Clegg, R.G.
Araujo, J.T.
Landa, R.
Mykoniati, E.
Griffin, D.
Rio, M.
On the relationship between fundamental measurements in TCP flows IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2013
Zadnik, M. Optimization of network flow monitoring Information Sciences and Technologies Bulletin of the ACM Slovakia Anonymized Internet Traces
2013
Schmidt, R.
Sadre, R.
Pras, A.
Gaussian traffic revisited IFIP Networking Conf. Anonymized Internet Traces
2013
Santiago del Rio, P.M. Internet traffic classification for high-performance and off-the-shelf systems Univ. Autonoma de Madrid Anonymized Internet Traces
2013
Petkov, V.
Rajagopal, R.
Obraczka, K.
Characterizing per-application network traffic using entropy ACM Trans. on Modeling and Computer Simulation (TOMACS) Anonymized Internet Traces
2013
Liu, H. A collaborative defense framework against DDoS attacks in networks Washington State Univ., Pullman, WA, US Anonymized Internet Traces
Denial of Service Attacks
2013
Erazo, M.A.
Liu, J.
Leveraging symbiotic relationship between simulation and emulation for scalable network experimentation Conf. on Principles of Advanced Discrete Simulation (SIGSIM-PADS) Anonymized Internet Traces
2013
Aghaei-Foroushani, V.
Zincir-Heywood, A.N.
On evaluating IP traceback schemes: a practical perspective IEEE Security and Privacy Workshops Anonymized Internet Traces
2013
Yu, M.
Jose, L.
Miao, R.
Software defined traffic measurement with OpenSketch Usenix Symp. on Networked Systems Design and Implementation (NSDI) Anonymized Internet Traces
2013
Gilad, Y.
Herzberg, A.
Fragmentation considered vulnerable ACM Trans. on Information and System Security (TISSEC) Anonymized Internet Traces
2013
Ahmadzadeh, S.A.
Agnew, G.
Turbo covert channel: An iterative framework for covert communication over data networks IEEE INFOCOM Anonymized Internet Traces
2013
Hofstede, R.
Drago, I.
Sperotto, A.
Sadre, R.
Pras, A.
Measurement artifacts in NetFlow data Passive and Active Measurement (PAM) Anonymized Internet Traces
2013
He, G.-F.
Yang, M.
Luo, J.-Z.
Zhang, L.
Online identification of Tor anonymous communication traffic J. of Software Anonymized Internet Traces
2013
Gangam, S.
Chandrashekar, J.
Cunha, I.
Kurose, J.
Estimating TCP latency approximately with passive measurements Passive and Active Measurement (PAM) Anonymized Internet Traces
2013
Dautrich Jr, J.L.
Ravishankar, C.V.
Inferential time-decaying Bloom filters Conf. on Extending Database Technology (EDBT) Anonymized Internet Traces
2013
De Sensi, D. DPI over commodity hardware: implementation of a scalable framework using FastFlow Univ. Pisa, Pisa, IT Anonymized Internet Traces
2013
Kim, S.
Nam, S.Y.
A long range dependent Internet traffic model using unbounded Johnson distribution IEICE Trans. on Communications Anonymized Internet Traces
2012
Liu, W.
Yan, Y.
Dong, T.
Run-hua, T.
Self-similarity and heavy-tail of ICMP traffic J. Computers Anonymized Internet Traces
2012
Detal, G.
Paasch, C.
van der Linden, S.
Merindol, P.
Avoine, G.
Bonaventure, O.
Revisiting flow-based load balancing: Stateless path selection in data center networks Computer Networks Anonymized Internet Traces
2012
Coelho, N.M.M. Profiling de trafego inter-operador baseado em analise multi-escalar Univ. de Aveiro Anonymized Internet Traces
2012
Basaran, C.
Kang, K.-D.
Zhou, Y.
Suzer, M.H.
Adaptive load shedding via fuzzy control in data stream management systems Conf. on Service-Oriented Computing and Applications (SOCA) Anonymized Internet Traces
2012
Santiago del Rio, P.M.
Rossi, D.
Gringoli, F.
Nava, L.
Salgarelli, L.
Aracil, J.
Wire-speed statistical classification of network traffic on commodity hardware Internet Measurement Conf. (IMC) Anonymized Internet Traces
2012
Moriyama, E.
Takahashi, T.
Miyamoto, D.
DNS-based defense against IP spoofing attacks Conf. on Neural Information Processing Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
A GI/G/1 model for 10 Gb/s energy efficient ethernet links IEEE Trans. on Communications Anonymized Internet Traces
2012
Ekiz, N. Transport layer reneging Univ. Delaware Anonymized Internet Traces
2012
Zhang, X.
Ding, W.
Comparative research on internet flows characteristics Conf. on Networking and Distributed Computing Comparative Research on Internet Flows Characteristics Anonymized Internet Traces
2012
Weinberg, Z.
Wang, J.
Yegneswaran, V.
Briesemeister, L.
Cheung, S.
Wang, F.
Boneh, D.
StegoTorus: a camouflage proxy for the Tor anonymity system ACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2012
Moreno, V.
Santiago del Rio, P.M.
Ramos, J.
Garnica, J.
Garcia-Dorado, J.L.
Batch to the future: analyzing timestamp accuracy of high-performance packet I/O engines IEEE Communications Lett. Anonymized Internet Traces
2012
Kim, J.
Park, M.
Han, S.
Kim, J.
An efficient prefix caching scheme with bounded prefix expansion for high-speed IP lookup IEICE Trans. on Communications Anonymized Internet Traces
2012
Kato, M.
Cho, K.
Honda, M.
Tokuda, H.
Monitoring the dynamics of network traffic by recursive multi-dimensional aggregation Workshop on Managing Systems Automatically and Dynamically Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Efficient traffic aware power management in multicore communications processors ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Cao, Z.
Panwar, S.S.
Efficient buffering and scheduling for a single-chip crosspoint-queued switch ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2012
Afek, Y.
Kaplan, H.
Korenfeld, B.
Morrison, A.
Tarjan, R.E.
CBTree: A practical concurrent self-adjusting search tree Distributed Computing (DISC) Anonymized Internet Traces
2012
Xiaojuan, S.
Bin, L.
Stream data analysis for backbone network intrusion detection system Conf. on Oxide Materials for Electronic Engineering (OMEE) Anonymized Internet Traces
2012
Mogul, J.C.
Congdon, P.
Hey, you darned counters!: get off my ASIC! ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN) Anonymized Internet Traces
2012
Lin, Z
Hopper, N.
New attacks on timing-based network flow watermarks Usenix Security Conf. (SEC) Anonymized Internet Traces
2012
He, P.
Guan, H.
Xie, G.
Salamatian, K.
Evaluating and optimizing IP lookup on many core processors IEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Gringoli, F.
Nava, L.
Este, A.
Salgarelli, L.
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2012
Detti, A.
Pomposini, M.
Blefari-Melazzi, N.
Salsano, S.
Supporting the Web with an information centric network that routes by name Computer Networks Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Multiadaptive sampling for lightweight network measurements IEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2012
Lin, Z. Toward building practical privacy enhancing technologies Univ. Minnesota Anonymized Internet Traces
2012
Ishakian, V.
Akinwumi, J.
Esposito, F.
Matta, I.
On supporting mobility and multihoming in recursive internet architectures Computer Communications Anonymized Internet Traces
2012
Zhao, Y.
Yuan, R.
Wang, W.
Meng, D.
Zhang, S.
Li, J.
A hardware-based TCP stream state tracking and reassembly solution for 10G backbone traffic Conf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2012
Yang, T.
Duan, R.
Lu, J.
Zhang, S.
Dai, H.
Liu, B.
CLUE: Achieving fast update over compressed table for parallel lookup with reduced dynamic redundancy Conf. on Distributed Computing Systems (ICDCS) Anonymized Internet Traces
2012
Silva, J.M.C.
Lima, S.R.
Optimizing network measurements through self-adaptive sampling Conf. on High Performance Computing and Communication (HPCC) Anonymized Internet Traces
2012
Qardaji, W.
Li, N.
Anonymizing network traces with temporal pseudonym consistency Conf. on Distributed Computing Systems Workshops (ICDCSW) Anonymized Internet Traces
2012
Markman, M.A.J.
Tokheim, S.
Reliable broadcast contribution over the public Internet Norwegian Univ. of Science and Technology Anonymized Internet Traces
2012
Kuang, J.
Bhuyan, L.
Klefstad, R.
Traffic-aware power optimization for network applications on multicore servers Design Automation Conf. Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Bounded energy consumption with dynamic packet coalescing Networks and Optical Communications (NOC) Anonymized Internet Traces
2012
Hanay, Y.S.
Li, W.
Tessier, R.
Wolf, T.
Saving energy and improving TCP throughput with rate adaptation in Ethernet IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2012
Guo, Z.
Yang, Y.
High speed multicast scheduling in hybrid optical packet switches with guaranteed latency IEEE Trans. on Computers Anonymized Internet Traces
2012
Fragni, C.
Costa, L.H.M.K.
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers Computer Networks Anonymized Internet Traces
2012
Davy, A.
Jennings, B.
Botvich, D.
QoSPlan: A measurement based quality of service aware network planning framework J. Network and Systems Management Anonymized Internet Traces
2012
Melazzi, N.B.
A. Detti, A.
Pomposini, M.
Scalability measurements in an information-centric network Measurement Methodology and Tools, First European Workshop, FP7 FIRE/EULER Project Anonymized Internet Traces
2012
Korenfeld, B. CBTree: A practical concurrent self-adjusting search tree Tel-Aviv Univ., Israel Anonymized Internet Traces
2012
Fan, J.
Hu, C.
He, K.
Jiang, J.
Liuy, B.
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling IEEE INFOCOM Anonymized Internet Traces
2012
Zhang, H.
Lu, G.
Qassrawi, M.T.
Zhang, Y.
Yu, X.
Feature selection for optimizing traffic classification Computer Communications Anonymized Internet Traces
2012
Verma, H.
Yadav, B.
Bansal, P.
Raj, S.
IPv4 to IPv6 shift: major challenges J. Engineering and Innovative Technology (IJEIT) Anonymized Internet Traces
2012
Tawakol, A. Performance analysis of TCAMs in switches Univ. Waterloo, Ontario, CA Anonymized Internet Traces
2012
Iqbal, M.F.
John, L.K.
Power and performance analysis of network traffic prediction techniques IEEE Symp. on Performance Analysis of Systems and Software (ISPASS) Anonymized Internet Traces
2012
Zhang, W.
Bi, J.
Wu, J.
Zhang, B.
Catching popular prefixes at AS border routers with a prediction based method Computer Networks Anonymized Internet Traces
2012
Tsidon, E.
Hanniel, I.
Keslassy, I.
Estimators also need shared values to grow together IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Kanizo, Y.
Keslassy, I.
The variable-increment counting Bloom filter IEEE INFOCOM Anonymized Internet Traces
2012
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter? IEEE INFOCOM Anonymized Internet Traces
2012
Pan, T.
Guo, X.
Zhang, C.
Jiang, J.
Wu, H.
Liu, B.
Tracking millions of flows in high speed networks for application identification IEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2012
Lee, C.
Lee, D.K.
Moon, S.
Unmasking the growing UDP traffic in a campus network Passive and Active Measurement (PAM) Anonymized Internet Traces
2012
Houmansadr, A.
Kiyavash, N.
Borisov, N.
Non-blind watermarking of network flows arxiv.org Anonymized Internet Traces
2012
Herreria-Alonso, S.
Rodriguez-Perez, M.
Fernandez-Veiga, M.
Lopez-Garcia, C.
Optimal configuration of energy-efficient ethernet Computer Networks Anonymized Internet Traces
2012
Gilbert, J. Scalable wavelet-based active network stepping stone detection Air Force Inst. of Technology, Air Univ, Anonymized Internet Traces
2012
Lee, M.
Duffield, N.
Kompella, R.R.
Opportunistic flow-level latency estimation using consistent NetFlow IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2012
Kanizo, Y.
Hay, D.
Keslassy, I.
Maximizing the throughput of cuckoo hashing in network devices ComNet, Technion, Israel Anonymized Internet Traces
2012
Shpiner, A.
Keslassy, I.
Cohen, R.
Reducing the reordering delay in multi-core network processors ComNet, Technion, Israel Anonymized Internet Traces
2012
Martinez, V.M. Development and evaluation of a low-cost scalable architecture for network traffic capture and storage for 10Gbps networks Univ. Autonoma de Madrid Anonymized Internet Traces
2012
Houmansadr, A. Design, analysis, and implementation of effective network flow watermarking schemes Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2012
Blefari-Melazzi, N.
Cancellieri, M.
Detti, A.
Pomposini, M.
Salsano, S.
The CONET solution for information centric networking Univ. Rome Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Behavioral graph analysis of Internet applications IEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2011
Vishwanath, A.
Sivaraman, V.
Zhao, Z.
Russell, C.
Thottan, M.
Adapting router buffers for energy efficiency ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Anonymized Internet Traces
2011
Moreno, S.D.B. Evaluacion de desempeno de diversas arquitecturas de commutadores opticos Univ. de los Andes, Facultad de Ingenieria, Bogota, Colombia Anonymized Internet Traces
2011
Matias, R.
Carvalho, A.M.M.
Teodoro, V.A.
Tes, D.
Araujo, L.B.
Performance comparison of forecasting models applied to LAN/MAN traffic prediction IEEE Workshop on Local and Metropolitan Area Networks (LANMAN) Anonymized Internet Traces
2011
Hua, N.
Norige, E.
Kumar, S
Lynch, B.
Non-crypto hardware hash functions for high performance networking ASICs Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2011
Houmansadr, A.
Nguyen, G.T.K.
Caesar, M.
Borisov, N.
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability ACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2011
Guo, Z.
Yang, Y.
Pipelining multicast scheduling in all-optical packet switches with delay guarantee Intl Teletraffic Congress (ITC) Anonymized Internet Traces
2011
Clegg, R.
Landa, R.
Rio, M.
Criticisms of modelling packet traffic using long-range dependence (extended version) J. Computer and System Sciences Anonymized Internet Traces
2011
Spinelli, L.P. Caracterizacao e identificacao de papeis e vertices em redes de conexao e redes aleatorias Univ. Federal Do Rio de Janeiro, Brazil Anonymized Internet Traces
2011
Detti, A.
Melazzi, N.B.
Salsano, S.
Pomposini, M.
CONET: a content centric inter-networking architecture ACM SIGCOMM Workshop on Information-Centric Networking (ICN) Anonymized Internet Traces
2011
Venkataramanan, R.
Jeong, M.-W.
Prabhakar, B.
A flow- and packet-level model of the Internet Univ. Michigan Anonymized Internet Traces
2011
Marsan, M.A.
Fernandez Anta, A.
Mancuso, V.
Rengarajan, B.
Vasallo, P.
Rizzo, G.
A simple analytical model for energy efficient ethernet IEEE Communications Lett. Anonymized Internet Traces
2011
Leiva, A.
Finochietto, J.M.
Huiszoon, B.
Lopez, V.
Tarifeno, M.
Aracil, J.
Beghelli, A.
Comparison in power consumption of static and dynamic WDM networks Optical Switching and Networking Anonymized Internet Traces
2011
Larrabeiti, D.
Reviriego, P.
Hernandez, J.A.
Maestro, J.A.
Uruena, M..
Towards an energy efficient 10 Gb/s optical ethernet: Performance analysis and viability Optical Switching and Networking Anonymized Internet Traces
2011
Valgenti, V.C.
Paul, R.R.
Kim, M.S.
Netshuffle: Improving traffic trace anonymization through graph distortion IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2011
Rottenstreich, O.
Keslassy, I.
The Bloom paradox: When not to use a Bloom filter ComNet, Technion, Israel Anonymized Internet Traces
2011
Grieco, L.A.
Barakat, C.
Marzulli, M.
Spectral models for bitrate measurement from packet sampled traffic IEEE Trans. on Network and Service Management Anonymized Internet Traces
2011
Mothersole, I.
Reed, M.J.
Optimising rule order for a packet filtering firewall Conf. on Network and Information Systems Security (SAR-SSI) Anonymized Internet Traces
2011
He, F.
Xiang, F.
Yibo Xue, Y.
Jun Li, J.
Towards high-performance network application identification with aggregate-flow cache arxiv.org Anonymized Internet Traces
2011
Xu, K.
Wang, F.
Gu, L.
Network-aware behavior clustering of Internet end hosts IEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
UCSD Network Telescope
2011
Ekiz, N.
Rahman, A.H.
Amer, P.D.
Misbehaviors in TCP SACK generation ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2011
Dusi, M.
Gringoli, F.
Salgarelli, L.
Quantifying the accuracy of the ground truth associated with Internet traffic traces Computer Networks Anonymized Internet Traces
2011
Reviriego, P.
Huiszoon, B.
Lopez, V.
Coenen, R.B.
Hernandez, J.A.
Maestro, J.A.
Improving energy efficiency in IEEE 802.3ba high-rate ethernet optical links IEEE J. Selected Topics in Quantum Electronics Anonymized Internet Traces
2011
Jose, L.
Yu, M.
Rexford, J.
Online measurement of large traffic aggregates on commodity switches Usenix Conf. Hot-ICE Anonymized Internet Traces
2011
Houmansadr, A.
Borisov, N.
SWIRL: A scalable watermark to detect correlated network flows Symp. on Network and Distributed System Security (NDSS) Anonymized Internet Traces
2011
Schear, N. Preventing encrypted traffic analysis Univ. Illinois, Urbana-Champaign Anonymized Internet Traces
2011
Pouzols, F.M.
Lopez, D.R.
Barros, A.B.
Predictive models of network traffic load Studies in Computational Intelligence Anonymized Internet Traces
2011
Liu, H.
Sun, Y.
Valgenti, V.C.
Kim, M.S.
TrustGuard: A flow-level reputation-based DDoS defense system Conf. on Consumer Communications and Networking (CCNC) Anonymized Internet Traces
Denial of Service Attacks
2010
He, K.
Hu, C.
Jiang, J.
Zhou, Y.
Liu, B.
A2C: Anti-attack counters for traffic measurement IEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2010
Haider, A.
Acharya, K.
Raja, M.Y.A.
Cross-layer TCP flow aware model for energy efficient use of FP lasers in passive optical networks High-Capacity Optical Networks and Enabling Technologies (HONET) Anonymized Internet Traces
2010
Mouchos, C.
Tsokanos, A.
Kouvatsos, D.D.
Dynamic OBS offset allocation in WDM networks Computer Communications Anonymized Internet Traces
2010
Zadnik, M.
Canini, M.
Evolution of cache replacement policies to track heavy-hitter flows Symp. on Architectures for Networking and Communications Systems (ANCS) Anonymized Internet Traces
2010
Saxena, M.
Kompella, R.
CLAMP: Efficient class-based sampling for flexible flow monitoring Computer Networks Anonymized Internet Traces
2010
Kanizo, Y.
Hay, D.
Keslassy, I.
Hash tables with finite buckets are less resistant to deletions Allerton Conf. on Communication, Control and Computing Anonymized Internet Traces
2010
Scappini, R. Estudio del Trafico Autosimilar Orientado a la Simulacion Mediante la Utilizacion de Wavelets u Onditas Facultad de Informatica, Univ. Nacional de la Plata Anonymized Internet Traces
2010
Santiago del Rio, P.M.
Ramos, J.
Salvador, A.
de Vergara, J.E.L.
Aracil, J.
Cuadra, A.
Cutanda, M.
Application of Internet traffic characterization to all-optical networks Conf. on. Transparent Optical Networks (ICTON) Anonymized Internet Traces
2010
Yuan, R.
Weibing, Y.
Mingyu, C.
Xiaofang, Z.
Jianping, F.
Robust TCP reassembly with a hardware-based solution for backbone traffic Conf. on Networking, Architecture and Storage (NAS) Anonymized Internet Traces
2010
Woldeselassie, M.
Clegg, R.
Rio, M.
Forecasting full-path network congestion using one bit signalling IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2010
Reviriego, P.
Larrabeiti, D.
Maestro, J.A.
Would energy efficient ethernet be effective on 10Gbps optical links? OSA Photonics in Switching (PS) Anonymized Internet Traces
2010
Fenacci, D.
Franke, B.
Empirical evaluation of data transformations for network infrastructure applications Conf. on Embedded Computer Systems: Architectures, MOdeling and Simulation (SAMOS X) Anonymized Internet Traces
Topology with Archipelago
2010
Zhang, N.
Wang, F.
Gong, B.
Li, L.
Identifying heavy-hitter flows fast and accurately Conf. on Future Computer and Communication (ICFCC) Anonymized Internet Traces
2010
Reviriego, P.
Sanchez-Macian, A.
Maestro, J.A.
Bleakley, C.J.
Increasing the MTU size for energy efficiency in ethernet IET Signals and Systems Conf. (ISSC) Anonymized Internet Traces
2010
Lee, D.
Carpenter, B.E.
Brownlee, N.
Observations of UDP to TCP ratio and port numbers Conf. on Internet Monitoring and Protection (ICIMP) Anonymized Internet Traces
2010
Hansen, H.V.
Goebel, V.
Plagemann, T.
Siekkinen, M.
Resource adaptive distributed information sharing Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE ) Anonymized Internet Traces
2010
Gremillet, O.
Goncalves, P.
Vicat-Blanc Primet, P.
Dupas, A.
Traffic classification techniques supporting semantic networks Wireless Communications and Mobile Computing (IWCMC) Anonymized Internet Traces
2010
Moon, D. Achieving flexibility and performance for packet forwarding and data center management UC Berkeley Anonymized Internet Traces
2010
Lee, M.
Duffield, N.
Kompella, R.
Two samples are enough: Opportunistic flow-level latency estimation using NetFlow IEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Parallelizing weighted frequency counting in high-speed network monitoring Computer Communications Anonymized Internet Traces
2010
Zhang, Y.
Fang, B.X.
Zhang, Y.Z.
Identifying heavy hitters in high-speed network monitoring Science China Information Sciences Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
FlexPath NP - flexible, dynamically reconfigurable processing paths in network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 17 Anonymized Internet Traces
2010
Albrecht, C.
Foag, J.
Koch, R.
Maehle, E.
Pionteck, T.
DynaCORE - dynamically reconfigurable coprocessor for network processors Dynamically reconfigurable systems, architectures, design methods and applications, Ch. 16 Anonymized Internet Traces
2010
John, W. Characterization and classification of internet backbone traffic Chalmers Univ. of Technology, Gothenborg, Sweden Anonymized Internet Traces
2010
Ohlendorf, R.
Meitinger, M.
Wild, T.
Herkersdorf, A.
An application-aware load balancing strategy for network processors Conf. on High performance embedded architectures and compilers (HIPEAC) Anonymized Internet Traces
2010
Moon, D.
Naous, J.
Liu, J.
Zarifis, K.
Casado, M.
Koponen, T.
Shenker, S.
Breslau, L.
Bridging the software/hardware forwarding divide semanticscholar.org Anonymized Internet Traces
2009
Sellke, H.
Wang, C.-C.
Bagchi, S.
Shroff, N.B.
Camouflaging timing channels in web traffic Purdue Univ. Anonymized Internet Traces
2009
Beheshti-Zavareh, N. Tiny buffers for electronic and optical routers Stanford Univ., Stanford, CA, US Anonymized Internet Traces
2009
Schear, N.
Borisov, N.
Preventing SSL traffic analysis with realistic cover traffic ACM Conf. on Computer and Communications Security (CCS) Anonymized Internet Traces
2009
Jiang, W.
Prasanna, V.K.
Reducing dynamic power dissipation in pipelined forwarding engines IEEE Conf. on Computer Design (ICCD) Anonymized Internet Traces
2009
Zhang, M.
Dusi, M.
John, W.
Chen, C.
Analysis of UDP traffic usage on internet backbone links Symp. on Applications and the Internet (SAINT) Anonymized Internet Traces
2009
Este, A.
Gringoli, F.
Salgarelli, L.
Support Vector Machines for TCP traffic classification Computer Networks Anonymized Internet Traces
2009
Andreou, M.S. Message traceback systems. Dancing with the devil Univ. Newcastle upon Tyne Anonymized Internet Traces
Topology with Skitter
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
Joint entropy analysis model for DDoS attack detection Conf. on Information Assurance and Security (IAS) Anonymized Internet Traces
UCSD Network Telescope
2009
Rahmani, H.
Sahli, N.
Kamoun, F.
A traffic coherence analysis model for DDoS attack detection Conf. on Security and Cryptography (SECRYPT) Anonymized Internet Traces
UCSD Network Telescope
2009
Vishwanath, K.V.
Vahdat, A.
Swing: Realistic and responsive network traffic generation IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Ishakian, V.
Akinwumi, J.
Matta, I.
On the cost of supporting multihoming and mobility Boston Univ., CS Dept. Anonymized Internet Traces
2009
Clegg, R.G.
Withall, M.S.
Moore, A.W.
Phillips, I.W.
Parish, D.J.
Rio, M.
Landa, R.
Haddadi, H.
Kyriakopoulos, K.
Auge, J.
Clayton, R.
Salmon, D.
Challenges in the capture and dissemination of measurements from high-speed networks IET Communications Anonymized Internet Traces
2009
Brugger, S.T. The quantitative comparison of computer networks UC Davis Anonymized Internet Traces
2009
Saxena, M.
Kompella, R.
A framework for efficient class-based sampling IEEE Conf. on Computer Communications (INFOCOM) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Does the internet still demonstrate fractal nature? IEEE Conf. on Networking (ICN) Anonymized Internet Traces
2009
Idzikowski, F. Search and analysis of backbone traffic measurements in the internet Technische Univ. Berlin (TKN-09-004) Anonymized Internet Traces
2009
Terdik, G.
Gyires, T.
Levy flights and fractal modeling of internet traffic IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2009
Maiolini, G.
Molina, G.
Baiocchi, A.
Rizzi, A.
On the fly application flows identification by exploiting K-means based classifiers J. Information Assurance and Security Anonymized Internet Traces
2009
Kanizo, Y.
Hay, D.
Keslassy, I.
Optimal dynamic hash tables ComNet, Technion, Israel Anonymized Internet Traces
2009
Andreou, M.S.
van Moorsel, A.
COTraSE Connection Oriented Traceback in Switched Ethernet J. Information Assurance and Security Anonymized Internet Traces
2008
Casado, M.
Koponen, T.
Moon, D.
Shenker, S.
Rethinking packet forwarding hardware ACM SIGCOMM HotNets Workshop Anonymized Internet Traces
2008
Baiocchi, A.
Maiolini, G.
Molina, G.
Rizzi, A.
On-the-fly statistical classification of internet traffic at application layer based on cluster analysis Workshop on Computational Intelligence in Security for Information Systems (CISIS) Anonymized Internet Traces
2008
Andreou, M.
Moorsel, A.
COTraSE: Connection Oriented Traceback in Switched Ethernet Conf. on Information Assurance and Security Anonymized Internet Traces
Topology with Skitter
2008
Dusi, M.
Gringoli, F.
Salgarelli, L.
IP traffic classification for QoS guarantees: the independence of packets IEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2008
Pouzols, F.M.
Barriga, A.
Lopez, D.R.
Sanchez-Solano, S.
Linguistic summarization of network traffic flows IEEE Conf. on Fuzzy Systems (FUZZ-IEEE) Anonymized Internet Traces
2008
Shevtekar, A.
Ansari, N.
A router-based technique to mitigate reduction of quality (RoQ) attacks Computer Networks Anonymized Internet Traces
2008
Clegg, R.
Landa, R.
Haddadi, H.
Rio, M.
Moore, A.W.
Techniques for flow inversion on sampled data IEEE INFOCOM Workshop Global Internet Symp. Anonymized Internet Traces
2008
Meitinger, M.
Ohlendorf, R.
Wild, T.
Herkersdorf, A.
A hardware packet re-sequencer unit for network processors Architecture of Computing Systems (ARCS) Anonymized Internet Traces
2008
Raspall, F.
Sallent, S.
Adaptive shared-state sampling Internet Measurement Conf. (IMC) Anonymized Internet Traces
2008
Proebstel, E. Characterizing and improving distributed Network-based Intrusion Detection Systems (NIDS): timestamp synchronization and sampled traffic UC Davis Anonymized Internet Traces
2008
Este, A.
Gringoli, F.
Salgarelli, L.
An SMV-based approach to traffic classification Univ. Brescia Anonymized Internet Traces
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
Network performance analysis based on histogram workload models IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Anonymized Internet Traces
2007
Shevtekar, A.
Ansari, N.
A proactive test based differentiation to mitigate low rate DoS attacks IEEE Conf. on Computer Communications and Networks (ICCCN) Anonymized Internet Traces
2007
Whitehead, B.
Lung, C.-H.
Rabinovitch, P.
A TCP connection establishment filter: symmetric connection detection IEEE Conf. on Communications (ICC) Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation UC Riverside Anonymized Internet Traces
Topology with Skitter
2007
Clegg, R.
Haddadi, H.
Landa, R.
Rio, M.
Towards informative statistical flow inversion arxiv.org Anonymized Internet Traces
2007
Haddadi, H.
Landa, R.
Rio, M.
Bhatti, S.
Revisiting the issues on netflow sample and export performance arxiv.org Anonymized Internet Traces
2007
Yuan, L.
Chuah, C.
Mohapatra, P.
ProgME: towards programmable network measurement ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Salgarelli, L.
Gringoli, F.
Karagiannis, T.
Comparing traffic classifiers ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2007
Iliofotou, M.
Pappu, P.
Faloutsos, M.
Mitzenmacher, M.
Singh, S.
Varghese, G.
Network monitoring using traffic dispersion graphs (TDGs) Internet Measurement Conf. (IMC) Anonymized Internet Traces
Topology with Skitter
2007
Hernandez-Orallo, E.
Vila-Carbo, J.
A histogram-based stochastic process for finite buffer occupancy analysis Conf. on Performance Evaluation Methodologies and Tools (VALUETOOLS) Anonymized Internet Traces
2007
Clegg, R. Simulating internet traffic with Markov-modulated processes UK Performance Engineering Workshop Anonymized Internet Traces
2006
Park, J.
Tyan, H.-R.
Jay Kuo, C.-C.
GA-based internet traffic classification technique for QoS provisioning Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) Anonymized Internet Traces
2006
Okuno, M.
Nishimura, S.
Ishida, S.
Nishi, H.
Cache-based network processor architecture: evaluation with real network traffic IEICE Trans. on Electronics Anonymized Internet Traces
2006
Vishwanath, K.
Vahdat, A.
Realistic and responsive network traffic generation ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Varghese, G.
Fingerhut, J.
F. Bonomi, F.
Detecting evasion attacks at high speeds without reassembly ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
2006
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links IEEE/ACM Trans. on Networking (TON) Anonymized Internet Traces
2006
Clegg, R. Markov-modulated on/off processes for long-range dependent internet traffic arxiv.org Anonymized Internet Traces
2006
Constantinou, F.
Mavrommatis, P.
Identifying known and unknown peer-to-peer traffic IEEE Symp. on Network Computing and Applications (NCA) Anonymized Internet Traces
2006
Wang, H.
Lin, Y.
Jin, Y.
Cheng, S.
Easily-implemented adaptive packet sampling for high speed networks flow measurement Conf. on Computational Science (ICCS) Anonymized Internet Traces
2006
Kumar, S.
Maschmeyer, J.
Crowley, P.
Exploiting locality to ameliorate packet queue contention and serialization ACM Conf. on Computing Frontiers Anonymized Internet Traces
2006
Chen, Y.
Hwang, K.
Collaborative change detection of DDoS attacks on community and ISP networks IEEE Symp. on Collaborative Technologies and Systems (CTS) Anonymized Internet Traces
2006
Shriram, A.
Kaur, J.
Empirical study of the impact of sampling timescales and strategies on measurement of available bandwidth Passive and Active Measurement (PAM) Anonymized Internet Traces
2006
Hu, Y.
Chiu, D.-M.
Lui, J.
Entropy based flow aggregation IFIP Networking Conf. Anonymized Internet Traces
2006
Clegg, R. Modelling internet traffic using Markov chains Imperial College, London, UK Anonymized Internet Traces
2005
Kompella, R.
Estan, C.
The power of slicing in internet flow measurement Internet Measurement Conf. (IMC) Anonymized Internet Traces
2005
Veitch, D.
Hohna, N.
Abry, P.
Multifractality in TCP/IP traffic: the case against Computer Networks Anonymized Internet Traces
2005
Jiang, H.
Dovrolis, C.
Why is the internet traffic bursty in short (sub-RTT) timescales? ACM SIGMETRICS Performance Evaluation Review Anonymized Internet Traces
2005
Okuno, M.
Ishida, S.
Nishi, H.
Low-power network-packet-processing architecture using process-learning cache for high-end backbone routera IEICE Trans. on Electronics Anonymized Internet Traces
2004
Karagiannis, T.
Molle, M.
Faloutsos, M.
Long-range dependence: ten years of Internet traffic modeling IEEE Internet Computing Anonymized Internet Traces
2004
Okuno, M.
Nishi, H.
Proposal and evaluation of network-processor acceleration architecture using header-learning cache and cache-miss handler IEICE technical report: Circuits and system Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
Fisk, M.
Bitmap algorithms for counting active flows on high speed links Internet Measurement Conf. (IMC) Anonymized Internet Traces
2003
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice ACM Trans. on Computer Systems (TOCS) Anonymized Internet Traces
2003
Estan, C.
Savage, S.
Varghese, G.
Automatically inferring patterns of resource consumption in network traffic ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Anonymized Internet Traces
2002
Estan, C.
Varghese, G.
New directions in traffic measurement and accounting ACM SIGCOMM Computer Communication Review Anonymized Internet Traces
1999
Fang, W.
Peterson, L.
Inter-AS traffic patterns and there implications IEEE Global Telecommunications Conf. (GLOBECOM) Anonymized Internet Traces
2019
Cheng, J.
Li, J.
Tang, X.
Sheng, V.S.
Zhang, C.
Li, M.
A novel DDoS attack detection method using Optimized Generalized Multiple Kernel Learning arxiv.org Denial of Service Attacks
2019
Behal, S.
Singh, P.
LeCAM: A novel metric for detecting DDoS attacks IEEE Intl Conf. on Electronics and Communication and Aerospace Technology Denial of Service Attacks
2019
Bakker, J.
Ng, B.
Seah, W.K. G.
Pekar, A.
Traffic Classification with Machine Learning in a Live Network IFIP/IEEE Symp. on Integrated Network and Service Management (IM) Denial of Service Attacks
2019
Chen, J.
Tang, X.
Cheng, J.
Wang, F.
Xu, R.
DDoS attack detection method based on network abnormal behavior in Big Data Environment arxiv.org Denial of Service Attacks
2019
Adelakun, T.L. A multifractal approach for detecting distributed denial of service attacks Univ. of Manitoba Denial of Service Attacks
2019
Zhang, M.
Shi, L.
Sisodia, D.
Li, J.
Reiher, P.
On multi-point, in-network filtering of Distributed Denial-of-Service traffic IFIP/IEEE Symp. on Integrated Network and Service Management (IM) Denial of Service Attacks
2019
Vipul, V. R. Hybrid Traceback Scheme for DDoS Attacks Recent Findings in Intelligent Computing Techniques Denial of Service Attacks
2019
Sahoo, K. S.
Panda, S. K.
Sahoo, S.
Sahoo, B.
Dash, R.
Toward secure software-defined networks against distributed denial of service attack The Journal of Supercomputing Denial of Service Attacks
2019
Prasad, K. M.
Siva, V. S.
Kishore, K.
Sreenivasulu, M.
DITFEC: Drift Identification in Traffic-Flow Streams for DDoS Attack Defense Through Ensemble Classifier Computing and Network Sustainability Denial of Service Attacks
UCSD Network Telescope
2019
Patil, N. V.
Krishna, C. R.
Kumar, K.
Behal, S.
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks Journal of King Saud University - Computer and Information Sciences Denial of Service Attacks
2019
Nawrocki, M.
Schmidt, T.C.
Wahlisch, M.
Uncovering vulnerable industrial control systems from the Internet core arxiv.org Denial of Service Attacks
2019
Manso, P.
Moura, J.
Serrao, C.
SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks Special Issue Insider Attacks Denial of Service Attacks
2019
Liang, X.
Znati, T.
An empirical study of intelligent approaches to DDoS detection in large scale networks International Conference on Computing, Networking and Communications (ICNC) Denial of Service Attacks
2019
Kulchytskyy, B.V.
Cooperstein, L.M.
To the problem of forming the dataset for DDoS attack research Vinnitsia Nat. Tech. Univ. Denial of Service Attacks
2019
Khalaf, B. A.
Mostafa, S. A.
Mustapha, A.
Mohammed, M. A.
Abduallah, W. M.
Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods IEEE Access Denial of Service Attacks
2019
Guo, W.
Tang, X.
Cheng, J.
Xu, J.
Cai, C.
Guo, Y.
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory International Conference on Artificial Intelligence and Security Denial of Service Attacks
2019
Gu, Y.
Li, K.
Guo, Z.
Wang, Y.
Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm IEEE Access Denial of Service Attacks
2019
Cui, J.
Wang, M.
Luo, Y.
Zhong, H.
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN Future Generation Computer Systems Denial of Service Attacks
2019
Bojovic, P. D.
Basicevic, I.
Ocovaj, S.
Popovic, M.
A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method Computers and Electrical Engineering Denial of Service Attacks
2019
Bhushan, K.
Gupta, B. B.
Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing Multimedia Tools and Applications Denial of Service Attacks
2019
Alsadhan, A.
Hussain, A.
Liatsis, P.
Alani, M.
Tawfik, H.
Kendrick, P.
Francis, H.
Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks Transactions on Emerging Telecommunications Technologies Denial of Service Attacks
2018
Barbhuiya, S.
Papazachos, Z.
Kilpatrick, P.
Nikolopoulos, D.S.
RADS: Real-time anomaly detection system for cloud data centres arxiv.org Denial of Service Attacks
2018
Pelloso, M. Distributed Denial of Service attack prediction system Fed. Univ. of Parana Denial of Service Attacks
2018
Dalmazo, B.L. A prediction-based approach for anomaly detection in the cloud Univ. of Coimbra Denial of Service Attacks
2018
Petkovic, M. A contribution to the method for detection of denial of service attacks inInternet Univ. of Novi Sad Denial of Service Attacks
2018
Gupta, A. Distributed Denial of Service attack detection using a machine learning approach Univ. of Calgary Denial of Service Attacks
2018
Hamid, Y.
Balasaraswathi, R.
Journaux, L.
Sugumaran, M.
Benchmark datasets for Network Intrusion Detection: A review Intl J. of Network Security Denial of Service Attacks
2018
Cheng, J.
Zhou, J.
Liu, Q.
Tang, X.
Guo, Y.
A DDoS detection method for socially aware networking based on forecasting fusion feature sequence Computer J. Denial of Service Attacks
2018
Behal, S.
Kumar, K.
Sachdeva, M.
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events J. of Network and Computer Applications Denial of Service Attacks
2018
Prasad, K. M.
Reddy, A. R. M.
Rao, K. V.
DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment Cluster Computing Denial of Service Attacks
UCSD Network Telescope
2018
Cheng, J.
Xu, R.
Tang, X.
Sheng, V.
Cai, C.
An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment CMC: Computers, Materials and Continua Denial of Service Attacks
2018
Chang, T.Y.
Hsieh, C.J.
Detection and Analysis of Distributed Denial-of-service in Internet of Things-Employing Artificial Neural Network and Apache Spark Platform Sensors and Materials Denial of Service Attacks
2018
Alsirhani, A.
Sampalli, S.
Bodorik, P.
DDoS attack detection system: Utilizing classification algorithms with Apache Spark Conf. on New Technologies, Mobility and Security (NTMS) Denial of Service Attacks
2018
Abusitta, A.
Martine, B.
Dagenais, M.
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment J. of Cloud Computing: Advances, Systems and Applications Denial of Service Attacks
2018
Hoque, N.
Bhattacharyya, D.
HLR_DDoS: A low-rate and high-rate DDoS attack detection method using a -divergence Intl Conf. on Computing and Communication Systems Denial of Service Attacks
2018
Deka, R.
Bhattacharyya, D.
Kalita, J.
Granger causality in TCP flooding attack Intl J. of Network Security Denial of Service Attacks
2018
Zhang, R.
Cheng, J.
Tang, X.
Liu, Q.
He, X.
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm Intl Conf. on Cloud Computing and Security Denial of Service Attacks
2018
Yu, Y.
Guo, L.
Liu, Y.
Zheng, J.
Zong, Y.
An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks IEEE Access Denial of Service Attacks
2018
Wiedenmann, S.
Mundt, T.
Goltz, J.
Designing and Implementing a Benchmark Collection for Attack Simulation in Field bus Systems IEEE Conf. on Application, Information and Network Security (AINS) Denial of Service Attacks
2018
Wang, M.
Zhou, H.
Chen, J.
PoTiA: A Popularity and Timeout Analysis Based SDN Controller Protection Approach IEEE Access Denial of Service Attacks
2018
Vickers, P.
Debashi, M.
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior IEEE Access Denial of Service Attacks
2018
Uramova, J.
Sege, P.
Moravik, M.
Papan, J.
Kontsek, M.
Hrabovsky, J.
Infrastructure for Generating New IDS Dataset Intl Conf. on Emerging eLearning Technologies and Applications (ICETA) Denial of Service Attacks
2018
Tseung, C. Y.
Chow, K. P.
Forensic-Aware Anti-DDoS Device IEEE Security and Privacy Workshops (SPW) Denial of Service Attacks
2018
Thang, T. M.
Nguyen, C. Q.
Nguyen., K. V.
Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter Asian Conf. on Defense Technology (ACDT) Denial of Service Attacks
2018
Riadi, I.
Muhammad, A. W.
Neural Network Based DDoS Detection Regarding Hidden Layer Variation Journal of Theoretical and Applied Information Technology Denial of Service Attacks
2018
Petkovic, M.
Basicevic, I.
Kukolj, D.
Popovic, M.
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks Computer Science and Information Systems Denial of Service Attacks
2018
Nam, T.
Phong, P.
Khoa, T.
Huong, T.
Nam, P.
Thanh, N.
Thang, L.
Tran, P.
Dung, Le.
Loi, V.
Self-organizing map-based approaches in DDoS flooding detection using SDN Intl Conf. on Information Networking (ICOIN) Denial of Service Attacks
2018
Mowla, N. I.
Doh, I.
Chae, K.
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word Computer Science and Information Systems Denial of Service Attacks
2018
Modi, C.
Patel, D.
A feasible approach to intrusion detection in virtual network layer of Cloud computing Academy Proceeding in Engineering Sciences Denial of Service Attacks
2018
Mao, J.
Deng, W.
Shen, F.
DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features IEEE Intl Conf. On Trust, Security And Privacy In Computing And Communications/On Big Data Science And Engineering (TrustCom/BigDataSE) Denial of Service Attacks
2018
Maheshwari, R.
Rajput, A.
Gupta, A. K.
Private Virtual Cloud Infrastructure Modelling using VCPHCF-RTT Security Agent Intl Conf. on Computing Communication and Automation (ICCCA) Denial of Service Attacks
2018
Kirti, S.
Agrawal, N.
Kumar, S.
Sah, D. K.
Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow Intl Conf. on Recent Advances in Information Technology (RAIT) Denial of Service Attacks
2018
Johnson, K.
De, T.
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation IET Information Security Denial of Service Attacks
2018
Iliev, G.
Shaikh, J. R.
Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security Global Conf. on Wireless Computing and Networking (GCWCN) Denial of Service Attacks
2018
Idhammad, M.
Afdel, K.
Belouch, M.
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest Hindawi Security and Communication Networks Denial of Service Attacks
2018
Huh, J. H. Implementation of lightweight intrusion detection model for security of smart green house and vertical farm Intl J. of Distributed Sensor Networks Denial of Service Attacks
2018
Huang, H.
Sun, Y. E.
Chen, S.
Tang, S.
Han, K.
Yuan, J.
Yang, W.
You can drop but you cant hide: K-persistent spread estimation in high-speed networks IEEE Conf. on Computer Comm. (INFOCOM) Denial of Service Attacks
2018
Hrabovsky, J.
Segec, P.
Moravcik, M.
Papan, J.
Trends in Application of Machine Learning to Network-Based Intrusion Detection Systems Intl Conf. on Innovations for Community Services Denial of Service Attacks
2018
Hong, L.
Alzharani, S.
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation Journal of Information Security Denial of Service Attacks
2018
Hartzel, K. S.
Spangler, W. E.
Managing IT Implementation Risk: A Model from High Reliability Organizations Intl Association for Computer Information Systems Denial of Service Attacks
2018
Ghanbari, M.
Kinsner, W.
Extracting features from both the input and the output of a convolutional neural network to detect Distributed Denial of Service attacks IEEE Intl Conf. on Cognitive Informatics and Cognitive Computing (ICCI*CC) Denial of Service Attacks
2018
Dennis, M.J.R. Machine-learning and statistical methods for DDoS attack detection and defense system in Software Defined Networks Ryerson Univ. Denial of Service Attacks
2018
Deka, R. K.
Bhattacharya, D. K.
Kalita, J. K.
Active Learning to Detect DDoS Attack Using Ranked Features Computer Comm. Denial of Service Attacks
2018
Chinnusamy, M.
Raju, N.
Effective Method to Detect Distributed Denial of Service Attacks International Journal of Pure and Applied Mathematics Denial of Service Attacks
2018
Chhabra, G. S.
Singh, V.
Singh, M.
Hadoop-based analytic framework for cyber forensics International Journal of Communication Systems Denial of Service Attacks
2018
Cheng, J.
Li, M.
Tang, X.
Sheng, V. S.
Liu, Y.
Guo, W.
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing Security and Communication Networks Denial of Service Attacks
2018
Camargo, C. O.
Faria, E. R.
Zarpelao, B. B.
Miani, R. S.
Qualitative evaluation of denial of service datasets Brazilian Symp. on Information Systems Denial of Service Attacks
Topology with Archipelago
2018
Bulman, G. A Critical Analysis of Current Measures for Preventing Use of Fraudulent Resources in Cloud Computing Selected Computing Research Papers - University of Sunderland Denial of Service Attacks
2018
Boukhtouta, A.
Pourzandi, M.
Brunner, R.
Dault, S.
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology IFIP Annual Conf. on Data and Applications Security and Privacy Denial of Service Attacks
2018
Bhuyan, M. H.
Elmroth, E.
Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric IEEE Intl Conf. on Machine Learning and Applications (ICMLA) Denial of Service Attacks
2018
Bhushan, K.
Gupta, B. B.
Hypothesis test for low-rate DDoS attack detection in cloud computing environment Procedia Computer Science Denial of Service Attacks
2018
Bhatia, S.
Behal, S.
Ahmed, I.
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions Versatile Cybersecurity Denial of Service Attacks
2018
Behal, S.
Kumar, K.
Sachdeva, M.
A generalized detection system to detect distributed denial of service attacks and flash events for information theory metrics Turkish Journal of Electrical Engineering and Computer Sciences Denial of Service Attacks
2018
Behal, S.
Sachdeva, M.
Saluja, K. K.
D-FAC: A novel 0-Divergence based distributed DDoS defense system Journal of King Saud University Denial of Service Attacks
2017
Dao, N.N.
Phan, T.V.
Saad, U.
Kim, J.
Bauschert, T.
Cho, S.
Securing heterogeneous IoT with intelligent DDoS attack behavior learning arxiv.org Denial of Service Attacks
2017
Baishya, R.
Hoque, N.
Bhattacharya, D.
DDoS attack detection using unique source IP deviation Intl J. of Network Security Denial of Service Attacks
2017
Thangamalar, C.
Ravikumar, K.
Rating association for short degree DDoS attack recognition Intl J. of Engineering and Technology Denial of Service Attacks
2017
Singh, K.
De, T.
MLP-GA based algorithm to detect application layer DDoS attack J. of Information Security and Applications Denial of Service Attacks
2017
Singh, K.J.
De, T.
Mathematical modelling of DDoS attack and detection using correlation J. Cyber Security Technology Denial of Service Attacks
2017
Hoque, N.
Kashyap, H.
Bhattacharyya, D.
Real-time DDoS attack detection using FPGA Computer Comm. Denial of Service Attacks
2017
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
A systematic hands-on approach to generate real-life intrusion datasets Network Traffic Anomaly Detection and Prevention Denial of Service Attacks
2017
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
Practical tools for attackers and defenders Network Traffic Anomaly Detection and Prevention Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Discriminating flash events from DDoS Attacks: A comprehensive review Intl J. of Network Security Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
A distinction method of flooding DDoS and flash crowds based on user traffic behavior IEEE Trustcom/BigDataSE/ICESS Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Sachdeva, M.
Characterizing DDoS attacks and flash events: Review, research gaps and future directions Computer Science Review Denial of Service Attacks
2017
Jing, G. Research on application of DDos attack detection technology based on software defined network Acta Technica CSAV Denial of Service Attacks
2017
Axon, L.
Nurse, J.R.C.
Goldsmith, M.
Creese, S.
A formalised approach to designing sonification systems for network-security monitoring Intl J. On Advances in Security Denial of Service Attacks
2017
Afolorunso, A.A. Variational Bayesian Hidden Markov model for the prediction of Distributed Denial of Service attacks Univ. of Lagos Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Lv, B.
A behavior-based method for distinction of flooding DDoS and flash crowds Conf. on Knowledge Science, Engineering and Management Denial of Service Attacks
2017
Salman, T.
Bhamare, D.
Erbad, A.
Jain, R.
Samaka, M.
Machine learning for anomaly detection and categorization in multi-cloud environments Conf. on Cyber Security and Cloud Computing Denial of Service Attacks
2017
Moustafa, N.M.A. Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic Univ. of New South Wales Denial of Service Attacks
2017
Mosharraf, N.
Jayasumana, A.
Ray, I.
A distributed mechanism to protect against DDoS attacks IFIP Conf. on Data and Applications Security and Privacy Denial of Service Attacks
2017
Nogueira, M.
Santos, A.
Moura, J.
Early signals from volumetric DDoS attacks: An empirical study arxiv.org Denial of Service Attacks
2017
Hubballi, N.
Tripathi, N.
An event based technique for detecting spoofed IP packets J. of Information Security and Applications Denial of Service Attacks
2017
Xylogiannopoulos, K. Data structures, algorithms and applications for Big Data analytics: Single, multiple and all repeated patterns detection in discrete sequences Univ. of Calgary Denial of Service Attacks
2017
Saravanan, R.
Loganathan, S.
Shunmuganathan, S.
Palanichamy, Y.
Suspicious score based mechanism to protect web servers against application layer Distributed Denial of Service attacks Intl J. of Intelligent Engineering and Systems Denial of Service Attacks
2017
Rahmat, S.
Niyaz, Q.
Javaid, A.
Sun, W.
Normal and anomalous traffic flow pattern analysis for organizational networks Canadian Conf. on Electrical and Computer Engineering (CCECE) Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Computer networks detection of DDoS attacks and flash events using novel information theory metrics Computer Networks Denial of Service Attacks
2017
Righi, M.A DDoS detection through recurrence quantification analysis based on dynamic feature extraction and adaptive clustering Fed. Univ. of Santa Maria Denial of Service Attacks
2017
Liu, J.
Lai, Y.
Zhang, S.
FL-GUARD: A detection and defense system for DDoS attack in SDN Conf. on Cryptography, Security and Privacy Denial of Service Attacks
2017
Cheng, L.
Divakaran, D.
Ang, A.
Lim, W.
Thing, V.
FACT: A framework for authentication in cloud-based IP traceback IEEE Trans. on Information Forensics and Security Denial of Service Attacks
2017
Al-mamory, S.
Algelal, S.
A modified DBSCAN clustering algorithm for proactive detection of DDoS attacks Conf. on New Trends in Information and Communications Technology Applications (NTICT) Denial of Service Attacks
2017
Raza, A. Anomaly detection systems for Distributed Denial of Service attacks Univ. of Victoria Denial of Service Attacks
2017
AlEroud, A.
Alsmadi, I.
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach J. of Network and Computer Applications Denial of Service Attacks
2017
Villalba, L.J.G.
Orozco, A.L.S.
Vidal, J.M.
Advanced payload analyzer preprocessor Future Generation Computer Sysems Denial of Service Attacks
2017
Sun, D.
Yang, K.
Lv, B.
Shi, Z.
Could we beat a new mimicking attack? Asia-Pacific Network Operations and Management Symp. (APNOMS) Denial of Service Attacks
2017
Sun, D.
Yang, K.
Lv, B.
Shi, Z.
A new mimicking attack by LSGAN Intl Conf. on Tools with Artificial Intelligence Denial of Service Attacks
2017
Sun, D.
Yang, K.
Shi, Z.
Wang, Y.
Detecting flooding DDoS under flash crowds based on Mondrian forest Wireless Algorithms, Systems, and Applications Denial of Service Attacks
2017
Sreeram, I.
Vuppala, V. P. K.
HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm Applied Computing and Informatics Denial of Service Attacks
2017
Riadi, I.
Muhammad, A.W.
Sunardi, S.
Network packet classification using neural network based on training function and hidden layer neuron number variation Intl J. of Advanced Computer Science and Applications Denial of Service Attacks
2017
Muhammad, A.
Riadi, I.
Sunardi, S.
Deteksi serangan DDoS menggunakan neural network dengan fungsi fixed moving average window J. Informatika Sunan Kalijaga Denial of Service Attacks
2017
Mosharraf, N.
Jayasumana, A.P.
Ray, I.
Bezawada, B.
History-based throttling of Distributed Denial-of-Service attacks Intl Conf. on E-Business and Telecommunications Denial of Service Attacks
2017
Mohamed, F.
AlBelooshi, B.
Salah, K.
Yeun, C.Y.
Damiani, E.
A scattering technique for protecting cryptographic keys in the cloud Intl Workshops on Foundations and Applications of Self* Systems (FAS*W) Denial of Service Attacks
2017
Kotenko, I.
Chechulin, A.
Branitskiy, A.
Generation of source data for experiments with network attack detection software J. of Physics: Conf. Series Denial of Service Attacks
2017
Kaur, G.
Behal, S.
Shifali, K.
An information divergence based approach to detect flooding DDoS attacks and Flash Crowds Intl Conf. on Applied and Theoretical Computing and Communication Technology (iCATccT) Denial of Service Attacks
2017
Ghanbari, M.
Kinsner, W.
Ferens, K.
Detecting a distributed denial of service attack using a pre-processed convolutional neural network Electrical Power and Energy Conf. (EPEC) Denial of Service Attacks
2017
Chin, T.
Xiong, K.
Rahouti, M.
SDN-based kernel modular countermeasure for intrusion detection Intl Conf. on Security and Privacy in Communication Systems Denial of Service Attacks
2017
Chen, W. Distributed data streaming algorithms for network anomaly detection Iowa State Univ. Denial of Service Attacks
UCSD Network Telescope
2017
Bista, S.
Chitrakar, R.
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naive Bayes Classification J. of Information Security Denial of Service Attacks
2017
Behal, S.
Kumar, K.
Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation Computer Communications Denial of Service Attacks
2016
Siahmarzkooh, A.
Karimpour, J.
Lotfi, S.
A cluster-based approach towards detecting and modeling network dictionary attacks Engineering, Technology and Applied Science Research Denial of Service Attacks
2016
Saravanan, R.
Shanmuganathan, S.
Palanichamy, Y.
Behavior-based detection of application layer distributed denial of service attacks during flash events Turkish J. of Electrical Engineering and Computer Sciences Denial of Service Attacks
2016
Bhatia, S. Ensemble-based model for DDoS attack detection and flash event separation Future Technologies Conf. Denial of Service Attacks
2016
Deka, R.
Bhattacharya, D.
Self-similarity based DDoS attack detection using Hurst parameter Security and Communication Networks Denial of Service Attacks
2016
Zhang, H.
Su, W.
Quan, W.
Security technologies of SINET Smart Collaborative Identifier Network Denial of Service Attacks
2016
Kong, X.
Chen, Y.
Tian, H.
Wang, T.
Cai, Y.
Chen, X.
A novel botnet detection method based on preprocessing data packet by graph structure clustering Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery Denial of Service Attacks
2016
Osanaiye, O.
Choo, K.
Dlodlo, M.
Change-point cloud DDoS detection using packet inter-arrival time Computer Science and Electronic Engineering Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis Security and Communication Networks Denial of Service Attacks
2016
Bhandari, A.
Sangal, A.L.
Kumar, K.
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation Security and Communication Networks Denial of Service Attacks
2016
Yusof, A.R.
Udzir, N.I.
Selamat, A.
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack Lecture Notes in Computer Science (LNCS) Denial of Service Attacks
2016
Singh, K.
Thongam, K.
De, T.
Entropy-based application layer DDoS attack detection using artificial neural networks Entropy Denial of Service Attacks
2016
Ghahfarokhi, N.M. Cooperative defense mechanism for detection, identification, and filtering of DDos attacks Colorado State Univ. Denial of Service Attacks
2016
Osanaiye, O.A. DDoS defence for service availability in cloud computing Univ. of Cape Town Denial of Service Attacks
2016
Bhuyan, M.
Bhattacharyya, D.
Kalita, J.
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric Security and Communication Networks Denial of Service Attacks
2016
Shan, J.
Luo, J.
Ni, G.
Wu, Z.
Duan, W.
CVS: Fast cardinality estimation for large-scale data streams over sliding windows Neurocomputing Denial of Service Attacks
2016
Muharish, E.Y.M. Packet filter approach to detect Denial of Service attacks California State Univ. San Bernardino Denial of Service Attacks
2016
Chen, Y.
Chen, X.
Tian, H.
Wang, T.
Cai, Y.
A blind detection method for tracing the real source of DDoS attack packets by cluster matching IEEE Conf. on Communication Software and Networks Denial of Service Attacks
2016
Behal, S.
Kumar, K.
Trends in validation of DDoS research Procedia Computer Science Denial of Service Attacks
2016
Karimi, A.
Niyaz, Q.
Sun, W.
Javaid, A.
Devabhaktuni, V.
Distributed network traffic feature extraction for a real-time IDS IEEE Conf. on Electro Information Technology Denial of Service Attacks
2016
Ain, A.
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Rank correlation for low-rate DDoS attack detection: An empirical evaluation Intl J. of Network Security Denial of Service Attacks
2016
Giotis, K.
Apostolaki, M.
Maglaris, V.
A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains IEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
Topology with BGP
2016
Dalmazo, B.L.
Vilela, J.P.
Simoes, P.
Curado, M.
Expedite feature extraction for enhanced cloud anomaly detection IEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Aleroud, A.
Alsmadi, I.
Identifying DoS attacks on software defined networks: A relation context approach IEEE/IFIP Network Operations and Management Symp. (NOMS) Denial of Service Attacks
2016
Hoque, N.
Bhattacharyya, D.
Kalita, J.
Denial of Service attack detection using multivariate correlation analysis Conf. on Information and Communication Technology for Competitive Strategies Denial of Service Attacks
2016
Cheng, L.
Divakaran, D.M.
Lim, W.Y.
Thing, V.L.L.
Opportunistic piggyback marking for IP traceback IEEE Trans. on Information Forensics and Security Denial of Service Attacks
2016
Zheng, L.
Li, J.
Wang, H.
Zeng, X.
Improving accuracy and automation of anomaly detectors based on self-correlation J. Internet Technology (JIT) Denial of Service Attacks
UCSD Network Telescope
2016
Hoque, N.
Bhattacharyya, D.K.
Kalita, J.K.
A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis Conf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2016
Eberle, W.
Holder, L.
Identifying anomalies in graph streams using change detection Workshop on Mining and Learning with Graphs Denial of Service Attacks
Topology with BGP
2015
Robinson, R.R.R.
Thomas, C.
Ranking of machine learning algorithms based on the performance in classifying DDoS attacks IEEE Recent Advances in Intelligent Computational Systems (RAICS) Denial of Service Attacks
UCSD Network Telescope
2015
Rastegari, S. Intelligent network intrusion detection using an evolutionary computation approach Edith Cowan Univ. Denial of Service Attacks
2015
Poongodi, M.
Bose, S.
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET Cluster Computing Denial of Service Attacks
2015
Gulisano, V.
Zori, M.
Fu, Z
Peris, R.
Paptriantafilou, M.
Martinez, M.
STONE: A streaming DDoS defense framework J. Expert System with Applications Denial of Service Attacks
2015
Wang, S.
Li, Y.
Zhao, X.
Wang, B.
Intrusion detection system design of cloud computing based on abnormal traffic identification Intl J. of Reasoning-based Intelligent Systems Denial of Service Attacks
2015
Rastegari, S.
Lam, C.
Hingston, P.
A statistical rule learning approach to network intrusion detection Intl Conf. on IT Convergence and Security Denial of Service Attacks
2015
Giotis, K.
Androulidakis, G.
Maglaris, V.
A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox Security and Communication Networks Denial of Service Attacks
2015
Balkanli, E.
Zincir-Heywood, A.N.
Heywood, M.I.
Feature selection for robust backscatter DDoS detection Local Computer Networks Conf. Workshops (LCNW) Denial of Service Attacks
UCSD Network Telescope
2015
Zhou, L.
Liao, M.
Yuan, C.
Sheng, Z.
Zhang, H.
DDOS attack detection using packet size interval Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM ) Denial of Service Attacks
2015
Poongodi, M.
Bose, S.
A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS attack in MANET Arabian J. for Science and Engineering Denial of Service Attacks
2015
Wang, R.
Jia, Z.
Ju, L.
An entropy-based distributed DDoS detection mechanism in Software-Defined Networking Trustcom/BigDataSE/ISPA Denial of Service Attacks
2015
Rastegari, S.
Hingston, P.
Lam, C.P.
Evolving statistical rulesets for network intrusion detection J. Applied Soft Computing Denial of Service Attacks
2015
Nurohman, H.
Purwanto, Y.
Hafidudin, X.
Traffic anomaly based detection: Anomaly detection by self-similar analysis Intl. Conf. on Control, Electronics, Renewable Energy and Communications (ICCEREC) Denial of Service Attacks
2015
Buragohain, C.
Kalita, M.J.
Singh, S.
Bhattacharyya, D.K.
Anomaly based DDoS attack detection Intl J. of Computer Applications Denial of Service Attacks
2015
Wang, R.
Zhang, Z.
Ju, L.
Jia, Z.
A novel OpenFlow-based DDoS flooding attack detection and response mechanism in Software-Defined Networking Intl J. of Information Security and Privacy (IJISP) Denial of Service Attacks
2015
Bukac, V. Small scale denial of service attacks Masaryk Univ. Denial of Service Attacks
2015
Juturu, L.S. Applying big data analytics on integrated cybersecurity datasets Texas Tech Univ., Lubbock, TX, US Denial of Service Attacks
2015
Dorbala, S.Y.
Hubballi, N.
An experience report on scalable implementation of DDoS attack detection Lecture Notes in Business Information Processing (LNBIP) Denial of Service Attacks
2015
David, J.
Thomas, C.
DDoS attack detection using fast entropy approach on flow-based network traffic Procedia Computer Science Denial of Service Attacks
2015
Chen, W.
Guan, Y.
Distinct element counting in distributed dynamic data streams Conf. on Computer Communications (INFOCOM) Denial of Service Attacks
2015
Jiang, H.
Chen, S.
Hu, H.
Zhang, M.
Superpoint-based detection against distributed denial of service (DDoS) flooding attacks Workshop on Local and Metropolitan Area Networks Denial of Service Attacks
2015
Bhuyan, M.H.
Kalwar, A.
Goswami, A.
Bhattacharyya, D.K.
Kalita, J.K.
Low-rate and high-rate Distributed DoS attack detection using partial rank correlation Intl. Conf. on Communication Systems and Network Technologies (CSNT) Denial of Service Attacks
2015
Shamshirband, S.
Daghighi, B.
Anuar, N.B.
Kiah, L.M.
Patel, A.
Abraham, A.
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network J. Intelligent and Fuzzy Systems Denial of Service Attacks
2015
Lai, Y.
Chen, Y.
Liu, Z.
Yang, Z.
Li, X.
On monitoring and predicting mobile network traffic abnormality Simulation Modelling Practice and Theory Denial of Service Attacks
UCSD Network Telescope
2015
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection Pattern Recognition Letters Denial of Service Attacks
2014
Wan, M.
Zhang, H.-K.
Wu, T.-Y.
Lo, C.-H.
Anomaly detection and response approach based on mapping requests Security and Communication Networks Denial of Service Attacks
2014
Shrestha, A. Visualizing spatio-temporal data Georgia State Univ. Denial of Service Attacks
2014
Shrestha, A.
Zhu, Y.
Manandhar, K.
NetTimeView: Applying spatio-temporal data visualization techniques to DDoS attack analysis Advances in Visual Computing Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
Large-scale network packet analysis for intelligent DDoS attack detection development Conf. on Internet Technology and Secured Transactions (ICITST) Denial of Service Attacks
2014
Bhaya, W.
Manaa, M.E.
A proactive DDoS detection approach using data mining cluster analysis J. of Next Generation Information Technology Denial of Service Attacks
2014
Purwanto, Y.
Kuspriyanto, Hendrawan
Rahardjo, B.
Traffic anomaly detection in DDos flooding attack Conf. on Telecommunication Systems Services and Applications (TSSA) Denial of Service Attacks
2014
Wang, J.
Paschalidis, I.C.
Botnet detection using social graph analysis Allerton Conf. on Communication, Control, and Computing Denial of Service Attacks
2014
Srihari, V.
Anitha, R.
DDoS detection system using wavelet features and semi-supervised learning Symp. on Security in Computing and Communications Denial of Service Attacks
2014
Shamsolmoali, P.
Zareapoor, M.
Statistical-based filtering system against DDOS attacks in cloud computing Conf. on Advances in Computing, Communications and Informatics (ICACCI) Denial of Service Attacks
2014
Kato, K.
Klyuev, V.
An intelligent DDoS attack detection system using packet analysis and support vector machine Intl J. of Intelligent Computing Research (IJICR) Denial of Service Attacks
2014
Giotis, K.
Androulidakis, G.
Maglaris, V.
Leveraging SDN for efficient anomaly detection and mitigation on legacy networks European Workshop on Software Defined Networks Denial of Service Attacks
2014
Bhuyan, M.H.
Bhattacharyya, D.K.
Kalita, J.K.
Information metrics for low-rate DDoS attack detection: A comparative evaluation Intl. Conf. on Contemporary Computing (IC3) Denial of Service Attacks
2014
Bhatia, S.
Schmidt, D.
Mohay, G.
Tickle, A.
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and flash events Computers and Security Denial of Service Attacks
2014
Takahashi, R. Distributed denial of service (DDoS) attack detection system using burst detection Future Univ. Hakodate Denial of Service Attacks
2013
Luo, H.
Lin, Y.
Zhang, H.
Zukerman, M.
Preventing DDoS attacks by identifier/locator separation IEEE Network Denial of Service Attacks
2013
Bhuyan, M.H. Applying data mining techniques in anomaly based network intrusion detection Tezpur Univ. Denial of Service Attacks
2013
Bhatia, S. Detecting Distributed Denial-of-Service attacks and flash events Queensland Univ. of Technology, Brisbane, Australia Denial of Service Attacks
2013
Dassouki, K.
Debar, H.
Safa, H.
Hijazi, A.
A TCP delay-based mechanism for detecting congestion in the Internet Conf. on Communications and Information Technology (ICCIT) Denial of Service Attacks
2013
Chen, W.
Liu, Y.
Guan, Y.
Cardinality change-based early detection of large-scale cyber-attacks IEEE INFOCOM Denial of Service Attacks
UCSD Network Telescope
2013
Callau-Zori, M.
Jimenez-Peris, R.
Gulisano, V.
Papatriantafilou, M.
Fu, Z.
Patino-Martinez, M.
STONE: A stream-based DDoS defense framework ACM Symp. on Applied Computing (SAC) Denial of Service Attacks
2013
Kumar, P.A.R.
Selvakumar, S.
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Computer Communications Denial of Service Attacks
UCSD Network Telescope
2012
Bhatia, S.
Schmidt, D.
Mohay, G.
Ensemble-based DDoS detection and mitigation model Conf. on Security of Information and Networks (SIN) Denial of Service Attacks
2012
Fu, Z. Multifaceted defense against Distributed Denial of Service attacks: prevention, detection, mitigation Chalmers Univ. of Technology, Gothenborg, Sweden Denial of Service Attacks
2012
Singh, J.
Kumar, K.
Sachdeva, M.
Sidhu, N.
DDoS attacks simulation using legitimate and attack real data sets J. Scientific and Engineering Research Denial of Service Attacks
2012
Feitosa, E.
Souto, E.
Sadok, D.H.
An orchestration approach for unwanted Internet traffic identification Computer Networks Denial of Service Attacks
2012
Anitha, R.
Karthik, R.
Pravin, V.
Thirugnanam, K.
A real time detection of Distributed Denial of Service attacks using cumulative sum algorithm and adaptive neuro-fuzzy inference system Conf. on Computer Science, Engineering and Applications (ICCSEA) Denial of Service Attacks
2012
Rahmani, H.
Sahli, N.
Kamoun, F.
DDoS flooding attack detection scheme based on F-divergence Computer Communications Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y
Han, W.
An online learning and unsupervised traffic anomaly detection system Advanced Science Lett. Denial of Service Attacks
2012
Zheng, L.
Zou, P.
Jia, Y.
Han, W.
Traffic anomaly detection and containment using Filter-Ary-Sketch Procedia Engineering Denial of Service Attacks
UCSD Network Telescope
2012
Karthick, R.R.
Hattiwale, V.P.
Ravindran, B.
Adaptive network intrusion detection system using a hybrid approach Conf. on Communication Systems and Networks (COMSNETS) Denial of Service Attacks
2011
Takahashi, E.K.
Chen, Y.
Lall, A.
Divergence in network traffic Midstates Conf. on Undergraduate Research in Computer Science and Mathematics Denial of Service Attacks
2011
Le, D.Q.
Jeong, T.
Roman, H.E.
Hong, J.W.
Traffic dispersion graph based anomaly detection Symp. on Information and Communication Technology (SolCT) Denial of Service Attacks
2011
Bhatia, S.
Mohay, G.
Tickle, A.
Ahmed, E.
Parametric differences between a real-world Distributed Denial-of-Service attack and a flash event Conf. on Availability, Reliability and Security (ARES) Denial of Service Attacks
2011
Khan, F.M. Assuring network service with bandwidth and integrity based fairness Univ. Illinois, Urbana-Champaign Denial of Service Attacks
2021
Apostolaki, Maria
Maire, Cedric
Vanbever, Laurent
PERIMETER: A network-layer attack on the anonymity of cryptocurrencies ETH Zurich Other Datasets
Topology with BGP
2019
Rehman, A.M.
Goldberg, S.
Choffnes, D.
Passport: Enabling accurate country-level router geolocation using inaccurate sources arxiv.org Other Datasets
Topology with BGP
2019
Gong, D.
Tran, M.
Shinde, S.
Jin, H.
Sekar, V.
Saxena, P.
Kang, M.S.
Practical verifiable in-network filtering for DDoS defense arxiv.org Other Datasets
Topology with BGP
2018
Dahlberg, R.
Pulls, T.
Vestin, J.
Hoiland-Jorgensen, T.
Kassler, A.
Aggregation-based certificate transparency gossip arxiv.org Other Datasets
Topology with BGP
2017
Liu, Z.
Liu, Y.
Winter, P.
Mittal, P.
Hu, Y.
TorPolice: Towards enforcing service-defined access policies in anonymous systems arxiv.org Other Datasets
2017
Liu, Z. Minimal deployable endpoint-driven network forwarding: principle, designs and applications Univ. of Illinois at Urbana-Champaign Other Datasets
Topology with BGP
2017
Jeyasekar, A.
Kasmir Raja, S.
Annie Uthra, R.
Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks J. of Network and Computer Applications Other Datasets
2016
Krenc, T.
Feldmann, A.
BGP prefix delegations: A deep dive Internet Measurement Conf. (IMC) Paper Data and Tools
Topology with Archipelago
Topology with BGP
2016
Singh, J. Using looking glasses to understand the Internets structure Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM) Paper Data and Tools
2015
Nithyanand, R.
Starov, O.
Zair, A.
Gill, P.
Schapira, M.
Measuring and mitigating AS-level adversaries against Tor arxiv.org Paper Data and Tools
2015
Kamiyama, N. Analyzing impact of introducing CCN on profit of ISPs IEEE Trans. on Network and Service Management Paper Data and Tools
Topology with BGP
2014
Kamiyama, N. CCN economics: Can ISPs profit by introducing CCN? Conf. on Network and Service Management (CNSM) and Workshop Paper Data and Tools
Topology with BGP
2020
Todd, Arnold
He, Jia
Jiang, Weifan
Calder, Matt
Cunha, Italo
Giotsas, Vasileios
Katz-Bassett, Ethan
Cloud Provider Connectivity in the Flat Internet Internet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2020
Prehn, Lars
Lichtblau, Franziska
Feldmann, Anja
When wells run dry: the 2020 IPv4 address market CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Topology with Archipelago
2020
Lin, Zinan
Jain, Alankar
Wang, Chen
Fanti, Giulia
Sekar, Vyas
Using GANs for Sharing Networked Time Series Data:Challenges, Initial Promise, and Open Questions IMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Huang, Yuchen
Rabinovich, Michael
Al-Dalky, Rami
FlashRoute: Efficient Traceroute on a Massive Scale IMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Giotsas, Vasileios
Nomikos, George
Kotronis, Vasileios
Serpezis, Pavlos
Gigis, Petros
Manassakis, Lefteris
Dietzel, Christoph
Konstantaras, Stravros
Dimitropoulos, Xenofontas
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs IEEE/ACM Transactions on Networking Topology with Archipelago
Topology with BGP
2020
Giotsas, Vasileios
Koch, Thomas
Fazzion, Elverton
Cunha, Italo
Calder, Matt
Madhyastha, Harsha
Katz-Bassett, Ethan
Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes IMC 20: Proceedings of the ACM Internet Measurement Conference Topology with Archipelago
2020
Osat, Saeed
Radicchi, Filippo
Papadopoulos, Fragkiskos
k-core structure of real multiplex networks Phys. Rev. Research 2 Topology with Archipelago
2020
Chen, Di
Ba, Yang
Qiu, Han
Zhu, Junhu
Wang, Qingxian
ISRchain: Achieving efficient interdomain secure routing with blockchain Computers and Electrical Engineering Topology with Archipelago
Topology with BGP
2020
Sing Tomar, Shailendra
Rawat, Anil
Vyavahare, Prakash D
Tokebar, Sanjiv
Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profiles International Journal of Information Technology Topology with Archipelago
2020
Ke, Xiangyu
Khan, Arijit
Al Hasan, Mohommad
Rezvansangsari, Rojin
Reliability Maximization in Uncertain Graphs IEEE Transactions on Knowledge and Data Engineering Topology with Archipelago
2020
Gharaeibeh, Manaf
Papadopoulos, Christos
Heidemann, John
Partridge, Craig
Delay-based Identification of Internet Block Movement Colorado State University, Computer Science Topology with Archipelago
2020
Rye, E.
Beverly, R.
Discovering the IPv6 Network Periphery International Conference on Passive and Active Network Measurement Topology with Archipelago
Topology with BGP
2020
Karapoola, Sareena
Vairam, Prasanna Karthik
Raman, Shankar
Kamakoti, V.
Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks Computer Communications Topology with Archipelago
Topology with BGP
2020
C. Rye, Erik
Beverly, Robert
Discovering the IPv6 Network Periphery arXiv Topology with Archipelago
Topology with BGP
2019
Luttringer, J.R.
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
Let there be light: Revealing hidden MPLS tunnels with TNT Trans. on Network and Service Management (TNSM) Topology with Archipelago
2019
Sun, Y.
Li, M.
Su, S.
Tian, Z.
Shi, W.
Han, M.
Secure data sharing framework via hierarchical greedy embedding in darknets Mobile Networks and Applications Topology with Archipelago
2019
Bottger, T.
Antichi, G.
Fernandes, E.L.
di Lallo, R.
Bruyere, M.
Uhlig, S.
Tyson, G.
Ignacio, C.
Shaping the Internet: 10 years of IXP growth arxiv.org Topology with Archipelago
Topology with BGP
2019
Vanaubel, Y.
Luttringer, J.R.
Merindol, P.
Pansiot, J.J.
Donnet, B.
TNT, watch me explode: A light in the dark for revealing MPLS tunnels IEEE Topology with Archipelago
2019
Sfirakis, I.
Kotronis, V.
Validating IP prefixes and AS-paths with Blockchains arxiv.org Topology with Archipelago
Topology with BGP
2019
Berg, A.
Forsberg, D.
Identifying DNS-tunneled traffic with predictive models arxiv.org Topology with Archipelago
2019
Holland, J.
Smith, J.
Schuchard, M.
Measuring irregular geographic exposure on the Internet arxiv.org Topology with Archipelago
2019
Rye, E.C.
Martin, J.
Beverly, R.
EUI-64 considered harmful arxiv.org Topology with Archipelago
2019
Funel, A. The graph structure of the Internet at the Autonomous Systems level during ten years arxiv.org Topology with Archipelago
2019
Wu, X.
Gong, X.
Wu, Q.
Que, X.
Tian, Y.
Hierarchical Forwarding Bit Index Explicit Replication (HF-BIER) in Multicast IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC) Topology with Archipelago
2019
Tolpin, D. Population anomaly detection through deep gaussianization ACM/SIGAPP Symp. on Applied Computing Topology with Archipelago
2019
Papp, I.
Varga, L.
Afifi, M.
Gere, I.
Neda, Z.
Scaling in the space-time of the Internet Scientific Reports Topology with Archipelago
2019
Papadopoulos, F.
Kleineberg, K. K.
Link persistence and conditional distances in multiplex networks Physics Review E Topology with Archipelago
2019
Milolidakis, A.
Fontugne, R.
Dimitropoulos, X.
Detecting Network Disruptions At Colocation Facilities IEEE INFOCOM - IEEE Conference on Computer Communications Topology with Archipelago
2019
Li, M.
Zong, B.
Lumezanu, C.
Chen, H.
Learning IP network representations ACM SIGCOMM Computer Communication Review Topology with Archipelago
2019
Iodice, M.
Candela, M.
Di Battista, G.
Periodic Path Changes in RIPE Atlas IEEE Access Topology with Archipelago
2019
Frigioni, D.
DEmidio, M.
DAngelo, G.
Fully Dynamic 2-Hop Cover Labeling Journal of Experimental Algorithmics (JEA) Topology with Archipelago
2019
Elejla, O. E.
Anbar, M.
Belaton, B.
Alabsi, B.
Al-Ani, A. K.
Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection Computational Science and Technology Topology with Archipelago
2019
DEmidio, M.
Frigioni, D.
Distributed Shortest Paths on Power Law Networks in the Generalized Linear Preference Model: An Experimental Study International Conference on Computational Science and Its Applications Topology with Archipelago
2019
Chepoi, V.
Dragan, F. F.
Habib, M.
Vaxes, Y.
Alrasheed, H.
Fast approximation of eccentricities and distances in hyperbolic graphs Journal of Graph Algorithms and Applications Topology with Archipelago
Topology with BGP
2019
Baishya, R. C.
Bhattacharyya, D. K.
A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks IETE Journal of Research Topology with Archipelago
2018
Basheir, L. Power-law degree distribution consistency in the AS-level Internet topology Intl Conf. on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE) Topology with Archipelago
Topology with Skitter
2018
Sigloch, S. Mobile Internet connectivity, exploring structural bottlenecks in Tamil Nadu using active Internet periphery measurements Anglia Ruskin University Topology with Archipelago
Topology with BGP
Topology with Skitter
2018
Barik, R.
Welzl, M.
Elmokashfi, A. M.
Dreibholz, T.
Gjessing, S.
Can WebRTC QoS Work? A DSCP measurement study Intl Teletraffic Congress Topology with Archipelago
2018
Yan, S.
Khan, A.
Composite hashing for data stream sketches arxiv.org Topology with Archipelago
2018
Pearce, P. J. Methods and systems for understanding large-scale Internet threats Univ. of California, Berkeley Topology with Archipelago
2018
Apostolaki, M.
Marti, G.
Muller, J.
Vanbever, L.
SABRE: Protecting bitcoin against routing attacks arxiv.org Topology with Archipelago
2018
Wang, F.
Gao, L.
Xiaozhe, S.
Hirai, H.
Fujikawa, K.
Efficient handling of excessive locators in hierarchical addressing IEEE Conf. on Computer Communications Topology with Archipelago
2018
Fabian, B.
Ermakova, T.
Ghazaryan, Z.
Internet connectivity of financial services - A graph-based analysis SSRN Electronic J. Topology with Archipelago
2018
Singh, A.
Garg, S.
Batra, S.
Kumar, N.
Rodrigues, J. J.
Bloom filter based optimization scheme for massive data handling in IoT environment Future Generation Computer Systems Topology with Archipelago
2018
Holland, J.A. Quantifying irregular geographic exposure on the Internet Univ. of Tennessee Topology with Archipelago
2018
Mell, P.
Gueye, A.
Schanzle, C.
Quantifying information exposure in Internet routing Conf. on Trust, Security And Privacy In Computing And Communications/Big Data Science And Engineering (TrustCom/BigDataSE) Topology with Archipelago
Topology with BGP
2018
Griffin, D.
Phan, T.
Maini, E.
Rio, M.
Simoens, P.
On the feasibility of using current data centre infrastructure for latency-sensitive applications IEEE Trans. on Cloud Computing Topology with Archipelago
2018
Wang, J.H.
An, C.
A study on geographic properties of Internet routing Computer Networks Topology with Archipelago
2018
Gueye, A.
Mbaye, B.
On the prevalence of boomerang routing in Africa: Analysis and potential solutions Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol) Topology with Archipelago
2018
Glasser, D. Longitudinal study of large-scale traceroute results Naval Postgraduate School Topology with Archipelago
Topology with BGP
2018
Nur, A.Y.
Tozal, M.E.
Cross-AS (X-AS) Internet topology mapping Computer Networks Topology with Archipelago
Topology with BGP
2018
Xue, L.
Ma, X.
Luo, X.
Chang, E.W.W.
Miu, T.T.N.
Gu, G.
LinkScope: Toward detecting target link flooding attacks IEEE Trans. on Information Forensics and Security Topology with Archipelago
2018
Qiu, H.
Zhu, H.
Li, Y.
Zeng, Z.
FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing System Intl Conf. on Computer and Communications (ICCC) Topology with Archipelago
2018
Nur, A. Y.
Tozal, M. E.
Geography and Routing in the Internet ACM Transactions on Spatial Algorithms and Systems (TSAS) Topology with Archipelago
Topology with BGP
2018
Malliga, S.
Kanimozhiselvi, C. S.
Kogilavani, S. V.
A Logarithmic and Exponentiation Based IP Traceback Scheme with Zero Logging and Storage Overhead International Journal on Future Revolution in Computer Science and Communication Engineering Topology with Archipelago
Topology with Skitter
2018
Li, Y.
Xie, H.
Lui, J. C. S.
Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models IEEE Intl Conf. on Network Protocols (ICNP) Topology with Archipelago
2018
Li, M.
Lumensanu, C.
Zong, B.
Chen, H.
Deep Learning IP Network Representations Workshop on Big Data Analytics and Machine Learning for Data Communication Networks Topology with Archipelago
2018
Lee, Y. Improving accuracy and efficiency of network measurement by identifying homogenous IPv4 addresses Univ. of Maryland Topology with Archipelago
2018
Kiedanski, D.
Grampin, E.
Alvarez-Hamelin, J. I.
The Atlas Vision of IPv6 in Latin America: Topology and Latency Latin America Networking Conf. Topology with Archipelago
2018
Hu, H.
Liu, W.
Fei, G.
Yang, S.
Hu, G.
A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery Information and Communications Technology Topology with Archipelago
2018
Heidemann, J.
Pradkin, Y.
Nisar, A.
Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended) University of Southern California / Information Sciences Institute Topology with Archipelago
2018
Fukuda, K.
Heidemann, J.
Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning Internet Measurement Conf. (IMC) Topology with Archipelago
2018
Fan, Z.
Han, Z.
Tang, W. K. S.
Lin, D.
Relay-based information broadcast in complex networks Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2018
Fan, Z.
Tang, W.
Interplay of ICP and IXP over the Internet with power-law features Intl J. of Modern Physics C Topology with Archipelago
2018
Fabian, B.
Kelkel, S.
Ermakova, T.
Baumann, A.
Attacking Internet Border Routers - A Graph-Based Analysis of Strategies ssrn.com Topology with Archipelago
2018
Elejla, O. E.
Anbar, M.
Belaton, B.
Hamouda, S.
Labeled flow-based dataset of ICMPv6-based DDoS attacks arxiv.org Topology with Archipelago
2018
DAngelo, G.
DEmidio, M.
Frigioni, D.
Distance-Vector Algorithms for Distributed Shortest Paths Computation in Dynamic Networks Shortest Path Solvers. From Software to Wetware Topology with Archipelago
2018
Cicalese, D.
Rossi, D.
A longitudinal study of IP Anycast ACM SIGCOMM Computer Communication Review Topology with Archipelago
2018
Beverly, R.
Duraiajan, R.
Plonka, D.
Roherer, J. P.
In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery Internet Measurement Conf. (IMC) Topology with Archipelago
2018
Barford, P. Diverse Data Sets for Impact Univ. of Wisconsin System Madison United States Topology with Archipelago
2018
Al-Musawi, B. Detecting BGP anomalies using recurrence quantification analysis Swinburne Univ. of Technology Topology with Archipelago
2018
Aceto, G.
Botta, A.
Marchetta, P.
Persico, V.
Pescape, A.
A comprehensive survey on internet outages J. of Network and Computer Applications Topology with Archipelago
Topology with BGP
2017
Kleineberg, K.-K. Metric clusters in evolutionary games on scale-free networks Nature Communications Topology with Archipelago
2017
Vanaubel, Y.
Merindol, P.
Pansiot, J.
Donnet, B.
Through the wormhole: Tracking invisible MPLS tunnels Internet Measurement Conf. (IMC) Topology with Archipelago
2017
Murdock, A.
Li, F.
Bramsen, P.
Durumeric, Z.
Paxson, V.
Target generation for Internet-wide IPv6 scanning Internet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2017
Mukherjee, S.
Sriram, S.
Vu, T.
Raychaudhuri, D.
EIR: Edge-aware inter-domain routing protocol for the future mobile internet Computer Networks Topology with Archipelago
2017
Lichtblau, F.
Streibeld, F.
Kruger, T.
Richter, P.
Feldmann, A.
Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses Internet Measurement Conf. (IMC) Topology with Archipelago
2017
Chavula, J. Improving Pan-African research and education networks through traffic engineering: A LISP/SDN approach Univ. of Cape Town Topology with Archipelago
2017
Wang, F.
Shao, X.
Gao, L.
Hirai, H.
Fujikawa, K.
Labelling and encoding hierarchical addressing for scalable Internet routing Adv. in Computer and Computational Sciences Topology with Archipelago
2017
Mayer, R.
Graser, L.
Gupta, H.
Saurez, E.
Ramachandran, U.
EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures arxiv.org Topology with Archipelago
2017
Edeline, K.
Donnet, B.
A first look at the prevalence and persistence of middleboxes in the wild Intl Teletraffic Congress Topology with Archipelago
2017
Ando, M.
Okada, M.
Kanaoka, A.
Simulation study of BGP origin validation effect against mis-origination with Internet topology Asia Joint Conf. on Information Security Topology with Archipelago
Topology with BGP
2017
Bronzino, F.
Mukherjee, S.
Raychaudhuri, D.
The named-object abstraction for realizing advanced mobility services in the future Internet Proc. of the Workshop on Mobility in the Evolving Internet Architecture Topology with Archipelago
2017
Muscoloni, A.
Cannistraci, C.V.
Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction arxiv.org Topology with Archipelago
2017
Mukherjee, S.
Sriram, S.
Raychaudhuri, D.
Edge-aware inter-domain routing for realizing next-generation mobility services IEEE Conf. on Communications (ICC) Topology with Archipelago
2017
Hu, G.
Chen, W.
Li, Q.
Jiang, Y.
Xu, K.
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code Future Generation Computer Systems Topology with Archipelago
Topology with BGP
2017
DEmidio, M.
Frigioni, D.
Distance-vector algorithms for distributed shortest paths on dynamic power-law networks preprints.org Topology with Archipelago
2017
Candela, M.
Bartolomeo, M.
Battista, G.
Squarcella, C.
Radian: Visual exploration of traceroutes IEEE Trans. Visualization and Computer Graphics Topology with Archipelago
2017
Scheitle, Q.
Gasser, O.
Sattler, P.
Carle, G.
HLOC: Hints-based geolocation leveraging multiple measurement frameworks Network Traffic Measurement and Analysis Conf. Topology with Archipelago
2017
Cho, S.
Nithyanand, R.
Razaghpanah, A.
Gill, P.
A churn for the better: Localizing censorship using network-level path churn and network tomography arxiv.org Topology with Archipelago
Topology with BGP
2017
Apostolaki, M.
Zohar, A.
Vanbever, L.
Hijacking bitcoin: Routing attacks on cryptocurrencies Symp. on Security and Privacy Topology with Archipelago
2017
Ren, L.F.
Wang, Z.
Liu, X.
Li, Q.
Chen, Z.
The design and implementation of a covering MDN-complete-life-cycle malicious domain detection framework Intl Conf. on Computer Science and Technology (CST) Topology with Archipelago
2017
Motamedi, R. Measurement-based characterization of large-scale networked systems Univ. of Oregon Topology with Archipelago
Topology with BGP
2017
Jiang, Q.
Hu, H.
Hu, G.
Two-type information fusion based IP-to-AS mapping table refining J. of Computer Science and Technology Topology with Archipelago
Topology with BGP
2017
Fabian, B.
Baumann, A.
Ehlert, M.
Vasilis, V.
Ermakova, T.
CORIA - Analyzing Internet connectivity risks using network graphs IEEE Conf. on Communications (ICC) Topology with Archipelago
Topology with BGP
2017
Ciavarella, S.
Bartolini, N.
Khamfroush, H.
La Porta, T.
Progressive damage assessment and network recovery after massive failures Computer Communications Topology with Archipelago
2017
Kleineberg, K.
Helbing, D.
Collective navigation of complex networks: Participatory greedy routing Scientific Reports Topology with Archipelago
2017
Gaston, E.W. High-frequency mapping of the IPv6 Internet using Yarrp Naval Postgraduate School Topology with Archipelago
2017
Schuchard, M.
Geddes, J.
Schliep, M.
Hopper, N.
The cost of the path not taken IEEE Global Communications Conf. (GLOBECOM) Topology with Archipelago
2017
Almeida, R.
Fonseca, O.
Fazzion, E.
Guedes, D.
Meira, W.
Cunha, I.
A characterization of load balancing on the IPv6 Internet Conf. on Passive and Active Network Measurement Topology with Archipelago
Topology with BGP
2017
Zhang, X.
Xu, G.
Xia, Y.
Optimal defense resource allocation in scale-free networks Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2017
Zhang, C.
Hu, G.
Chen, G.
Sangaiah, A. K.
Zhang, P.
Yan, X.
Jiang, W.
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack IEEE Access Topology with Archipelago
2017
Tootaghaj, D. Z.
He, T.
La Porta, T.
Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring ACM SIGMETRICS Performance Evaluation Review Topology with Archipelago
2017
Sun, Y.
Zhang, Y.
Fang, B.
Zhang, H.
Succinct and practical greedy embedding for geometric routing Computer Communications Topology with Archipelago
2017
Pearce, P.
Ensalfi, R.
Li, F.
Feamster, N.
Paxson, V.
Augur: Internet-wide detection of connectivity disruptions IEEE Symp. on Security and Privacy Topology with Archipelago
2017
Lee, Y.
Spring, N.
Identifying and Analyzing Broadband Internet Reverse DNS Names Intl Conf. on emerging Networking EXperiments and Technologies Topology with Archipelago
Topology with BGP
2017
Fernandes, S. Performance evaluation for network services, systems and protocols arxiv.org Topology with Archipelago
Topology with BGP
2017
Ciavarella, S. Network analysis and algorithm solutions in critical emergency scenarios Sapienza Univ. of Rome Topology with Archipelago
2017
Cho, S.
Nithyanand, R.
Gill, P.
Razaghpanah, A.
A Churn for the Better CoNEXT Topology with Archipelago
Topology with BGP
2017
Canbaz, M. A.
Thom, J.
Gunes, M. H.
Comparative analysis of internet topology data sets Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2017
Alves, D.S.F.
Obraczka, K.
An empirical characterization of Internet round-trip times ACM Symp. on QoS and Security for Wireless and Mobile Networks Topology with Archipelago
2016
Wang, F.
Shao, X.
Gao, L.
Harai, H.
Fujikawa, K.
Towards variable length addressing for scalable Internet routing IEEE Performance Computing and Communications Conf. (IPCCC) Topology with Archipelago
2016
Jacquemart, Q. Towards uncovering BGP hijacking attacks ParisTech Topology with Archipelago
2016
Xu, Q.
Zhang, X.
Zhao, J.
Wang, X.
Wolf, T.
Fast shortest-path queries on large-scale graphs International Conference on Network Protocols Topology with Archipelago
Topology with Skitter
2016
Richter, P.
Smaragdakis, G.
Plonka, D.
Berger, A.
Beyond counting: New perspectives on the active IPv4 address space Internet Measurement Conf. (IMC) Topology with Archipelago
2016
Marder, A.
Smith, J.M.
MAP-IT: Multipass accurate passive inferences from traceroute Internet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2016
Liaskos, C.
Dimitropoulos, X.
Tassiulas, L.
Backpressure on the backbone: A lightweight, non-intrusive traffic engineering approach IEEE Trans. on Network and Service Management Topology with Archipelago
Topology with BGP
2016
Beverly, R. Yarrping the Internet: Randomized high-speed active topology discovery Internet Measurement Conf. (IMC) Topology with Archipelago
2016
Gueye, A.
Mell, P.
Banse, D.
Congo, F.
On the Internet connectivity in Africa EAI Conf. on e-Infrastructure and e-Services for developing countries Topology with Archipelago
2016
Chandrasekaran, B. Head into the cloud: An analysis of the emerging cloud infrastructure Duke Univ. Topology with Archipelago
Topology with BGP
2016
Wang, Z.
Li, Q.
Jin, F.
Xiong, W.
Wu, Y.
Hyperbolic mapping of complex networks based on community information Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Li, F.
Durumeric, Z.
Czyz, J.
Karami, M.
Bailey, M.
McCoy, D.
Savage, S.
Paxson, V.
Youve got vulnerability: Exploring effective vulnerability notifications USENIX Security Symp. Topology with Archipelago
2016
Tan, H.
Sherr, M.
Zhou, W.
Data-plane defenses against routing attacks on Tor Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2016
Rohrer, J.
LaFever, B.
Beverly, R.
Empirical study of router IPv6 interface address distributions IEEE Internet Computing Topology with Archipelago
2016
Lin, C.
Bi, Y.
Zhao, H.
Cai, W.
Research on bottleneck-delay in internet based on IP united mapping Peer-to-Peer Networking and Applications Topology with Archipelago
2016
Kleineberg, K.-K.
Boguna, M.
Serrano, A.
Papadopoulos, F.
Hidden geometric correlations in real multiplex networks Nature Physics Topology with Archipelago
2016
Kim, T.H.
Kim, D.S.
Jung, H.Y.
Defending against DDoS attacks under IP spoofing using image processing approach IEICE Trans. on Communications Topology with Archipelago
2016
Barton, A.
Wright, M.
DeNASA: Destination-naive AS-awareness in anonymous communications Proc. on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2016
Wang, Y.
Zhang, K.
Quantifying the flattening of Internet topology Conf. on Future Internet Technologies Topology with Archipelago
Topology with BGP
Topology with Skitter
2016
Shah, A.
Fontunge, R.
Papadopoulos, C.
Towards characterizing international routing detours arxiv.org Topology with Archipelago
Topology with BGP
2016
De Mol, M.
Feuillen, G.
Toward realistic network topologies Univ. de Louvain Topology with Archipelago
2016
Czyz, J.J. A brave new world: Studies on the deployment and security of the emerging IPv6 Internet Univ. of Michigan, Ann Arbor, MI, US Topology with Archipelago
2016
Wang, Z.
Wu, Y.
Li, Q.
Jin, F.
Xiong, W.
Link prediction based on hyperbolic mapping with community structure for complex networks Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2016
Nithyanand, R.
Singh, R.
Cho, S.
Gill, P.
Holding all the ASes: Identifying and circumventing the pitfalls of AS-aware Tor client design arxiv.org Topology with Archipelago
2016
Li, Q. Reducing short flows latency in the Internet Univ. of Illinois at Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Baumann, A.
Fabian, B.
Vulnerability against Internet disruptions - A graph-based perspective Lecture Notes in Computer Science Topology with Archipelago
Topology with BGP
2016
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type inference in Internet AS graphs Computer Comm.s Workshops (INFOCOM WKSHPS) Topology with Archipelago
Topology with BGP
2016
Tan, Z.D.H. Network level attacks and defenses against anonymity networks Georgetown Univ. Topology with Archipelago
Topology with BGP
2016
Rye, E.C.
Rohrer, J.P.
Beverly, R.
Revisiting AS-level graph reduction Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing resilience of inter-domain routing system under regional failures KSII Trans. on Internet and Information Systems Topology with Archipelago
Topology with BGP
2016
Li, Q. Reducing short flows latency in the internet Univ. Illinois, Urbana-Champaign Topology with Archipelago
Topology with BGP
2016
Canbaz, M.A. Data-driven large scale network-layer Internet simulation IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2016
Veitch, D.
Vijayalayan, K.
Network timing and the 2015 leap second Passive and Active Measurement (PAM) Topology with Archipelago
2016
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
A brief history of MPLS usage in IPv6 Passive and Active Measurement (PAM) Topology with Archipelago
Topology with BGP
2016
Nomikos, G.
Dimitropoulos, X.
traIXroute: Detecting IXPs in traceroute paths Lecture Notes in Computer Science (LNCS) Topology with Archipelago
Topology with BGP
2016
Marcisak, S. Correlating inferred data plane IPv6 reboot events with control plane BGP activity Naval Postgraduate School, Monterey, CA, US Topology with Archipelago
2016
Jiao, B.
Shi, J.-M.
Graph perturbations and corresponding spectral changes in Internet topologies Computer Communications Topology with Archipelago
2016
Kleineberg, K.
Boguna, M.
Serrano, M.
Papadopoulos, F.
Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation arxiv.org Topology with Archipelago
Topology with BGP
2016
Gao, Q.
Wang, F.
Gao, L.
Quantifying AS path inflation by routing policies Intl J. of Future Generation Communication and Networking Topology with Archipelago
2016
Chen, J.
Kumar, V.S.A.
Marathe, M.V.
Sundaram, R.
Thakur, M.
Thulasidasan, S.
A study of the structure and vulnerabilities of metropolitan area networks Intl. Conf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
Topology with Skitter
2015
Sun, Y.
Zhang, Y.
Zhang, H.
Fang, B.
Du, X.
Geometric Routing on Flat Names for ICN IEEE Global Comm. Conference Topology with Archipelago
2015
Liu, W.
Jiang, Q.
Fei, G.
Yuan, M.
Hu, G.
A novel methodology of router-to-AS mapping inspired by community discovery arxiv.org Topology with Archipelago
2015
DEmidio, M.
Frigioni, D.
Navarra, A.
Explore and repair graphs with black holes using mobile entities Theoretical Computer Science Topology with Archipelago
2015
Vanaubel, Y.
Merindol, P.
Pansiot, J.-J.
Donnet, B.
MPLS under the microscope: Revealing actual transit path diversity Internet Measurement Conf. (IMC) Topology with Archipelago
2015
Sriram, S. Edge-aware inter-domain routing protocol for the MobilityFirst Future Internet Architecture Rutgers, The State Univ. of New Jersey Topology with Archipelago
2015
Medeiros, J.P.S.
Motta Pires, P.S.
Borges Neto, J.B.
Loureiro, A.A.F.
Minimization and placement of sensors in structurally observable networks Conf. on Computer and Information Technology (CIT) Topology with Archipelago
2015
Fabian, B.
Baumann, A.
Lackner, J.
Topological analysis of cloud service connectivity Computers and Industrial Engineering Topology with Archipelago
Topology with BGP
2015
Vijayalakshmi, M.
Shalinie, S.M.
Single packet ICMP traceback technique using router interface J. of Information Science and Engineering Topology with Archipelago
2015
Phua, W. Detection of active topology probing deception Naval Postgraduate School Topology with Archipelago
2015
Li, X.
Wu, H.
Scoglio, C.
Gruenbacher, D.
Robust allocation of weighted dependency links in cyber-physical networks Physica A: Statistical Mechanics and its Applications Topology with Archipelago
2015
Gray, M.D. Discovery of IPv6 router interface addresses via heuristic methods Naval Postgraduate School Topology with Archipelago
2015
Papadopoulos, F.
Aldecoa, R.
Krioukov, D.
Network geometry inference using common neighbors Phys. Rev. E Topology with Archipelago
2015
Gao, Q.
Wang, F.
Gao, L.
Routing-policy aware peering for large content providers Computer Comm. Topology with Archipelago
2015
Beiro, M.G.
Grynberg, S.P.
Alvarez-Hamelin, J.I.
Router-level community structure of the Internet Autonomous Systems EPJ Data Science Topology with Archipelago
2015
Yanbin, S.
Yu, Z.
Shen, S.
Hongli, Z.
Binxing, F.
Geometric name routing for ICN in dynamic world China Comm. Topology with Archipelago
2015
Kotronis, V.
Gamperli, A.
Dimitropoulos, X.
Routing centralization across domains via SDN: A model and emulation framework for BGP evolution Computer Networks Topology with Archipelago
2015
Katsaros, K.
Vasilakos, X.
Okwii, T.
Xylomenos, G.
Pavlou, G.
Polyzos, G.
On the inter-domain scalability of route-by-name information-centric network architectures IFIP Networking Conf. Topology with Archipelago
2015
DAndrea, A.
DEmidio, M.
Frigioni, D.
Leucci, S.
Proietti, G.
Dynamic maintenance of a shortest-path tree on homogeneous batches of updates: New algorithms and experiments J. Experimental Algorithmics Topology with Archipelago
2015
Juen, J.
Johnson, A.
Das, A.
Borisov, N.
Caesar, M.
Defending Tor from network adversaries: A case study of network path prediction Privacy Enhancing Technologies Topology with Archipelago
2015
Simoens, P.
Herzeele, L.V.
Vandeputte, F.
Vermoesen, L.
Challenges for orchestration and instance selection of composite services in distributed edge clouds Intl. Symp. on Integrated Network Management (IM) Topology with Archipelago
2015
Siddiqui, M.S.
Montero, D.
Serral-Gracia, R.
Yannuzzi, M.
Self-reliant detection of route leaks in inter-domain routing Computer Networks Topology with Archipelago
2015
Jaggard, A.D.
Johnson, A.
Cortes, S.
Syverson, P.
Feigenbaum, J.
20,000 in league under the sea: Anonymous communication, trust, MLATs, and undersea cables Proc. on Privacy Enhancing Technologies Topology with Archipelago
Topology with BGP
2015
Edeline, K.
Donnet, B.
Towards a middlebox policy taxonomy: Path impairments IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with Archipelago
2015
Chavula, J.
Fearnster, N.
Bagula, A.
Suleman, H.
Quantifying the effects of circuitous routes on the latency of intra-Africa Internet traffic: A study of research and education networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Topology with Archipelago
2015
West, A. Toward a robust method of presenting a rich, interconnected deceptive network topology Naval Postgraduate School Topology with Archipelago
2015
Padmanabhan, R.
Li, Z.
Levin, D.
Spring, N.
UAv6: Alias Resolution in IPv6 Using Unused Addresses Intl Conf. on Passive and Active Network Measurement Topology with Archipelago
2015
LaFever, B. Methods for intelligent mapping of the IPv6 address space Naval Postgraduate School Topology with Archipelago
2015
Wachs, M. A secure and resilient communication infrastructure for decentralized networking applications Technical Univ. of Munich Topology with Archipelago
2015
Mell, P.
Harang, R.
Gueye, A.
The resilience of the Internet to colluding country induced connectivity disruptions Network and Distributed System Security Symp. (NDSS) Topology with Archipelago
2015
Chandrasekaran, B.
Bai, M.
Schoenfield, M.
Berger, A.
Caruso, N.
Economou, G.
Gilliss, S.
Maggs, B.
Moses, K.
Duff, D.
Ng, K.C.
Sirer, E.G.
Weber, R.
Wong, B.
Alidade: IP geolocation without active probing Duke Univ. Topology with Archipelago
Topology with BGP
2014
Siddiqui, M.S.
Montero, D.
Yannuzzi, M.
Serral-Gracia, R.
Masip-Bruin, X.
Ramirez, W.
Route leak detection using real-time analytics on local BGP information IEEE Global Communications Conf. Topology with Archipelago
2014
Hric, D.
Darst, R.K.
Fortunato, S.
Community detection in networks: Structural communities versus ground truth Phys. Rev. E Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet: Causes, exploits, and countermeasures Conf. on Computer and Communications Security Topology with Archipelago
Topology with BGP
2014
Fowler, J
Johnson, T
Simonetto, P
Lazos, P
Kobourov, S.
Schneider, M.
Aceda, C.
IMap: Visualizing network activity over Internet maps Visualization for Cyber Security (VizSec) Topology with Archipelago
UCSD Network Telescope
2014
Durairajan, R.
Sommers, J.
Barford, P.
Layer 1-informed Internet topology measurement Internet Measurement Conf. (IMC) Topology with Archipelago
2014
Kiremire, A.R.
Brust, M.R.
Phoha, V.V.
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes Computer Networks Topology with Archipelago
2014
Craven, R.
Beverly, R.
Allman, M.
A middlebox-cooperative TCP for a non end-to-end internet ACM SIGCOMM Computer Communication Review Topology with Archipelago
2014
Reed, D.
Warbritton, D.
Sicker, D.
Current trends and controversies in Internet peering and transit: Implications for the future evolution of the Internet Conf. on Communication, Information and Internet Policy (TPRC) Topology with Archipelago
2014
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
Comparative assessment of centrality indices and implications on the vulnerability of ISP networks Intl Teletraffic Congress (ITC) Topology with Archipelago
2014
Mosley, L.D. IPv6 network infrastructure and stability inference Naval Postgraduate School Topology with Archipelago
2014
Maggs, B. Mapping the whole Internet Duke Univ. Topology with Archipelago
Topology with BGP
2014
Czyz, J.
Allman, M.
Zhang, J.
Iekel-Johnson, S.
Osterweil, E.
Bailey, M.
Measuring IPv6 adoption Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Topology with Archipelago
2014
Burnett, S.R. Empowering bystanders to facilitate Internet censorship measurement and circumvention Georgia Tech Topology with Archipelago
UCSD Network Telescope
2014
Wright, J.E. Temporal comparisons of Internet topology Naval Postgraduate School Topology with Archipelago
2014
Landry, B. Comparing internet probing methodologies through an analysis of large dynamic graphs Naval Postgraduate School Topology with Archipelago
2014
Jaggard, A.D.
Johnson, A.
Syverson, P.
Feigenbaum, J.
Representing network trust and using it to improve anonymous communication arxiv.org Topology with Archipelago
Topology with BGP
2014
Kang, M.S.
Gligor, V.D.
Routing bottlenecks in the Internet - causes, exploits, and countermeasures Carnegie Mellon Univ. Topology with Archipelago
Topology with BGP
2014
Tran, T.V.H. IPv6 geolocation using latency constraints Naval Postgraduate School Topology with Archipelago
2014
Baltra, G.
Beverly, R.
Xie, G.G.
Ingress point spreading: A new primitive for adaptive active network mapping Passive and Active Measurement (PAM) Topology with Archipelago
2014
Xu, Y.
Ma, W.
Robustness analyses of Internet topology with power-law features Intl J. of Future Generation Communication and Networking Topology with Archipelago
2014
Orzen, S.-N. Domain relations in trees arborescence for interaction search on persistent routing availability Symp. on Applied Machine Intelligence and Informatics (SAMI) Topology with Archipelago
2014
Gansner, E.R.
Krishnamurthy, B.
Willinger, W.
Bustamante, F.E.
Sanchez, M.A.
Demo abstract: towards extracting semantics by visualizing large traceroute datasets Computing Topology with Archipelago
2013
Verigin, A.L. Evaluating the effectiveness of Sybil attacks against peer-to-peer botnets Univ. of Victoria, Victoria, CA Topology with Archipelago
2013
Nomikos, G.
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
The multiple instances of node centrality and their implications on the vulnerability of ISP networks arxiv.org Topology with Archipelago
2013
Johnson, A.
Wacek, C.
Jansen, R.
Sherr, M.
Syverson, P.
Users get routed: Traffic correlation on Tor by realistic adversaries ACM SIGSAC Conf. on Computer and Communications Security (CCS) Topology with Archipelago
Topology with BGP
2013
Vanaubel, Y.
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Network fingerprinting: TTL-based router signatures Internet Measurement Conf. (IMC) Topology with Archipelago
2013
Ma, L.
He, T.
Leung, K.K.
Swami, A.
Towsley, D.
Identifiability of link metrics based on end-to-end path measurements Internet Measurement Conf. (IMC) Topology with Archipelago
2013
Khan, A.
Kwon, T.
Kim, H.
Choi, Y.
AS-level topology collection through looking glass servers Internet Measurement Conf. (IMC) Topology with Archipelago
2013
Sapegin, A.
Uhlig, S.
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events Computer Communications Topology with Archipelago
2013
Daryl, L.H.A. Toward large-graph comparison measures to understand Internet topology dynamics Naval Postgraduate School, Monterey, CA, US Topology with Archipelago
2013
Chabarek, J.
Barford, P.
Whats in a name?: decoding router interface names ACM workshop on HotPlanet Topology with Archipelago
2013
Lu, N.
Wang, Y.
Su, S.
Yang, F.
Han, R.
Filtering location optimization for the reactive packet filtering Security and Communication Networks Topology with Archipelago
2013
Pantazopoulos, P.
Karaliopoulos, M.
Stavrakakis, I.
On the local approximations of node centrality in Internet router-level topologies Workshop on Self-Organizing Systems (IWSOS) Topology with Archipelago
2013
Chen, A.
Chan, E.W.W.
Luo, X.
Fok, W.W.T.
Chang, R.K.C.
An efficient approach to multi-level route analytics IFIP/IEEE Symp. on Integrated Network Management (IM) Topology with Archipelago
2013
Yang, B.
Zhao, H.
Zhang, J.
Ai, J.
Jia, S.
Ge, x.
Liu, W.
Analysis of interlayer connection catastrophe characteristics in Internet AS level topology Telkomnika Topology with Archipelago
2013
Wacek, C.
Tan, H.
Bauer, K.
Sherr, M.
An empirical evaluation of relay selection in Tor Network and Distributed System Security Symp. (NDSS) Topology with Archipelago
Topology with BGP
2013
Wang, Y.
Bi, J.
Wu, J.
Revisiting the rich club of the Internet AS-level topology IEICE Trans. on Communications Topology with Archipelago
Topology with Skitter
2012
Yu, M.
Jiang, W.
Li, H.
Stoica, I.
Tradeoffs in CDN designs for throughput oriented traffic ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with Archipelago
2012
Sherry, J. Future architectures for middlebox processing services on the Internet and in the Cloud UC Berkeley Topology with Archipelago
Topology with BGP
2012
Ren, D.
Wong, W.
Gary Chan, S.-H.
Toward continuous push-based P2P live streaming IEEE Global Telecommunications Conf. (GLOBECOM) Topology with Archipelago
2012
Ahmad, M.Z.
Guha, R.
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation J. Supercomputing Topology with Archipelago
2012
DAngelo, G.
DEmidio, M.
Frigioni, D.
Romano, D.
Enhancing the computation of distributed shortest paths on real dynamic networks Mediterranean Conf. on Algorithms Topology with Archipelago
2012
Wachs, M.
Grothoff, C.
Thurimella, R.
Partitioning the Internet Conf. on Risks and Security of Internet and Systems (CRiSIS) Topology with Archipelago
Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks IEEE Conf. on Local Computer Networks (LCN) Topology with Archipelago
2012
Tyson, G.
Kaune, S.
Miles, S.
El-khatib, Y.
Mauthe, A.
Taweel, A.
A trace-driven analysis of caching in content-centric networks IEEE Conf. on Computer Communications and Networks (ICCCN) Topology with Archipelago
2012
Kambhampati, V.
Papadopolous, C.
Massey, D.
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks IEEE/IFIP Conf. on Dependable Systems and Networks (DSN) Topology with Archipelago
2012
Fiorese, A.
Simoes, P.
Boavida, F.
Peer selection in P2P service overlays using geographical location criteria Computational Science and Its Applications (ICCSA) Topology with Archipelago
2012
Xu, Y.
Zhang, X.
Analysis of Internet robustness in attacks Conf. on Systems and Informatics (ICSAI) Topology with Archipelago
2012
Schlegel, R.
Wong, D.S.
Anonymous overlay network supporting authenticated routing Information Sciences Topology with Archipelago
2012
Ren, D.
Chan, S.G.
Achieving high-bitrate overlay live streaming with proxy helpers Packet Video Workshop (PV) Topology with Archipelago
2012
Papadakis, H.
Fragopoulou, P.
Markatos, E.
Roussopoulos, M.
ITA: Innocuous topology awareness for unstructured P2P networks IEEE Trans. on Parallel and Distributed Systems Topology with Archipelago
Topology with BGP
2012
Faggiani, A.
Gregori, E.
Lenzini, L.
Mainardi, S.
Vecchio, A.
On the feasibility of measuring the internet through smartphone-based crowdsourcing Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) Topology with Archipelago
2012
Xu, Y.
Wang, Z.
Collapse by cascading failures in hybrid attacked regional Internet J. Security and Its Applications Topology with Archipelago
2012
Jacquin, L.
Roca, V.
Kaafar, M.A.
Schuler, F.
Roch, J.-L.
IBTrack: an ICMP black holes tracker hal.archives-ouvertes.fr Topology with Archipelago
2012
Huang, H.
Zhang, B.
Chan, S.-H.G.
Cheung, G.
Frossard, P.
Coding and replication co-design for interactive multiview video streaming IEEE INFOCOM Topology with Archipelago
2012
Cicerone, S.
DAngelo, G.
Di Stefano, G.
Frigioni, D.
Maurizio, V.
Engineering a new algorithm for distributed shortest paths on dynamic networks Algorithmica Topology with Archipelago
2012
Wang, Y.
Su, S.
Yang, Y.
Ren, J.
A more efficient hybrid approach for single-packet IP traceback EUROMICRO Conf. on Parallel, Distributed and Network-Based Processing (PDP) Topology with Archipelago
Topology with Skitter
2012
DAngelo, G.
DEmidio, M.
Frigioni, D.
Maurizio, V.
Engineering a new loop-free shortest paths routing algorithm Symp. on Experimental Algorithms (SEA) Topology with Archipelago
2011
Sommers, J.
Erikson, B.
Barford, P.
On the prevalence and characteristics of MPLS deployments in the open Internet Internet Measurement Conf. (IMC) Topology with Archipelago
Topology with BGP
2011
Zhang, Y.
Oliveira, R.
Wang, Y.
Su, S.
Zhang, B.
Bi, J.
Zhang, H.
Zhang, L.
A framework to quantify the pitfalls of using traceroute in AS-level topology measurement IEEE J. Selected Areas in Communications Topology with Archipelago
2011
Marchetta, P.
Merindol, P.
Donnet, B.
Pescape, A.
Pansiot, J.-J.
Topology discovery at the router level: a new hybrid tool targeting ISP networks IEEE J. Selected Areas in Communications Topology with Archipelago
Topology with Skitter
2011
Jesus, V.
Aguiar, R.L.
Steenkiste, P.
Topological implications of cascading interdomain bilateral traffic agreements IEEE J. Selected Areas in Communications Topology with Archipelago
2011
Ahmad, M.Z.
Guha, R.
Internet exchange points and Internet routing Conf. on Network Protocols (ICNP) Topology with Archipelago
2011
Moreira, M.D.D.
Laufer, R.
Fernandes, N.C.
Duarte, O.C.M.B.
A stateless traceback technique for identifying the origin of attacks from a single packet IEEE Conf. on Communications (ICC) Topology with Archipelago
2011
Gregori, E.
Lenzini, L.
Orsini, C.
k-clique communities in the Internet AS-level topology graph Distributed Computing Systems Workshops (ICDCSW) Topology with Archipelago
2011
Tomasik, J.
Weisser, M.-A.
Internet topology on as-level: Model, generation methods and tool IEEE Performance Computing and Communications Conf. (IPCC) Topology with Archipelago
Topology with BGP
2011
Gregori, E.
Lenzini, L
Orsini, C.
k-dense communities in the internet AS-level topology Conf. on Communication Systems and Networks (COMSNETS) Topology with Archipelago
2011
Gregori, E.
Improta, A.
Lenzini, L.
Orsini, C.
The impact of IXPs on the AS-level topology structure of the Internet Computer Communications Topology with Archipelago
2010
Fan, X.
Heidemann, J.
Selecting representative IP addresses for internet topology studies Internet Measurement Conf. (IMC) Topology with Archipelago
2010
Beverly, R.
Berger, A.
Xie, G.G.
Primitives for active internet topology mapping: toward high-frequency characterization Internet Measurement Conf. (IMC) Topology with Archipelago
2010
Ahmad, M.Z.
Guha, R.
Impact of Internet exchange points on Internet topology evolution Conf. on Local Computer Networks (LCN) Topology with Archipelago
Topology with Skitter
2010
Tomasik, J.
Weisser, M.-A.
aSHIIP: Autonomous generator of random internet-like topologies with inter-domain hierarchy IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with Archipelago
2010
Knauf, A.
Hege, G.
Schmidt, T.C.
Wahlisch, M.
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP Principles, Systems and Applications of IP Telecommunications (IPTComm) Topology with Archipelago
2010
Zhang, Y.
Oliveira, R.
Zhang, H.
Zhang, L.
Quantifying the pitfalls of traceroute in AS connectivity inference Passive and Active Measurement (PAM) Topology with Archipelago
2010
Laki, S.
Matray, P.
Haga, P.
Sebok, T.
Csabai, I.
Vattay, G.
Spotter: a model based active geolocation service IEEE Conf. on Computer Communications (INFOCOM) Topology with Archipelago
2010
King, A. Efficient internet topology discovery techniques Univ. Waikato, New Zealand Topology with Archipelago
2010
Ciceronea, S.
DAngelo, G.
Di Stefanoa, G.
Frigioni, D.
Partially dynamic efficient algorithms for distributed shortest paths Theoretical Computer Science Topology with Archipelago
2009
Zhang, G.-Q.
Zhang, G.-Q.
Cheng, S.-Q.
Zhou, T.
Symbiotic effect: A guideline for network modeling EPL (Europhysics Letters) Topology with Archipelago
2009
Germoglio, G.
Dias, B.
Sousa, P.
Automated and distributed network service monitoring Asia-Pacific Network Operations and Management Symp. (APNOMS) Topology with Archipelago
2009
Saucez, D.
Donnet, B.
Bonaventure, O.
On the impact of clustering on measurement reduction IFIP Networking Conf. Topology with Archipelago
2009
Dai, L
Cao, Y.
Cui, Y.
Xue, Y.
On scalability of proximity-aware peer-to-peer streaming Computer Communications Topology with Archipelago
Topology with BGP
2008
Wu, M.-F.
Jiang, T.M.
Wu, A.
A virtual service framework for service composition QoS based on active measurement Symp. on Service-Oriented System Engineering (SOSE) Topology with Archipelago
2008
Dramburg, M. Mobilitaet und Proximitaet in strukturierten Overlay-Netzen - Analysen zur Routing-Optimierung auf der Basis realer Internettopologien Hochschule fuer Angewandte Wissenschaften Hamburg, Germany Topology with Archipelago
Topology with Skitter
2008
Wahlisch, M.
Schmidt, T.C.
Spalt, W.
What is happening from behind?: Making the impact of internet topology visible Campus-Wide Information Systems Topology with Archipelago
Topology with Skitter
2008
Li, C.
Zhao, H.
Zhang, X.
Ge, X.
Research on the distribution of network nodes based on multiple measurement points Computer Science Topology with Archipelago
2007
Li, C.
Zhao, H.
Zhang, X.
Yuan, S.
Analysis on traveling time of internet China Institute of Communications Topology with Archipelago
2006
Chan, H.
Dash, D.
Perrig, A.
Zhang, H.
Modeling adoptability of secure BGP protocols Joint Conf. on Measurement and Modeling of Computer Systems Topology with Archipelago
2005
Su, W.-J.
Zhao, H.
Xu, Y.
Zhang, W.-B.
Internet complex network separation degree analysis based on hops J. China Inst. of Communications Topology with Archipelago
2020
Krenc, Thomas
Beverly, Robert
Smaragdakis, Georgios
Keep your Communities Clean: Exploring the Routing MessageImpact of BGP Communities CoNEXT 20: Proceedings of the International Conference on emerging Networking EXperiments and Technologies Topology with BGP
2020
Jin, Zitong
Shi, Xingang
Yang, Yan
Yin, Xia
Wang, Zhiliang
Wu, Jianping
TopoScope: Recover AS Relationships From Fragmentary Observations IMC 20: Proceedings of the ACM Internet Measurement Conference Topology with BGP
2020
Shao, X.
Gao, L
Verifying Policy-based Routing at Internet Scale IEEE INFOCOM -IEEE Conference on Computer Communications Topology with BGP
2020
Pi, Yibo
Jamin, Sugih
Danzig, Peter
Qian, Feng
Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View Proceedings of the ACM on Measurement and Analysis of Computing Systems Topology with BGP
2020
Grailet, Jean-Francois
Donnet, Benoit
Virtual Insanity: Linear Subnet Discovery IEEE Transactions on Network and Service Management Topology with BGP
2020
Barik, Runa
Welzl, Michael
Fairhurst, Gorry
Elmokashfi, Ahmed
Dreibholz, Thomas
Gjessing, Stein
On the usability of transport protocols other than TCP: A home gateway and internet path traversal study Computer Networks Topology with BGP
2020
Shapira, T.
Shavitt, Y.
Unveiling the type of relationship between Autonomous Systems using deep learning IEEE/IFIP Intl Workshop on Analytics for Network and Service Management (AnNet) Topology with BGP
2020
Giotsas, V.
Livadariu, I.
Gigis, P.
A first look at the misuse and abuse of the IPv4 Transfer Market Intl Conf. on Passive and Active Network Measurement Topology with BGP
2020
Witono, T.
Yazid, S.
Portrait of Indonesia Internet Topology at the Autonomous System Level Computational Science and Technology. Lecture Notes in Electrical Engineering Topology with BGP
2020
Subramani, Karthika
Perdisci, Roberto
Konte, Maria
IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points arxiv Topology with BGP
2020
Sonneveld, Jotte A Gravitational Approach for Ranking Autonomous Systems in Large Autonomous System Networks University of Twente Topology with BGP
2020
Pariset, Matteo
Ford, Bryan
Basescu, Cristina
Applying Approximate Distance Oracles to Internet Routing Swiss Federal Institute of Technology Lausanne Topology with BGP
2020
He, Hanyue Relationship between Network Traffic Topology Map and Degree of Competition Journal of Physics: Conference Series Topology with BGP
2019
London, Palma
Vardi, Shai
Wierman, Adam
Logarithmic Communication for DistributedOptimization in Multi-Agent Systems Proceedings of the ACM on Measurement and Analysis of Computing Systems Topology with BGP
2019
Liquori, L.
Gaeta, R.
Sereno, M.
A network aware resource discovery service ParisTech Topology with BGP
2019
Yeganah, Bahador
Durairajan, Ramakrishnan
Rejaie, Reza
Willinger, Walter
How Cloud Traffic Goes Hiding:A Study of Amazon Peering Fabric IMC 19: Proceedings of the Internet Measurement Conference Topology with BGP
2019
Raman, Aravindh
Joglekar, Sagar
De Cristofaro, Emiliano
Sastry, Nishanth
Tyson, Gareth
Challenges in the Decentralised Web:The Mastodon Case IMC 19: Proceedings of the Internet Measurement Conference Topology with BGP
2019
Vos, M. Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints Univ. of Twente Topology with BGP
2019
Niaki, A.A.
Cho, S.
Weinberg, Z.
Hoang, N.P.
Razaghpanah, A.
Christin, N.
Gill, P.
ICLab: A global, longitudinal Internet censorship measurement platform arxiv.org Topology with BGP
2019
Tajeuna, E.G.
Bouguessa, M.
Wang, S.
Modeling and predicting community structure changes in time-evolving social networks IEEE Trans. on Knowledge and Data Engineering Topology with BGP
2019
McDaniel, T.
Smith, J.M.
Schuchard, M.
The Maestro attack: Orchestrating malicious flows with BGP arxiv.org Topology with BGP
2019
Zhao, B.Z.H.
Ikram, M.
Asghar, H.J.
Kaafar, M.A.
Chaabane, A.
Thilakarathna, K.
A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklists arxiv.org Topology with BGP
2019
Liu, T.
Lui, J.
Lin, D.
Hui, D.
On the feasibility of inter-domain routing via a small broker set IEEE Trans. on Parallel and Distributed Systems Topology with BGP
2019
Yang, Y.
Yin, X.
Shi, X.
Wang, Z.
He, J.
Fu, T. Z. J.
Winslett, M.
Inter-domain routing bottlenecks and their aggravation Computer Networks Topology with BGP
2019
Xiang, Q.
Zhang, J. J.
Wang, X. T.
Liu, Y. J.
Guok, C.
Le, F.
Newman, H.
Yang, Y. R.
MacAuley, J.
Toward Fine-Grained, Privacy-Preserving, Efficient Multi-Domain Network Resource Discovery IEEE Journal on Selected Areas in Communications Topology with BGP
2019
Tran, M.
Kang, M. S.
Hsiao, H. C.
Chiang, W. H.
Tung, S. P.
Wang, Y. S.
On the Feasibility of Rerouting-based DDoS Defenses IEEE Symp. on Security and Privacy Topology with BGP
2019
Tian, Z.
Su, S.
Shi, W.
Du, X.
Guizani, M.
Yu, X.
A data-driven method for future Internet route decision modeling Future Generation Computer Systems Topology with BGP
2019
Sermpezis, P.
Kotronis, V.
Inferring Catchment in Internet Routing ACM on Measurement and Analysis of Computing Systems Topology with BGP
2019
Pulfer, M. Multi-path routing Swiss Fed. Inst. of Technology Zurich Topology with BGP
2019
Lin, Z.
Wang, C.
An Efficient Approximation of Betweenness Centrality for Uncertain Graphs IEEE Access Topology with BGP
2019
Leyba, K. G.
Edwards, B.
Freeman, C.
Crandall, J. R.
Forrest, S.
Borders and gateways: measuring and analyzing national as chokepoints ACM SIGCAS Conf. on Computing and Sustainable Societies Topology with BGP
2019
Jiao, L.
Lin, X.
Zhou, R.
Chen, X.
Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current Inputs ACM Intl Symp. on Mobile Ad Hoc Networking and Computing (Mobihoc) Topology with BGP
2019
Jiang, J.
Wen, S.
Yu, S.
Liu, B.
Xiang, Y.
Zhou, W.
Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator Malicious Attack Propagation and Source Identification Topology with BGP
2019
Ghose, N.
Lazos, L.
Rozenblit, J.
Breiger, R.
Multimodal Graph Analysis of Cyber Attacks Spring Simulation Conference (SpringSim) Topology with BGP
2019
Garay, D. Network Peering Dashboard for SURFnet Univ. of Amsterdam Topology with BGP
2019
Dwaraki, A.
Freedman, R.
Zilberstein, S.
Wolf, T.
Using Natural Language Constructs and Concepts to Aid Network Management International Conference on Computing, Networking and Communications (ICNC) Topology with BGP
2019
Del Fiore, J. M.
Merindol, P.
Persico, V.
Pelsser, C.
Pescape, A.
Filtering the noise to reveal inter-domain lies Network Traffic Measurement and Analysis Conference (TMA) Topology with BGP
2019
Bakhshaliyev, K.
Canbaz, M. A.
Gunes, M. H.
Investigating Characteristics of Internet Paths Transactions on Modeling and Performance Evaluation of Computing Systems Topology with BGP
2018
Weinberg, Z. Toward automated worldwide monitoring of network-level censorship Carnegie Mellon Univ. Topology with BGP
2018
Ramanathan, S.
Mirkovic, J.
Yu, M.
Zhang, Y.
SENSS against volumetric DDoS attacks Computer Security Applications Conf. (CSAC) Topology with BGP
2018
Pi, Y.
Jamin, S.
Danzig, P.
Shaha, J.
AP-atoms: A high-accuracy data-driven client aggregation for global load balancing IEEE/ACM Trans. on Networking Topology with BGP
2018
Mani, A.
Dworken, D.
Vaidya, T.
Sherr, M.
An extensive evaluation of the Internets open proxies Annual Computer Security Applications Conf. Topology with BGP
2018
Jansen, R.
Traudt, M.
Geddes, J.
Wacek, C.
Sherr, M.
Syverson, P.
KIST: Kernel-informed socket transport for Tor ACM Trans. on Privacy and Security (TOPS) Topology with BGP
2018
Xiang, Q.
Zhang, J.J.
Wang, X.T.
Liu, Y.J.
Guok, C.
Le, F.
MacAuley, J.
Newman, H.
Yang, Y.R.
Fine-grained, multi-domain network resource abstraction as a fundamental primitive to enable high-performance, collaborative data sciences Intl Conf. for High Performance Computing, Networking, Storage and Analysis Topology with BGP
2018
Smith, J.M.
Birkeland, K.
McDaniel, T.
Schuchard, M.
Withdrawing the BGP re-routing curtain: Understanding the security impact of BGP poisoning via real-world measurements arxiv.org Topology with BGP
2018
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Finding lasting dense subgraphs Data Mining and Knowledge Discovery Topology with BGP
2018
Levenburg, L. On interdisciplinary studies of physical information infrastructure Research Methods for the Digital Humanities, Ch. 2 Topology with BGP
2018
Gilad, Y.
Hlavacek, T.
Herzberg, A.
Schapira, M.
Shulman, H.
Perfect is the enemy of good: Setting realistic goals for interdomain routing security ACM Workshop on Hot Topics in Networks Topology with BGP
2018
Doan, T.V.
Pajevic, L.
Bajpai, V.
Ott, J.
Tracing the path to YouTube: A quantification of path lengths and latencies toward content caches IEEE Communications Magazine Topology with BGP
2018
Brandt, M.
Shulman, H.
Waidner, M.
Internet as a source of randomness ACM Workshop on Hot Topics in Networks Topology with BGP
2018
Wassermann, S.
Casas, P.
Distributed Internet paths performance analysis through machine learning Network Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2018
Streibelt, F.
Lichtblau, F.
Beverly, R.
Max, A. F.
Pelsser, C.
Smaragdakis, G.
Bush, R.
BGP communities: Even more worms in the routing can Internet Measurement Conf. (IMC) Topology with BGP
2018
Singh, R.
Dunna, A.
Gill, P.
Characterizing the deployment and performance of multi-CDNs Internet Measurement Conference (IMC) Topology with BGP
2018
Nur, A.
Tozal, M.
Identifying critical autonomous systems in the Internet J. of Supercomputing Topology with BGP
2018
Nomikos, K.
Nomikos, G.
Kotronis, V.
Sermpezise, P.
Gigis, P.
Manassakis, L.
Dietzel, C.
Konstantaras, S.
Dimitropoulos, X.
Giotsas, V.
O peer, where art thou?: Uncovering remote peering interconnections at IXPs Internet Measurement Conf. (IMC) Topology with BGP
2018
Hegde, N.
Chang, Q.
Kulkarni, M.
D2P: Automatically creating distributed dynamic programming codes Purdue Univ. Topology with BGP
2018
Ekparinya, P.
Gramoli, V.
Jourjon, G.
Impact of man-in-the-middle attacks on Ethereum Symp. on Reliable Distributed Systems (SRDS) Topology with BGP
2018
Shao, X.
Asaeda, H.
Dong, M.
Ma, Z
Cooperative inter-domain cache sharing for information-centric networking via a bargaining game approach IEEE Trans. on Network Science and Engineering Topology with BGP
2018
Marczak, B.
Scott-Railton, J.
McKune, S.
Razzak, B.A.
Deibert, R.
HIDE AND SEEK - Tracking NSO Group Pegasus spyware to operations in 45 countries Univ. of Toronto Topology with BGP
2018
Yuce, E.
Selcuk, A.A.
Server notaries: A complementary approach to the Web PKI trust model IET Information Security Topology with BGP
2018
Spring, N.
Li, Z.
Levin, D.
Bhattacharjee, B.
Internet anycast: performance, problems, and potential ACM SIGCOMM Topology with BGP
2018
Sikos, L.
Stumptner, M.
Mayer, W.
Howard, C.
Voigt, S.
Philp, D.
Automated reasoning over provenance-aware communication network knowledge in support of cyber-situational awareness Intl Conf. on Knowledge Science, Engineering and Management Topology with BGP
2018
Liu, Z.
Jin, H.
Hu, Y. C.
Bailey, M.
Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control IEEE/ACM Trans. on Networking Topology with BGP
2018
Liu, B.
Lu, C.
Duan, H.
Liu, Y.
Li, Z.
Hao, S.
Yang, M.
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path USENIX Security Symp. Topology with BGP
2018
Jin, J. BGP route leak prevention based on BGPsec Vehicular Technology Conf. (VTC-Fall) Topology with BGP
2018
Dethise, A.
Chiesa, M.
Canini, M.
Prelude: Ensuring inter-domain loop-freedom in SDN-enabled networks Asia-Pacific Workshop on Networking Topology with BGP
2018
Canbaz, M.A. Internet topology mining: From Big Data to Network Science Univ. of Nevada, Reno Topology with BGP
2018
Smith, J.
Schuchard, M.
Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing IEEE Symp. on Security and Privacy Topology with BGP
2018
Krohnke, N.
Jansen, J.
Vranken, H.
Resilience of the Domain Name System: A case study of the .nl-domain Computer Networks Topology with BGP
2018
Dey, P.K.
Canbaz, M.A.
Yuksel, M.
Gunes, M.H.
On correlating ISP topologies to their businesses Intl Conf. on Communications (ICC) Topology with BGP
2018
Bottger, T.
Cuadrado, F.
Uhlig, S.
Looking for hypergiants in PeeringDB ACM SIGCOMM Computer Communication Review Topology with BGP
2018
Sun, Y.
Yin, L.
Wang, Z.
Guo, Y.
Fang, B.
Identifying the propagation sources of stealth worms Intl Conf. on Computational Science Topology with BGP
2018
Gao, S.
Shrivastava, S.
Ogan, K.
Xin, Y.
Baldin, I.
Evaluating path query mechanisms as a foundation for SDN network control IEEE Conf. on Network Softwarization and Workshops (NetSoft) Topology with BGP
2018
Baumann, A. Network Science - Applications in technology, business and social media Humboldt Univ. of Berlin Topology with BGP
2018
Alessandro, M.
Vittorio, C.C.
Leveraging the nonuniform PSO network model as a benchmark for performance evaluation in community detection and link prediction New J. of Physics Topology with BGP
2018
Silva, W.J.A.
Sadok, D.F.H.
A survey on efforts to evolve the control plane of inter-domain routing MDPI J. Topology with BGP
2018
Lierde, H.V.
Chow, T.W.S.
Delvenne, J.C.
Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs J. of Complex Networks Topology with BGP
2018
Ekparinya, P.
Gramoli, V.
Jourjon, G.
Double-spending risk quantification in private, consortium and public Ethereum blockchains arxiv.org Topology with BGP
2018
Alrashed, H. Delta hyperbolicity and the core-periphery structure in graphs Lecture Notes in Social Networks (LNSN) Topology with BGP
2018
Silva, W.J.A. An architecture to manage incoming traffic of inter-domain routing using OpenFlow networks Information Topology with BGP
2018
Siddula, M.
Li, L.
Li, Y.
An empirical study on the privacy preservation of online social networks IEEE Access Topology with BGP
2018
Shah, A. Systems for characterizing Internet routing Colorado State Univ. Topology with BGP
UCSD Network Telescope
2018
Mendoza, J.R.
Ocampo, R.
Montes, I.
Festin, C.A.
Efficient feature extraction for Internet data analysis using AS2Vec ACM Symp. on Applied Computing Topology with BGP
2018
Ma, X.
Li, J.
Tang, Y.
An, B.
Guan, X.
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective Information Sciences Topology with BGP
2018
Birkner, R.
Drachsler-Cohen, D.
Vanbever, L.
Vechev, M.
Net2Text: query-guided summarization of network forwarding behaviors USENIX Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2018
Berenguer, S.
Pintor, F.
Radiography of Internet autonomous systems interconnection in Latin America and the Caribbean Computer Comm. Topology with BGP
2018
Tozal, M.E. Policy-preferred paths in AS-level Internet topology graphs Theory and Applications of Graphs Topology with BGP
2018
Shin, K.
Rad, T.
Faloutsos, C.
Patterns and anomalies in k-cores of real-world graphs with applications Knowledge and Information Systems Topology with BGP
2018
Wu, J.
Zhong, J.
Chen, Z.
Chen, B.
Optimal coupling patterns in interconnected communication networks IEEE Trans. on Circuits and Systems Topology with BGP
2018
He, L.
Jia, Y.
Ren, G.
Liu, Y.
RISP: An RPKI-based inter-AS source protection mechanism Tsinghua Science and Technology Topology with BGP
2018
Canbaz, M.A.
Bakhshaliyev, K.
Gunes, M.H.
Router-level topologies of Autonomous Systems Springer Proc. in Complexity Topology with BGP
2018
Xue, J.
Wang, J.
Liu, S.
Ma, X.
Wang, H.
Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency International Journal of Communication Systems Topology with BGP
2018
Wails, R.
Sun, Y.
Johnson, A.
Chiang, M.
Mittal, P.
Tempest: Temporal dynamics in anonymity systems arxiv.org Topology with BGP
2018
Syamkumar, M.
Mani, S. K.
Durairajan, R.
Barford, P.
Sommers, J.
Wrinkles in Time: Detecting Internet-wide Events via NTP IFIP Networking Conference (IFIP Networking) and Workshops Topology with BGP
2018
Shi, Q.
Wang, X.
Lin, W.
Placement Strategy for Replicated Servers in CDN Chinese Control Conf. (CCC) Topology with BGP
2018
Michelinakis, F.
Doroud, H.
Razaghpanah, A.
Lutu, A.
Vallina-Rodriguez, N.
Gill, P.
Widmer, J.
The cloud that runs the mobile Internet: A measurement study of mobile cloud services Conf. on Computer Communications Topology with BGP
2018
Marzano, A.
Alexander, D.
Fontesca, E.
Hoepers, C.
Steeding-Jessen, K.
Chaves, M. H. P. c.
Cunha, I.
Guedes, D.
The Evolution of Bashlite and Mirai IoT Botnets IEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2018
Mani, A.
Wilson-Brown, T.
Jansen, R.
Johnson, A.
Sherr, M.
Understanding Tor Usage with Privacy-Preserving Measurement Internet Measurement Conf. (IMC) Topology with BGP
2018
Kontaxis, G. Reducing third parties in the network through client-side intelligence Columbia Univ. Topology with BGP
2018
Imani, M
Barton, A.
Wright, M.
Guard Sets in Tor using AS Relationships Proc. on Privacy Enhancing Technologies Topology with BGP
2018
de Vries, W. B.
Rijswijk-Deij, R. V.
de Boer, P. T.
Pras, A.
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google Network Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2018
Chiba, D.
Yagi, T.
Akiyama, M.
Shibahara, T.
Mori, T.
Goto, S.
DomainProfiler: toward accurate and early discovery of domain names abused in future International Journal of Information Security () Topology with BGP
2018
Bottger, T.
Cuadrado, F.
Tyson, G.
Castro, I.
Uhlig, S.
Open connect everywhere: A glimpse at the Internet ecosystem through the lens of the Netflix CDN arxiv.org Topology with BGP
2017
Zhang, Z.
Ma, L.
Leung, K. K.
Le, F.
Kompella, S.
Tassiulas, L.
How better is distributed SDN? An analytical approach arxiv.org Topology with BGP
2017
Smith, J.M. Taking back the Internet: Defeating DDoS and adverse network conditions via reactive BGP routing Univ. of Tennessee Topology with BGP
2017
Gosain, D.
Agarwal, A.
Chakravarty, S.
Acharya, H.B.
The devils in the details: Placing decoy routers in the Internet Computer Security Applications Conf. Topology with BGP
2017
Rula, J.
Bustamente, F.
Steiner, M.
Cell spotting: Studying the role of cellular networks in the Internet Internet Measurement Conf. (IMC) Topology with BGP
2017
Goodchild, B.
Chiu, Y.
Hansen, R.
Lu, H.
Calder, M.
Luckie, M.
Lloyd, W.
Choffnes, D.
Katz-Bassett, E.
The record route option is an option! Internet Measurement Conf. (IMC) Topology with BGP
2017
Giotsas, V.
Smaragdakis, G.
Dietzel, C.
Richter, P.
Feldmann, A.
Berger, A.
Inferring BGP blackholing activity in the Internet Internet Measurement Conf. (IMC) Topology with BGP
2017
Zhang, X.
Moore, C.
Newman, M.E.J.
Random graph models for dynamic networks Eur. Physical J. Topology with BGP
2017
Yang, H.
Lam, S.S.
Scalable verification of networks with packet transformers using atomic predicates IEEE/ACM Trans. on Networking (TON) Topology with BGP
2017
Tilch, G.
Ermakova, T.
Fabian, B.
A multilayer graph model of the Internet topology zenodo.org Topology with BGP
2017
Nasr, M.
Zolfaghari, H.
Houmansadr, A.
The waterfall of liberty: Decoy routing circumvention that resists routing attacks Conf. on Computer and Communications Security (SIGSAC) Topology with BGP
2017
Kotronis, V.
Nomikos, G.
Manassakis, L.
Mavrommatis, D.
Dimitropoulos, X.
Shortcuts through colocation facilities arxiv.org Topology with BGP
2017
Gasser, O.
Scheitle, Q.
Rudolph, B.
Denis, C.
Schriker, N.
Carle, G.
The amplification threat posed by publicly reachable BACnet devices J. of Cyber Security and Mobility Topology with BGP
2017
Acharya, H.B.
Chakravarty, S.
Gosain, D.
Few throats to choke: On the current structure of the Internet Conf. on Local Computer Networks (LCN) Topology with BGP
2017
Liu, Z.
Jin, H.
Hu, Y.
Bailey, M.
MiddlePolice: Fine-grained endpoint-driven in-network traffic control for proactive DDoS attack mitigation arxiv.org Topology with BGP
2017
Haghtalab, N.
Laszka, A.
Procaccia, A.
Vorobeychik, Y.
Koutsoukos, X.
Monitoring stealthy diffusion Knowledge and Information Systems Topology with BGP
2017
Canbaz, A.
Bakhshaliyev, K.
Gunes, M.
Analysis of path stability within autonomous systems Workshop on Measurement and Networking Topology with BGP
2017
Gregori, E.
Lenzini, L.
Luconi, V.
AS-Level Topology Discovery: Measurement strategies tailored for crowdsourcing systems Computer Communications Topology with BGP
2017
Burger, V. Performance evaluation and optimization of Content Delivery Networks Julius-Maximilians-Univ. Wurzburg Topology with BGP
2017
Antonakakis, M.
April, T.
Bailey, M.
Bernhard, M.
Bursztein, E.
Cochran, J.
Durumeric, Z.
Halderman, J.
Invernizzi, L.
Kallitsis, M.
Kumar, D.
Lever, C.
Ma, X.
Mason, J.
Menscher, D.
Seaman, C.
Sullivan, N.
Thomas, K.
Zhou, Y.
Understanding the Mirai botnet USENIX Security Symp. Topology with BGP
2017
Kuenzer, S.
Ivanov, A.
Manco, F.
Mendes, J.
Volchkov, Y.
Schmidt, F.
Yasukata, K.
Honda, M.
Huici, F.
Unikernels everywhere: The case for elastic CDNs Intl Conf. on Virtual Execution Environments (SIGPLAN) Topology with BGP
2017
Hiran, R.
Carlsson, N.
Shahmehri, N.
Collaborative framework for protection against attacks targeting BGP and edge networks Computer Networks Topology with BGP
2017
Fanou, R.
Francois, P.
Aben, E.
Mwangi, M.
Goburdhan, N.
Valera, F.
Four years tracking unrevealed topological changes in the African interdomain Computer Communications Topology with BGP
2017
Asharov, G.
Demmler, D.
Schapira, M.
Schneider, T.
Segev, G.
Shenker, S.
Zohner, M.
Privacy-preserving interdomain routing at Internet scale Proc. on Privacy Enhancing Technologies Topology with BGP
2017
Wachs, M.
Scheitle, Q.
Carle, G.
Push away your privacy: Precise user tracking based on TLS client certificate authentication Network Traffic Measurement and Analysis Conf. Topology with BGP
2017
Tata, N. MicroCuckoo hash engine for high-speed IP lookup Virginia Polytechnic Inst. and State Univ. Topology with BGP
2017
Sermpezis, P.
Nomikos, G.
Dimitropoulos, X.
Re-mapping the Internet: Bring the IXPs into play arxiv.org Topology with BGP
2017
Reuter, A.
Bush, R.
Cunha, I.
Katz-Bassett, E.
Schmidt, T.
Wahlisch, M.
Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering arxiv.org Topology with BGP
2017
London, P. Distributed optimization and data market design California Inst. of Technology Topology with BGP
2017
Imani, M.
Barton, A.
Wright, M.
Forming guard sets using AS relationships Proc. on Privacy Enhancing Technologies Topology with BGP
2017
Grailet, J.F.
Donnet, B.
Towards a renewed alias resolution with space search reduction and IP fingerprinting Network Traffic Measurement and Analysis Conf. (TMA) Topology with BGP
2017
Bangera, P.
Gorinsky, S.
Ads versus regular contents: Dissecting the web hosting ecosystem IFIP Networking Conf. Topology with BGP
2017
Vega-Oliveros, D. A.
Costa, L. d. F.
Rodrigues, F. A.
Influence maximization on correlated networks through community identification arxiv.org Topology with BGP
2017
Suen, J.Y.
Navlakha, S.
Using inspiration from synaptic plasticity rules to optimize traffic flow in distributed engineered networks Neural Computation Topology with BGP
2017
Jancicka, J. Automatic classification of network entities Charles Univ. Topology with BGP
2017
Domingos, J.M.M. Characterization and monitoring of critical systems on national Internet Tecnico Lisboa Topology with BGP
2017
Al-Baghdadi, A. Computing top-k closeness centrality in unweighted undirected graphs revisited Kent State Univ. Topology with BGP
2017
Wang, Y.
Bi, J.
Zhang, K.
A SDN-based framework for fine-grainedinter-domain routing diversity Mobile Networks and Applications Topology with BGP
2017
Tyson, G.
Huang, S.
Cuadrado, F.
Castro, T.
Perta, V.
Sathiaseelan, A.
Uhlig, S.
Exploring HTTP header manipulation in-the-wild Conf. on World Wide Web Topology with BGP
2017
Tozal, M.E. Autonomous system ranking by topological characteristics: A comparative study IEEE Systems Conf. (SysCon) Topology with BGP
2017
Sun, Y.
Edmundson, A.
Feamster, N.
Chiang, M.
Mittal, P.
Counter-RAPTOR: Safeguarding Tor against active routing attacks arxiv.org Topology with BGP
2017
Sermpezis, P.
Dimitropoulos, X.
Can SDN accelerate BGP convergence? A performance analysis of inter-domain routing centralization arxiv.org Topology with BGP
2017
Pacifici, V.
Dan, G.
Distributed caching algorithms for interconnected operator CDNs IEEE J. on Selected Areas in Communications Topology with BGP
2017
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.
Perrig, A.
Authentication challenges in a global environment ACM Trans. on Privacy and Security (TOPS) Topology with BGP
2017
Gilad, Y.
Cohen, A.
Herzberg, A.
Schapira, M.
Shulman, H.
Are we there yet? On RPKIs deployment and security The Network and Distributed System Security Symp. Topology with BGP
2017
Dong, W.
Gao, Y.
Wu, W.
Bu, J.
Chen, C.
Li, X.
Optimal monitor assignment for preferential link tomography in communication networks IEEE/ACM Trans. on Networking (TON) Topology with BGP
2017
Tanaka, Y.
Goto, A.
Suspicious FQDN evaluation based on variations in malware download URLs IEEE/ACM Intl Conf. on Advances in Social Networks Analysis and Mining Topology with BGP
2017
Sakuma, K.
Asahina, H.
Haruta, S.
Sasase, I.
Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination Asia-Pacific Conference on Communications (APCC) Topology with BGP
2017
Nozaki, Y.
Golen, E.
Shenoy, N.
A modular architecture for scalable inter-domain routing IEEE Computing and Communication Workshop and Conf. (CCWC) Topology with BGP
2017
Moriano, P.
Achar, S.
Camp, L. J.
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies Computers and Security Topology with BGP
2017
Mirchev, M. J. On the Spectra of Scale-free and Small-World Networks Telecom Topology with BGP
2017
Liu, J.
Yang, B.
Liu, J.
Lu, Y.
Zhu, K.
Forwarding degree-based AS relationship recognition algorithm IEEE Advanced Information Technology, Electronic and Automation Control Conf. (IAEAC) Topology with BGP
2017
Li, Z.
Levin, D.
Spring, N.
Bhattacharjee, B.
Longitudinal analysis of root server anycast inefficiencies Univ. of Maryland Topology with BGP
2017
Huth, M.
Fabian, B.
Inferring business relationships in the internet backbone Intl J. of Networking and Virtual Organisations Topology with BGP
2017
Holland, J.
Schuchard, M.
POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States ACM SIGSAC Conf. on Computer and Communications Security Topology with BGP
2017
Gomez, J. L. G.
Wang, R.
Chen, M. H.
Chou, C. F.
ETMP-BGP: Effective tunnel-based multi-path BGP routing using software-defined networking IEEE International Conference on Systems, Man, and Cybernetics (SMC) Topology with BGP
2017
Finamore, A.
Varvello, M.
Papagiannaki, K.
Mind the Gap Between HTTP and HTTPS in Mobile Networks Intl Conf. on Passive and Active Network Measurement Topology with BGP
2017
Cakmak, G.
Aydin, M. N.
A country-specific analysis on internet interconnection ecosystems Intl Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) Topology with BGP
2017
Bublitz, S. Towards a BitTorrent weather forecast Univ. of Zurich Topology with BGP
2017
Ali, A.
Rahman, M. A. U.
A Efficient Privacy Based Multi User Computation Using Inter Domain Routing Decision Intl J. of Scientific Research in Computer Science, Engineering and Information Technology Topology with BGP
2017
Ahmad, A.
Jaradat, Y.
Maoud, M. Z.
Machine Learning Approach for Categorizing Internet Autonomous Systems Links Intl Conf. on Green and Human Information Technology Topology with BGP
2016
Sobrinho, J.L.
Vanbever, L.
Le, F.
Sousa, A.
Rexford, J.
Scaling the Internet routing system through distributed route aggregation IEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Semertzidis, K.
Pitoura, E.
Terzi, E.
Tsaparas, P.
Best friends forever (BFF): Finding lasting dense subgraphs arxiv.org Topology with BGP
2016
Pacifici, V.
Dan, G.
Coordinated selfish distributed caching for peering content-centric networks Trans. on Networking (TON) Topology with BGP
2016
Chen, M.
Xu, M.
Li, Q.
Yang, Y.
Measurement of large-scale BGP events: Definition, detection, and analysis Computer Networks Topology with BGP
2016
Anwar, M.R. Investigating interdomain routing in the wild Stony Brook Univ. Topology with BGP
2016
Wuebbeling, M.
Meier, M.
Improved calculation of AS resilience against IP prefix hijacking IEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Wassermann, S.
Casas, P.
Reverse traceroute with DisNETPerf, a distributed Internet paths performance analyzer IEEE Conf. on Local Computer Networks (LCN) Topology with BGP
2016
Wassermann, S.
Casas, P.
Donnet, B.
Leduc, G.
Mellia, M.
On the analysis of Internet paths with DisNETPerf, a distributed paths performance analyzer IEEE Conf. on Local Computer Networks Workshops (LCN Workshops) Topology with BGP
2016
Klick, J.
Lau, S.
Wahlisch, M.
Roth, V.
Towards better Internet citizenship: Reducing the footprint of Internet-wide scans by topology aware prefix selection Internet Measurement Conf. (IMC) Topology with BGP
2016
Jonker, M.
Sperotto, A.
van Rijswijk-Deij, R.
Sadre, R.
Pras, A.
Measuring the adoption of DDoS protection services Internet Measurement Conf. (IMC) Topology with BGP
2016
Comarela, G.
Terzi, E.
Crovella, M.
Detecting unusually-routed ASes: Methods and applications Internet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Choffnes, D.
Mislove, A.
Tunneling for transparency: A large-scale analysis of end-to-end violations in the Internet Internet Measurement Conf. (IMC) Topology with BGP
2016
Chung, T.
Liu, Y.
Choffnes, D.
Levin, D.
Maggs, B.M.
Mislove, A.
Wilson, C.
Measuring and applying invalid SSL certificates: The silent majority Internet Measurement Conf. (IMC) Topology with BGP
2016
Chatterjee, A.
Chakraborty, A.
Pal, S.
Mukherjee, A.
Naskar, M.
Non-autonomous dynamic network model involving growth and decay Intl Conf. on Advanced Networks and Telecommunications Systems Topology with BGP
2016
Bangera, P. Alternative revenue sources for Internet service providers Univ. Carlos III de Madrid Topology with BGP
2016
Syamkumar, M.
Durairajan, R.
Barford, P.
Bigfoot: A geo-based visualization methodology for detecting BGP threats IEEE Symp. on Visualization for Cyber Security (VizSec) Topology with BGP
2016
Nasr, M.
Houmansadr, A.
Game of decoys: Optimal decoy routing through game theory Conf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Liu, Z.
Jin, H.
Hu, Y.C.
Bailey, M.
MiddlePolice: Toward enforcing destination-defined policies in the middle of the Internet Conf. on Computer and Communications Security (SIGSAC) Topology with BGP
2016
Cangialosi, F.
Chung, T.
Choffnes, D.
Levin, D.
Maggs, B.
Mislove, A.
Wilson, C.
Measurement and analysis of private key sharing in the HTTPS ecosystem ACM SIGSAC Conf. on Computer and Communications Security Topology with BGP
2016
Wang, C.
Li, Z.
Huang, X.
Zhang, P.
Inferring the average as path length of the Internet IEEE Conf. on Network Infrastructure and Digital Content (IC-NIDC) Topology with BGP
2016
Tozal, M.E. Enumerating single destination, policy-preferred paths in AS-level Internet topology maps IEEE Sarnoff Symp. Topology with BGP
2016
Noroozian, A.
Korczynski, M.
Ganan, C.H.
Makita, G.
Yoshioka, K.
van Eeten, M.
Who gets the boot? Analyzing victimization by DDoS-as-a-Service RAID : Intl Symp. on Research in Attacks, Intrusions, and Defenses Topology with BGP
2016
Liquori, L.
Sereno, M.
LogNet: Extending Internet with a network aware discovery service Inria-French Inst. for Research in Computer Science Topology with BGP
2016
Gosain, D.
Agarwal, A.
Acharya, H.B.
Chakravarty, S.
Qi points: placing decoy routers in the internet Indraprastha Inst. of Information Technology Delhi (IIITD) Topology with BGP
2016
Yang, Y.
Shi, X.
Yin, X.
Wang, Z.
The power of prefix hijackings in the Internet hierarchy IEEE Trustcom/BigDataSE/ISPA Topology with BGP
2016
Hoang, N.P. Towards an autonomous system monitor for mitigating correlation attacks in the Tor network Kyoto Univ. Topology with BGP
2016
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
Jumpstarting BGP security with path-end validation ACM SIGCOMM Topology with BGP
2016
Bade, L. Resilience of the Domain Name System: A case study for .nl Radboud Univ. Topology with BGP
2016
Wang, Y.
Bi, J.
Zhang, K.
Wu, Y.
A framework for fine-grained inter-domain routing diversity via SDN Conf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2016
Varghese, J.S.
Ruan, L.
Computing customer cones of peering networks Applied Networking Research Workshop Topology with BGP
2016
Bergamini, E.
Wegner, M.
Lukarski, D.
Meyerhenke, H.
Estimating current-flow closeness centrality with a multigrid Laplacian solver arxiv.org Topology with BGP
2016
Zhang, Y.
Wang, X.
Perrig, A.
Zheng, Z.
Tumbler: Adaptable link access in the bots-infested Internet Computer Networks Topology with BGP
2016
Singh, R.
Koo, H.
Miramirkhani, N.
Miraj F., Akoglu
L., Gill P.
The politics of routing: Investigating the relationship between AS connectivity and Internet freedom arxiv.org Topology with BGP
2016
Shao, X.
Wang, F.
Gao, L.
Fujikawa, K.
Harai, H.
Distributed encoding for multiple-inherited locators to accommodate billions of objects in the Internet IEEE Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2016
Schuchard, M.J. Adversarial degradation of the availability of routing infrastructures and other Internet-scale distributed systems Univ. of Minnesota Topology with BGP
2016
Schuchard, M.
Hopper, N.
E-embargoes: Discouraging the deployment of traffic manipulating boxes with economic incentives arxiv.org Topology with BGP
2016
Kriegel, P. Determining the location of autonomous system relations among top tier Internet Service Providers in the United States Univ. of Oregon Topology with BGP
2016
Hasan, S.A.U. The role of topology and contracts in Internet content delivery Univ. of Carlos III de Madrid Topology with BGP
2016
Greunke, B. Distributed emulation in support of large networks Naval Postgraduate School Topology with BGP
2016
Chiba, D.
Yagi, T.
Akiyama, M.
Shibahara, T.
Yada, T.
Mori, T.
Goto, S.
DomainProfiler: Discovering domain names abused in future Conf. on Dependable Systems and Networks Topology with BGP
2016
Cardona, J.C. Inter-domain traffic management in an evolving Internet peering ecosystem Univ. Carlos III de Madrid Topology with BGP
2016
Teneva, N.
Mudrakarta, P.K.
Kondor, R.
Multiresolution matrix compression Conf. on Artificial Intelligence and Statistics Topology with BGP
2016
Li, S.
Duan, H.
Wang, Z.
Liang, J.
Li, X.
An accurate distributed scheme for detection of prefix interception Science China Information Sciences Topology with BGP
2016
Feng, Z.
Xu, M.
Yang, Y.
Revolutionizing the inter-domain business model by information-centric thinking IEEE Conf. on Communications (ICC) Topology with BGP
2016
Eppstein, D.
Goodrich, M.T.
Lam, J.
Mamano, N.
Mitzenmacher, M.
Torres, M.
Models and algorithms for graph watermarking arxiv.org Topology with BGP
Topology with Skitter
2016
Zhao, M.
Zhou, W.
Gurney, A.J.T.
Haeberlen, A.
Sherr, M.
Loo, B.T.
Private and verifiable interdomain routing decisions IEEE/ACM Trans. on Networking (TON) Topology with BGP
2016
Tozal, M.E. The Internet: A system of interconnected autonomous systems IEEE Systems Conf. (SysCon) Topology with BGP
2016
Revelo, D.
Ricci, M.A.
Donnet, B.
Alvarez-Hamlin, J.I.
Unveiling the MPLS structure on Internet topology Workshop on Traffic Monitoring and Analysis (TMA) Topology with BGP
2016
Guo, C.
Karsten, M.
On the feasibility of core-rooted path addressing IEEE/IFIP Network Operations and Management Symp. (NOMS) Topology with BGP
2016
Sukrit, G.
Rami, P.
Konstantin, K.
Comparative network analysis using KronFit Complex Networks Topology with BGP
2016
Niemela, M. Estimating Internet-scale Quality of Service parameters for VoIP Linkoping Univ. Topology with BGP
2016
Kotronis, V.
Kloti, R.
Rost, M.
Georgopoulos, P.
Ager, B.
Schmid, S.
Dimitropoulos, X.
Stitching inter-domain paths over IXPs Symp. on SDN Research Topology with BGP
2016
Frey, S.
Elkhatib, Y.
Rashid, A.
Follis, K.
Vidler, J.
Race, N.
Edwards, C.
It bends but would it break? Topological analysis of BGP infrastructures in Europe IEEE European Symp. on Security and Privacy (EuroSP) Topology with BGP
2016
Cardona, J.C.
Vissicchio, S.
Lucente, P.
Francois, P.
I cant get no satisfaction: Helping autonomous systems identify their unsatisfied interdomain interests IEEE Trans. on Network and Service Management Topology with BGP
2016
Agache, A.
Antichi, G.
Eberhardt, F.
Eggert, L.
Hasselmeyer, P.
Hohlfeld, O.
Honda, M.
Ivanov, A.
Kimmerlin, M.
Klauck, S.
Kommeri, J.
Lettieri, G.
Oechsner, S.
Plauth, M.
Raiciu, C.
Ripke, A.
Sarolahti, P.
Schulte, L.
Tsolakou, E.
Wojcik, M.
Initial design of cloud infrastructure and federation mechanisms SSICLOPS Topology with BGP
2016
Zhao, M. Accountability in distributed systems with incomplete information Univ. of Pennsylvania Topology with BGP
2016
Machado, F.F. Analysis of the degree ranking stability in scale-free networks Federal Univ. of Rio de Janeiro Topology with BGP
2016
Garcia-Robledo, A.
Diaz-Perez, A.
Morales-Luna, G.
Characterization and coarsening of Autonomous System networks: Measuring and simplifying the Internet Advanced Methods for Complex Network Analysis Topology with BGP
2016
Benson, K. Leveraging Internet background radiation for opportunistic network analysis Univ. of California San Diego Topology with BGP
UCSD Network Telescope
2015
Wassermann, S.
Casas, P.
Donnet, B.
Towards DisNETPerf: a distributed Internet paths performance analyzer ACM CoNEXT Student Workshop Topology with BGP
2015
Wang, M.
Zhou, H.
Chen, J.
OpenISMA: An approach of achieving a scalable OpenFlow network by identifiers separating and mapping Symp. on Parallel Architectures, Algorithms and Programming (PAAP) Topology with BGP
2015
Miyao, Y. Network operation system, network operation method and network operation program Nec Corp. Topology with BGP
2015
Li, S.
Duan, H.
Li, X.
Real-time system for detecting inter-domain routing man-in-the-middle attacks J. of Tsinghua Univ. Topology with BGP
2015
Konte, M. Understanding and defending against internet infrastructures supporting cybecrime operations Georgia Inst. of Technology Topology with BGP
2015
Yin, X.
Wu, D.
Wang, Z.
Shi, X.
Wu, J.
DIMR: Disjoint Interdomain Multipath Routing Computer Networks Topology with BGP
2015
Sosnovich, A.
Grumberg, O.
Nakibly, G.
Analyzing Internet routing security using model checking Lecture Notes in Computer Science Topology with BGP
2015
Shah, A.
Papadopoulos, C.
Characterizing international BGP detours Colorado State Univ. Technical Report Topology with BGP
2015
Miyao, Y. Network designing system, network designing method, data transfer path determination method and network designing program Nec Corp. Topology with BGP
2015
Meiling, S.
Schmidt, T.C.
Steinbach, T.
On performance and robustness of Internet-based smart grid communication: A case study for Germany Conf. on Smart Grid Communications (SmartGridComm) Topology with BGP
2015
Johnson, A.
Jansen, R.
Jaggard, A.D.
Feigenbaum, J.
Syverson, P.
Avoiding the Man on the Wire: Improving Tors security with trust-aware path selection arxiv.org Topology with BGP
2015
Hirayama, T.
Toyoda, K.
Sasase, I.
Fast target link flooding attack detection scheme by analyzing traceroute packets flow Workshop on Information Forensics and Security (WIFS) Topology with BGP
2015
Cohen, A.
Gilad, Y.
Herzberg, A.
Schapira, M.
One hop for RPKI, one giant leap for BGP security Workshop on Hot Topics in Networks Topology with BGP
2015
Chen, Z.
Bi, J.
Fu, Y.
Wang, Y.
Xu, A.
MLV: A Multi-dimension Routing Information Exchange Mechanism for Inter-domain SDN Conf. on Network Protocols (ICNP) Topology with BGP
2015
Cardona, J. Inter-domain traffic management in and evolving Internet peering eco-system Univ. Carlos III de Madrid Topology with BGP
2015
Szabo, D.
Korosi, A.
Biro, J.
Gulyas, A.
Deductive way of reasoning about the Internet AS level topology Chin. Phys. B Topology with BGP
2015
Meslmawy, M.A.S. Efficient resources management in a distributed computer system, modeled as a dynamic complex system Le Havre Univ. Topology with BGP
2015
Meslmawy, M.A.S. Efficient resources management in a ditributed computer system, modeled as a dynamic complex system Univ. du Havre Topology with BGP
2015
Li, S.
Duan, H.
Wang, Z.
Li, X.
Route leaks identification by detecting routing loops Conf. on Security and Privacy in Communication Systems (SecureComm) Topology with BGP
2015
Lareida, A.
Petropoulos, G.
Burger, V.
Seufert, M.
Soursos, S.
Stiller, B.
Augmenting home routers for socially-aware traffic management Conf. on Local Computer Networks (LCN) Topology with BGP
2015
Konte, M.
Perdisci, R.
Feamster, N.
ASwatch: An AS reputation system to expose bulletproof hosting ASes ACM SIGCOMM Computer Communication Review Topology with BGP
2015
Hu, X.Y.
Gong, J.
Multipath inter-domain routing for named data networking J. on Communications Topology with BGP
2015
Feng, Z.
Xu, M.
Yang, Y.
Li, Q.
Wang, Y.
Li, Q.
Ohlman, B.
Chen, M.
Joint optimization of content replication and traffic engineering in ICN Conf. on Local Computer Networks (LCN) Topology with BGP
2015
Chiu, Y.-C.
Schlinker, B.
Radhakrishnan, A.B.
Katz-Bassett, E.
Govindan, R.
Are we one hop away from a better Internet? Internet Measurement Conf. (IMC) Topology with BGP
2015
Anwar, R.
Niaz, H.
Choffnes, D.
Cunha, I.
Gill, P.
Katz-Bassett, E.
Investigating interdomain routing policies in the wild Internet Measurement Conf. (IMC) Topology with BGP
2015
Ahmed, N.
Sarac, K.
An experimental study on inter-domain routing dynamics using IP-level path traces Conf. on Local Computer Networks (LCN) Topology with BGP
2015
Liu, B.
Bi, J.
DISCS: A DIStributed Collaboration System for inter-AS spoofing defense Intl Conf. on Parallel Processing (ICPP) Topology with BGP
2015
Sha, Z. Decision-centric foundations for complex systems engineering and design Purdue Univ. Topology with BGP
2015
Lee, T.
Szalachowski, P.
Barrera, D.
Perrig, A.
Lee, H.
Watrin, D.
Bootstrapping real-world deployment of future Internet architectures arxiv.org Topology with BGP
2015
Kurar, B.
Tahboub, R.
Internet scale DoS attacks Intl J. of Applied Mathematics, Electronics and Computers Topology with BGP
2015
Kloti, R.
Kotronis, V.
Ager, B.
Dimitropoulos, X.
Policy-compliant path diversity and bisection bandwidth IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2015
Heilman, E.
Kendler, A.
Zohar, A.
Goldberg, S.
Eclipse attacks on bitcoins peer-to-peer network Usenix Security Symp. Topology with BGP
2015
Cohen, N.
Coudert, D.
Lancin, A.
On computing the Gromov hyperbolicity J. of Experimental Algorithmics Topology with BGP
2015
Abu-Ata, M.
Dragan, F.F.
Metric tree-like structures in real-world networks: an empirical study Networks Topology with BGP
Topology with Skitter
2015
Varghese, J.S.
Ruan, L.
A machine learning approach to edge type prediction in Internet AS graphs Iowa State Univ. Topology with BGP
2015
Hoang, N.P.
Asano, Y.
Yoshikawa, M.
Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor Conf. on Advanced Communication Technology (ICACT) Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Brief announcement: Routing the Internet with very few entries Symp. on Principles of Distributed Computing (PODC) Topology with BGP
2015
Rye, E.C. Evaluating the limits of network topology inference via virtualized network emulation Naval Postgraduate School Topology with BGP
2015
Matsumoto, S.
Reischuk, R.M.
Szalachowski, P.
Kim, T.H.-J.
Perrig, A.
Designing a global authentication infrastructure arxiv.org Topology with BGP
2015
Gavoille, C.
Glacet, C.
Hanusse, N.
Ilcinkas, D.
Routing the Internet with fifteen entries Meeting on Algorithmic Aspects of Telecommunications (ALGOTEL) Topology with BGP
2015
Eikema, B. BGP routing security and deployment strategies Univ. of Amsterdam Topology with BGP
2015
Dinh, T.N.
Thai, M.T.
Network under joint node and link attacks: Vulnerability assessment methods and analysis IEEE/ACM Trans. on Networking (TON) Topology with BGP
2015
Chen, C.
Matsumoto, S.
Perrig, A.
ECO-DNS: Expected consistency optimization for DNS Intl. Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2015
Tao, N.
Chen, X.
Fu, X.
AS path inference: From complex network perspective Networking Conf. (IFIP) Topology with BGP
2015
Niaz, M. Measuring routing policies on the Internet Stony Brook Univ. Topology with BGP
2015
Lee, J.Y.
Oh, J.C.
A node-centric reputation computation algorithm on online social networks Applications of Social Media and Social Network Analysis Topology with BGP
2015
Fonseca, O.
Fazzion, E.
Cunha, I.
Las-Casas, P.
Guedes, D.
Meira, W.
Hoepers, C.
Steding-Jessen, K.
Chaves, M.H.P.C.
A spam traffic cost analysis for network operators Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2015
DIgnazio, A.
Giovannetti, E.
Predicting internet commercial connectivity wars: The impact of trust and operators asymmetry Intl J. of Forecasting Topology with BGP
2015
Rye, E.
Rohrer, J.
Graph reduction for emulated network experimentation Naval Postgraduate School Topology with BGP
2015
Fanou, R.
Francois, P.
Aben, E.
On the diversity of interdomain routing in Africa Lecture Notes in Computer Science (LNCS) Topology with BGP
2015
Erunika, O.
Kaneko, K.
Taraoka, F.
Performance evaluation of host-based mobility management schemes in the Internet Intl. Conf. on Mobile Computing and Ubiquitous Networking (ICMU) Topology with BGP
2015
Wang, H.
Cui, W.
Xiao, Y.
Tong, H.
Robust network construction against intentional attacks Conf. on Big Data and Smart Computing (BIGCOMP) Topology with BGP
2015
Nakata, Y.
Arakawa, S.
Murata, M.
A provider and peer selection policy for the future sustainable internet Intl J. of Management and Network Economics Topology with BGP
2015
Kotronis, V. Centralizing routing control across domains: Architectural approach and prominent use cases ETH Zurich Topology with BGP
2015
Eberle, W.
Holder, L.
Scalable anomaly detection in graphs Intelligent Data Analysis Topology with BGP
2015
Ascigil, M.O. Design of a scalable path service for the Internet Univ. of Kentucky Topology with BGP
2015
Acedo, J.C. Evolution of the Internet topology from a regional perspective Univ. of Arizona Topology with BGP
2014
Palacin, M.
Bikfalvi, A.
Oliver, M.
Mercury: Revealing hidden interconnections between access ISPs and content providers EUNICE Topology with BGP
2014
Johnson, T.
Lazos, L.
Network anomaly detection using autonomous system flow aggregates IEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2014
Ahmed, N.
Kamil, Sarac
Measuring path divergence in the Internet Conf. on Performance Computing and Communications (IPCCC) Topology with BGP
2014
Lodhi, A.H. The economics of internet peering interconnections Georgia Inst. of Technology Topology with BGP
2014
Hiran, R.
Carlsson, N.
Shahmehri, N.
PrefiSec: A distributed alliance framework for collaborative BGP monitoring and prefix-based security ACM Workshop on Information Sharing and Collaborative Security Topology with BGP
2014
Yang, H.
Lam, S.S.
Collaborative verification of forward and reverse reachability in the Internet data plane IEEE Conf. on Network Protocol (ICNP) Topology with BGP
2014
Sousa, A.C.M. Scaling the Internet routing system through route aggregation Tecnico Lisboa Topology with BGP
2014
Sha, Z.
Panchal, J.
Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice mode Conf. on Systems, Man, and Cybernetics (SMC) Topology with BGP
2014
Retvari, G.
Szabo, D.
Gulyas, A.
Korosi, A.
Tapolcai, J.
An information-theoretic approach to routing scalability Workshop on Hot Topics in Networks (HotNets) Topology with BGP
2014
Gamperli, A.
Kotronis, V.
Dimitropoulos, X.
Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework SIGCOMM Computer Communication Review Topology with BGP
2014
Eberle, W.
Holder, L.
A partitioning approach to scaling anomaly detection in graph streams Intl. Conf. on Big Data Topology with BGP
2014
Antikainen, M.
Aura, T.
Sarela, M.
Denial-of-service attacks in bloom-filter-based forwarding IEEE/ACM Trans. on Networking (TON) Topology with BGP
2014
Wang, J.M.
Dai, X.
Bensaou, B.
Content peering in content centric networks IEEE Conf. on Local Computer Networks Topology with BGP
2014
Wu, X.
Griffioen, J.
Supporting application-based route selection Conf. on Computer Communication and Networks (ICCCN) Topology with BGP
2014
Nozaki, Y. Tiered based addressing in internetwork routing protocols for the future Internet Rochester Inst. of Technology Topology with BGP
2014
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing the impact of cascading failures on the interdomain routing system of the Internet New Generation Computing Topology with BGP
2014
Sankey, J.
Wright, M.
Dovetail: stronger anonymity in next-generation Internet routing Symp. on Privacy Enhancing Technologies (PETS) Topology with BGP
2014
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols? Computer Networks Topology with BGP
2014
Gersch, J.
Massey, D.
Papadopoulos, C.
Incremental deployment strategies for effective detection and prevention of BGP origin hijacks Conf. on Distributed Computing Systems (ICDCS) Topology with BGP
2014
Bangera, P.
Gorinsky, G.
Economics of traffic attraction by transit providers IFIP Networking Conf. Topology with BGP
2014
Ascigil, O.
Calvert, K.L.
Griffioen, J.N.
On the scalability of interdomain path computations Networking Conf. (IFIP) Topology with BGP
2014
Amaral, P.
Bernardo, L.
Pinto, P.F.
Multipath policy routing for the inter-domain scenario Intl Conf. on Communications (ICC) Topology with BGP
2014
Zhu, M.
Liu, Y.
Li, J.
Wu, J.
CCOF: Congestion control on the fly for inter-domain routing Workshop on Local and Metropolitan Area Networks (LANMAN) Topology with BGP
2014
Zhu, M.
Li, J.
Liu, Y.
Li, D.
Wu, J.
TED: Inter-domain traffic engineering via deflection Symp. of Quality of Service (IWQoS) Topology with BGP
2014
Qazi, S.
Moors, T.
Disjoint-path selection in Internet: What traceroutes tell us? arxiv.org Topology with BGP
2014
Li, M.
Wang, H.
Yang, J.
Li, C.
A value based framework for provider selection of regional ISPs Symp. on Network Operations and Management (NOMS) Topology with BGP
Topology with Skitter
2014
Borici, A.
Thomo, A.
Semantic graph compression with hypergraphs Conf. on Advanced Information Networking and Applications (AINA) Topology with BGP
2014
Abu-Ata, M.M. Tree-like structure in graphs and embedability to trees Kent State Univ. Topology with BGP
2014
Visala, K.
Keating, A.
Khan, R.H.
Models and tools for the high-level simulation of a name-based interdomain routing architecture Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2014
Sha, Z.
Panchal, J.H.
Estimating local decision-making behavior in complex evolutionary systems J. of Mechanical Design Topology with BGP
2014
Sahhaf, S.
Tavernier, W.
Colle, D.
Pickavet, M.
Demeester, P.
Availability analysis of resilient geometric routing on Internet topology Conf. on Design of Reliable Communication Networks (DRCN) Topology with BGP
2014
Hasan, S.
Gorinsky, S.
Dovrolis, C.
Sitaraman, R.K.
Trade-offs in optimizing the cache deployments of CDNs IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2014
Chen, K.
Fhoffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users IEEE Trans. on Computers Topology with BGP
2014
Mazloum, R.
Buob, M.-O.
Auge, J.
Baynat, B.
Ross, D.
Friedman, T.
Violation of interdomain routing assumptions Passive and Active Measurement (PAM) Topology with BGP
2014
Laszka, A.
Johnson, B.
Grossklags, J.
Felegyhazi, M.
Estimating systematic risk in real-world networks Conf. on Financial Cryptography and Data Security Topology with BGP
2014
Shi, J.
Zhang, B.
Making inter-domain routing power-aware? Conf. on Computing, Networking and Communications (ICNC) Topology with BGP
2014
Houmansadr, A.
Wong, E.L.
Shmatikov, V.
No direction home: The true cost of routing around decoys Network and Distributed System Security Symp. (NDSS) Topology with BGP
2014
Tan, F
Wu, J.
Xia, Y.
Tse, C.K.
Traffic congestion in interconnected complex networks arxiv.org Topology with BGP
2014
Geva, M.
Herzberg, A.
Gev, Y.
Bandwidth Distributed Denial of Service: Attacks and defenses IEEE Security and Privacy Topology with BGP
2013
Lee, S.B.
Kang, M.S.
Gligor, V.D.
CoDef: Collaborative defense against large-scale link-flooding attacks ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eriksson, B
Durairajan, R.
Barford, P.
RiskRoute: A framework for mitigating network outage threats ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2013
Eberle, W.
Holder, L.
Incremental anomaly detection in graphs Conf. on Data Mining Workshops Topology with BGP
2013
Gersch, J.
Massey, D.
Characterizing vulnerability to IP hijack attempts IEEE Conf. on Technologies for Homeland Security (HST) Topology with BGP
2013
Zhao, M.
Aditya, P.
Chen, A.
Lin, Y.
Haeberlen, A.
Druschel, P.
Maggs, B.
Wishon, B.
Ponec, M.
Peer-assisted content distribution in Akamai NetSession Internet Measurement Conf. (IMC) Topology with BGP
2013
Papadopoulos, S.
Theodoridis, G.
Tzovaras, D.
BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies Visualization for Cyber Security (VizSec) Topology with BGP
2013
Karaarslan, E.
Perez, A.G.
Siaterlis, C.
Recreating a large-scale BGP incident in a realistic environment Information Sciences and Systems , Proc Symp. on Computer and Information Sciences Topology with BGP
2013
Bangera, P.
Gorinsky, S.
An economic perspective on traffic attraction by Internet transit providers IEEE Conf. on Network Protocols (ICNP) Topology with BGP
2013
Hui, K.-L.
Kim, S.H.
Wang, Q.-H.
Marginal deterrence in the enforcement of law: Evidence from distributed Denial of Service attack Hong Kong Univ. of Science and Technology Topology with BGP
UCSD Network Telescope
2013
Meirom, E.A.
Mannor, S.
Orda, A.
Network formation games and the Internet structure arxiv.org Topology with BGP
2013
Lian, W.
Rescorla, E.
Shacham, H.
Savage, S.
Measuring the practical impact of DNSSEC deploymen Usenix Security Conf. (SEC) Topology with BGP
2013
Lee, J.Y.
Oh, J.C.
A model for recursive propagations of reputations in social networks IEEE/ACM Conf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2013
Wang, Y.
Wang, Z.
Zhang, L.
An epidemic-dynamics-based model for CXPST spreading in inter-domain routing system Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA) Topology with BGP
2013
Nappa, A.
Rafique, M.Z.
Caballero1, J.
Driving in the cloud: An analysis of drive-by download operations and abuse reporting Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
Wang, Z.
Assessing survivability of inter-domain routing system under cascading failures Frontiers in Internet Technologies, Second CCF Internet Conf. of China (ICoC) Topology with BGP
2013
Kaur, B.
Kahlon, K.S.
Sharma, S.
Inter-domain routing with shielded infrastructure and buzzer technique Intl J. of Computer Applications Topology with BGP
2013
Pacifici, V.
Dan, G.
Stable content-peering of autonomous systems in a content-centric network Swedish National Computer Networking Workshop (SNCNW) Topology with BGP
2013
Misseri, X.
Gojmerac, I.
Rougier, J.-L.
IDRD: Enabling inter-domain route diversity IEEE Conf. on Communications (ICC) Topology with BGP
2013
Lehrieder, F. Performance evaluation and optimization of content distribution using overlay networks Julius-Maximilians-Univ. Wuerzburg, Wuerzburg, DE Topology with BGP
2013
Sankey, J.M Dovetail: stronger anonymity in next-generation Internet routing Univ. Texas, Arlington, TX, US Topology with BGP
2013
Jiang, J.
Luo, J.
Li, W.
Lu, Y.
Constraint conditions to eliminate AS incentive of lying in interdomain routing Symp. on Integrated Network Management (IM) Topology with BGP
2013
Hsiao, H.-C.
Kim, T.H.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.
Perrig, A.
STRIDE: Sanctuary Trail - Refuge from Internet DDoS Entrapment ACM SIGSAC Symp. on Information, computer and communications security (ASIACSS) Topology with BGP
2013
Pacifici, V.
Dan, G.
Content-peering dynamics of autonomous caches in a content-centric network IEEE INFOCOM Topology with BGP
2013
Neudorfer, L.
Shavitt, Y.
Zilberman, N.
Improving AS relationship inference using PoPs IEEE INFOCOM Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
Taenaka, Y.
Hazeyama, H.
PhishCage: reproduction of fraudulent websites in the emulated Internet ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyamoto, D.
Miyachi, T.
COSMO - Emulation of Internet traffic (poster abstract) ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Miyachi, T.
Miwa, S.
Design and implementation of XBurner ICST Conf. on Simulation Tools and Techniques (SimuTools) Topology with BGP
2013
Marchetta, P.
de Donato, W.
Pescape, A.
Detecting third-party addresses in traceroute traces with IP timestamp option Passive and Active Measurement (PAM) Topology with BGP
2013
Camacho, J.M.
Garcia-Martinez, A.
Bagnulo, M.
Valera, F.
BGP-XM: BGP eXtended multipath for transit Autonomous Systems Computer Networks Topology with BGP
2013
Matsuda, K.
Hasegawa, G.
Kamei, S.
Murata, M.
A method to reduce inter-ISP transit cost caused by overlay routing based on end-to-end network measurement IEICE Trans. on Information and Systems Topology with BGP
2013
Liu, Y.
Peng, W.
Su, J.
A study of IP prefix hijacking in cloud computing networks Security Comm. Networks Topology with BGP
2013
Qin, D.
Yang, J.
Wang, H.
Experimental study on diversity and novelty of interdomain paths Chinese J. of Electronics Topology with BGP
2013
Palacin, M.
Oliver, M.
Infante, J.
Oechsner, S.
Bikfalvi, A.
The impact of content delivery networks on the Internet ecosystem J. of Information Policy Topology with BGP
2013
Moses, K.V. Improving IP-based geo-location through Internet topology and geospatial datasets Duke Univ., Durham, NC, US Topology with BGP
2013
Mislove, A.
Koppula, H.S.
Gummadi, K.P.
Druschel, P.
Bhattacharjee, B.
An empirical validation of growth models for complex networks Dynamics On and Of Complex Networks Topology with BGP
2013
Erola, P.
Gomez, S.
Arenas, A.
On the routability of the Internet Dynamics On and Of Complex Networks Topology with BGP
2013
Dhin, T.N. Complex networks under attacks: Vulnerability assessment and optimization Florida Univ. Topology with BGP
2013
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-Betweenness vertices from heterogeneous networks The Influence of Technology on Social Network Analysis and Mining, Ch. 11 Topology with BGP
2012
Vasilakos, X.
Katsaros, K.
Xylomenos, G.
Cloud computing for global name-resolution in information-centric networks IEEE Symp. on Network Cloud Computing and Applications (NCCA) Topology with BGP
2012
Meyer, S.
Wahlisch, M.
Schmidt, T.C.
Exploring reachability via settlement-free peering ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2012
Ekbatani, H.R. Investigating the mutual impact of the P2P overlay and the AS-level underlay Univ. Oregon, Eugene, OR, US Topology with BGP
2012
Schuchard, M.
Geddes, J.
Thompson, C.
Hopper, N.
Routing around decoys ACM Conf. on Computer and Communications Security (CCS) Topology with BGP
2012
Dinh, T.N.
Shen, Y.
Thai, M.T.
An efficient spectral bound for link vulnerability assessment in large-scale networks IEEE Military Communications Conf. (MILCOM) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
A tale of nine Internet exchange points: studying path latencies through major regional IXPs IEEE Conf. on Local Computer Networks (LCN) Topology with BGP
2012
Li, M.
Wang, H.
Yang, J.
Flattening and preferential attachment in the Internet evolution Network Operations and Management Symp. (APNOMS) Topology with BGP
2012
Juen, J. Protecting anonymity in the presence of autonomous system and internet exchange level adversaries Univ. Illinois, Urbana-Champaign Topology with BGP
2012
Cohen, N.
Couderty, D.
Lancin, A.
Exact and approximate algorithms for computing the hyperbolicity of large-scale graphs Project-Team MASCOTTE, INRIA Topology with BGP
2012
Burger, V.
Lehrieder, F.
Hossfeld, T.
Seedorf, J.
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms Teletraffic Congress (ITC) Topology with BGP
2012
Rajahalma, J. Inter-domain incentives and Internet architecture Aalto Univ., FI Topology with BGP
2012
Orman, G.K.
Labatut, V.
Cherifi, H.
Comparative evaluation of community detection algorithms: a topological approach J. Stat. Mechanics: Theory and Experiment Topology with BGP
2012
Gjoka, M.
Kurant, M.
Markopoulou, A.
2.5K-graphs: from sampling to generation arxiv.org Topology with BGP
2012
Beben, A.
Batalla, J.M.
Chai, W.K.
Sliwinski, J.
Multi-criteria decision algorithms for efficient content delivery in content networks Ann. Telecommunications Topology with BGP
2012
Ager, B.
Chatzis, N.
Feldmann, A.
Sarrar, N.
Uhlig, S.
Willinger, W.
Anatomy of a large European IXP ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2012
Sherry, J.
Kim, D.
Mahalingam, S.
Tang, A.
Wang, S.
Ratnasamy, S.
Netcalls: End host function calls to network traffic processing services UC Berkeley Topology with BGP
2012
Fujikawa, K.
Tazaki, H.
Harai, H.
Inter-AS locator allocation of hierarchical automatic number allocation in a 10,000-AS network Symp. on Applications and the Internet (SAINT) Topology with BGP
2012
Ahmad, M.Z.
Guha, R.
Evaluating end-user network benefits of peering with path latencies IEEE Conf. on Computer Communications and Networks (ICCCN) Topology with BGP
2012
Tomasik, J.
Weisser, M.-A.
The inter-domain hierarchy in measured and randomly generated AS-level topologies IEEE Conf. on Communications (ICC) Topology with BGP
2012
Sobrinho, J.L.
Tiago Quelhas, T.
A theory for the connectivity discovered by routing protocols IEEE/ACM Trans. on Networking (TON) Topology with BGP
2012
Keating, A. Models for the simulation of a name-based interdomain routing architecture Aalto Univ., FI Topology with BGP
2012
Hsiao, H.-C.
Kim, T.
Yoo, S.
Zhang, X.
Lee, S.B.
Gligor, V.D.
Perrig, A.
Sanctuary trail: refuge from Internet DDoS entrapment Carnegie Mellon Univ. Topology with BGP
2012
Deng, W.
Muhlbauer, W.
Yang, Y.
Zhu, P.
Lu, X.
Plattner, B.
Shedding light on the use of AS relationships for path inference J. Communications and Networks Topology with BGP
2012
Cesareo, J. Optimizing implicit proxy placement to evade traffic filters Princeton Univ. Topology with BGP
2012
Cesareo, J.
Karlin, J.
Schapira, M.
Rexford, J.
Optimizing the placement of implicit proxies Princeton Univ. Topology with BGP
2012
Tozal, M.E.
Sarac, K.
Estimating network layer subnet characteristics via statistical sampling IFIP TC 6 Networking Conf. Topology with BGP
2012
Seibert, J. Security and economic implications of localizing traffic in overlay networks Purdue Univ. Topology with BGP
2012
Saucez, D.
Donnet, B.
On the dynamics of locators in LISP Networking Topology with BGP
2012
Nozaki, Y.
Tuncer, H.
Shenoy, N.
ISP tiered model based architecture for routing scalability IEEE Conf. on Communications (ICC) Topology with BGP
2012
Liu, Y.
Su, J.
Chang, R.K.C.
LDC: Detecting BGP prefix hijacking by load distribution change Parallel and Distributed Processing Symp. Workshops (IPDPSW) Topology with BGP
2012
Hasan, S.
Gorinsky, S.
Obscure giants: detecting the provider-free ASes Networking Topology with BGP
2012
Chaudhury, A.
Basuchowdhuri, P.
Majumder, S.
Spread of information in a social network using influential nodes Advances in Knowledge Discovery and Data Mining Topology with BGP
2012
Chai, W.K.
He, D.
Psaras, I.
Pavlou, G.
Cache less for more in information-centric networks Networking Topology with BGP
2012
Pasquini, R.
Verdi, F.L.
Magalhaes, M.F.
Towards local routing state in the future internet WPEIF/Brazilian Symp. on Computer Networks and Distributed Systems (SBRC) Topology with BGP
2012
Liu, H.
Hu, X.
Zhao, D.
Lu, X.
Failure isolation based defense against Internet CXPST-like attack J. Hybrid Information Technology Topology with BGP
2012
Strowes, S.D.
Perkins, C.
Harnessing Internet topological stability in Thorup-Zwick compact routing IEEE INFOCOM Topology with BGP
2012
Sobrinho, J.L.
Le, F.
A fresh look at inter-domain route aggregation IEEE INFOCOM Topology with BGP
2012
Ribeiro, B.
Basu, P.
Towsley, D.
Multiple random walks to uncover short paths in power law networks IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Qin, D.
Yang, J.
Liu, Z.
Wang, H.
Zhang, B.
Zhang, W.
AMIR: Another multipath interdomain routing IEEE Conf. on Advanced Information Networking and Applications (AINA) Topology with BGP
2012
Lutu, A.
Bagnulo, M.
Stanojevic, R.
An economic side-effect for prefix deaggregation IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS) Topology with BGP
2012
Grey, M.
Rossberg, M.
Schaefer, G.
Automatic creation of VPN backup paths for improved resilience against BGP-attackers ACM Symp. on Applied Computing (SAC) Topology with BGP
2012
Qin, D.
Yang, J.
Wang, H.
Zhang, B.
Gao, L.
Liu, Z.
Multipath interdomain routing via deviation from primary path Conf. on Information Networking (ICOIN) Topology with BGP
2012
Edwards, B.
Hofmeyr, S.
Stelle, G.
Forrest, S.
Internet topology over time arxiv.org Topology with BGP
2012
Wei, W.
Yingjie, X.
Yabo, D.
ASTVA: DDoS-limiting architecture for Next Generation Internet Adv. Materials Research Topology with BGP
2012
Chen, Y.
Le Merrer, E.
Li, Z.
Yaning Liu, Y.
Simon, G.
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV Computer Networks Topology with BGP
2011
Drivere, A.A. Can we study the topology of the Internet from the vantage points of large and small content providers? Youngstown State Univ. Topology with BGP
2011
Liu, Y.
Peng, W.
Su, J.
Study on IP prefix hijacking in cloud computing networks based on attack planning Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom) Topology with BGP
2011
Chen, M.
Yu, L.
Bai, H.
Two propositions about geographical distributions of BitTorrent file resources Conf. on Informatics, Cybernetics, and Computer Engineering (ICCE) Topology with BGP
2011
Takahashi, Y.
Ishibashi, K.
Incentive mechanism for prompting ISPs to implement outbound filtering of unwanted traffic Conf. on Network Games, Control and Optimization (NetGCooP) Topology with BGP
2011
Kurant, M.
Markopoulou, A.
Towards unbiased BFS sampling IEEE J. Selected Areas in Communications Topology with BGP
2011
Gjoka, M.
Kurant, M.
Butts, C.T.
Markopoulou, A.
Practical recommendations on crawling online social networks IEEE J. Selected Areas in Communications Topology with BGP
2011
Zhang, B.-F.
Li, Y.
Liu, Y.-J.
Su, J.-S.
Analysis of prefix hijacking based on AS hierarchical model Conf. on Network and System Security (NSS) Topology with BGP
2011
Szekeres, A. Multi-path inter-domain routing: The impact on BGPs scalability, stability and resilience to link failures Univ. Politehnica of Bucharest and Vrije Univ. Amsterdam Topology with BGP
2011
Alvarez-Hamelin, J.I.
Anunziata, D.
Beiro, M.G.
Barrat, A.
DallAsta, L.
Vespignani, A.
http://lanet-vi.fi.uba.ar/i_am_here/ (LArge NETworks VIsualization tool) Dep. de Electronica, Facultad de Ingenieria, Univ. Buenos Aires Topology with BGP
2011
Wong, E.L.
Shmatikov, V.
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing Conf. on Dependable Systems and Networks (DSN) Topology with BGP
2011
Strowes, S.D.
Mooney, G.
Perkins, C.
Compact routing on the Internet AS-graph IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Liu, Y.
Dai, B.
Zhu, P.
Su, J.
Whom to convince? It really matters in BGP prefix hijacking attack and defense Future Information Technology Topology with BGP
2011
Karaoglu, H.T.
Yuksel, M.
Gunes, M.H.
On the scalability of path exploration using opportunistic path-vector routing IEEE Conf. on Communications (ICC) Topology with BGP
2011
Helminger, M. Interactive visualization of global routing dynamics Technische Univ. Muenchen, Faculty of Informatics Topology with BGP
2011
Amaral, P.
Silva, E.
Bernardo, L.
Pinto, P.
Inter-domain traffic engineering using an AS-level multipath routing architecture IEEE Conf. on Communications (ICC) Topology with BGP
2011
Siritana, H.
Kitisin, S.
Gertphol, S.
A study of autonomous system relationships within Thailand Conf. on Computer Science and Software Engineering (JCSSE) Topology with BGP
2011
Akashi, O. Analysis of cooperative management strategies against route-hijacking IFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
Topology with Skitter
2011
Scholz, J.
Greiner, M.
Self-organizing weights for Internet AS-graphs and surprisingly simple routing metrics EPL (Europhysics Letters) Topology with BGP
Topology with Skitter
2011
Deng, W.
Karaliopoulos, M.
Muehlbauer, W.
Zhu, P.
Lu, X.
Plattner, B.
k-Fault tolerance of the Internet AS graph Computer Networks Topology with BGP
2011
Deng, W.
Zhu, P.
Xiong, N.
Xiao, Y.
Xiaofeng, H.
How resilient are individual ASes against AS-level link failures? IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2011
Wu, H.
Kvizhinadze, G.
Martingale limit theorems of divisible statistics in a multinomial scheme with mixed frequencies Statistics and Probability Letters Topology with BGP
2011
Melnik, S.
Hackett, A.
Porter, M.A.
Mucha, P.J.
Gleeson, J.P.
The unreasonable effectiveness of tree-based theory for networks with clustering Phys. Rev. E Topology with BGP
Topology with Skitter
2011
Bangera, P.
Gorinsky, S.
Impact of prefix hijacking on payments of providers Conf. on Communication Systems and Networks (COMSNETS) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
Evaluation of prefix hijacking impact based on hinge-transmit property of BGP routing system J. of Next Generation Information Technology Topology with BGP
2010
Rasti, A.H.
Magharei, N.
Rejaie, R.
Willinger, W.
Eyeball ASes: from geography to connectivity Internet Measurement Conf. (IMC) Topology with BGP
2010
Huang, D.
Zhao, J.
Wang, X.
Trading bandwidth for playback lag: Can active peers help? Multi-media Conf. Topology with BGP
2010
Goldberg, S.
Schapira, M.
Hummon, P.
Rexford, J.
How secure are secure interdomain routing protocols? ACM SIGCOMM Computer Communication Review Topology with BGP
2010
Asai, H.
Esaki, H.
Towards interdomain transit traffic reduction in peer-assisted content delivery networks Symp. on Telecommunications Network Strategy and Planning (NETWORKS) Topology with BGP
2010
Asai, H.
Esaki, H.
Estimating AS relationships for application-layer traffic optimization Workshop on Incentives, Overlays, and Economic Traffic Control (ETM) Topology with BGP
2010
Hanif, S. Impact of topology on BGP convergence Dept. Computer Science, VU Univ. Amsterdam Topology with BGP
2010
Guo, T.
Wang, N.
Tafazolli, R.
Moessner, K.
Policy-aware virtual relay placement for inter-domain path diversity IEEE Symp. on Computers and Communications (ISCC) Topology with BGP
2010
Chong, W.H.
Toh, W.S.B.
Teow, L.N.
Efficient extraction of high-betweenness vertices Conf. on Advances in Social Networks Analysis and Mining (ASONAM) Topology with BGP
2010
Elena, E.
Rougier, J.
Secci, S.
Characterisation of AS-level path deviations and multipath in Internet routing EURO-NF Conf. on Next Generation Internet (NGI) Topology with BGP
2010
Vilhar, A.
Novak, R.
Kandus, G.
The impact of network topology on the performance of MAP selection algorithms Computer Networks Topology with BGP
2010
Tarkoma, S.
Antikainen, M.
Canopy: publish/subscribe with upgraph combination IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Rajahalme, J. Incentive-informed inter-domain multicast IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Hu, C.
Chen, K.
Chen, Y.
Liu, B.
Evaluating potential routing diversity for internet failure recovery IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2010
Dou, B-L
Wang, X-G
Zhang, S-Y
Robustness of networks against cascading failures Physica A: Statistical Mechanics and its Applications Topology with BGP
2010
Xuan, Q.
Du, F.
Wu, T-J
Partially ordered sets in complex networks J. Phys. A: Math. Theor. Topology with BGP
2010
Pansiot, J.-J.
Merindol, P.
Donnet, B.
Bonaventura, O.
Extracting intra-domain topology from mrinfo probing Passive and Active Measurement (PAM) Topology with BGP
2010
DiBenedetto, S.
Stone, A.
Strout, M.
Massey, D.
Simulating internet scale topologies with metarouting Colorado State Univ. Topology with BGP
2010
Chen, K.
Hu, C.
Zhang, W.
Chen, Y.
Liu, B.
On the eyeshots of BGP vantage points IEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Amaral, P.
Ganhao, F.
Assuncao, C.
Bernardo, L.
Pinto, P.
Scalable multi-region routing at inter-domain level IEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2010
Yujing, L.
Bofeng, Z.
Fei, W.
Jinshu, S.
A study of hinge-transmit property of BGP routing system Forum on Computer Science-Technology and Applications (IFCSTA) Topology with BGP
2009
Strowes, S.D.
Perkins, C.
Deterministic, reduced-visibility inter-domain forwarding ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Rajahalme, J.
Sarela, M.
Visala, K.
Riihijarvi, J.
Inter-domain rendezvous service architecture PSIRP (TR09-003) Topology with BGP
2009
Miller, K.
Eliassi-Rad, T.
Continuous time group discovery in dynamic graphs Workshop on Analyzing Networks and Learning with Graphs (NIPS) Topology with BGP
2009
Chen, K.
Choffnes, D.R.
Potharaju, R.
Chen, Y.
Bustamante, F.E.
Pei, D.
Zhao, Y.
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2009
Merindol, P.
Van den Schrieck, V.
Donnet, B.
Bonaventure, O.
Pansiot, J.-J.
Quantifying ASes multiconnectivity using multicast information Internet Measurement Conf. (IMC) Topology with BGP
2009
Studer, A.
Perrig, A.
The coremelt attack Symp. on Research in Computer Security (ESORICS) Topology with BGP
2009
Shu, W.
Changjia, C.
Backup routing for BGP: Virtual ring routing scheme IEEE Conf. on Computer Science and Information Technology (ICCSIT) Topology with BGP
2009
Avramopoulos, I.
Suchara, M.
Protecting DNS from routing attacks: a comparison of two alternative anycast implementations IEEE Security and Privacy Topology with BGP
2009
Miwa, S.
Suzuki, M.
Hazeyama, H.
Uda, S.
Miyachi, T.
Kadobayashi, Y.
Shinoda, Y.
Experiences in emulating 10K AS topology with massive VM multiplexing ACM workshop on Virtualized infrastructure systems and architectures Topology with BGP
2009
Guoqiang, Y.
Wenhua, D.
An efficient algorithm for AS path inferring Conf. on Hybrid Information Technology Topology with BGP
2009
Cittadini, L.
Rimondini, M.
Corea, M.
Di Battista, G.
On the feasibility of static analysis for BGP convergence IFIP/IEEE Symp. on Integrated Network Management (IM) Topology with BGP
2009
Asai, H.
Esaki, H.
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs Asia Future Internet summer school, Jeju, Korea Topology with BGP
2009
Amaral, P.
Bernardo, L.
Pinto, P.
DTIA: An Architecture for Inter-Domain Routing IEEE Conf. on Communications (ICC) Topology with BGP
2009
Bui, Q.D.
Jennings, A.
Relay node selection in large-scale VoIP overlay networks Conf. on Ubiquitous and Future Networks (ICUFN) Topology with BGP
2009
Xu, Y.
Zhang, W.
A power-law approach on router-level internet macroscopic topology modeling Fuzzy Information and Engineering, Volume 2 Topology with BGP
2009
Shavitt, Y.
Shir, E.
Weinsberg, U.
Near-deterministic inference of AS relationships Conf. on Telecommunications (ConTEL) Topology with BGP
2009
Asai, H.
Esaki, H.
A methodology for magnitude-based inter-AS distance estimation WIT, Hokkaido, Japan Topology with BGP
2009
DIgnazio, A.
Giovannetti, E.
Asymmetry and discrimination in Internet peering: evidence from the LINX J. Industrial Organization Topology with BGP
2009
Di Menna, A.
Refice, T.
Cittadini, L.
Di Battista, G.
Measuring route diversity in the internet from remote vantage points IEEE Conf. on Networking (ICN) Topology with BGP
2009
Weinsberg, U.
Shavitt, Y.
Shir, E.
Near-deterministic inference of AS relationships IEEE Conf. on Computer Communications (INFOCOM) Topology with BGP
2009
Liu, B.
Cui, Y.
Lu, Y.
Xue, Y.
Locality-awareness in BitTorrent-like P2P applications IEEE Trans. on Multimedia Topology with BGP
2009
Hasegawa, G.
Hiraoka, Y.
Murata, M.
Evaluation of free-riding traffic problem in overlay routing and its mitigation method Conf. on Networking and Services (ICNS) Topology with BGP
2009
Haeberlen, A.
Avramopoulos, I.
Rexford, J.
Druschel, P.
NetReview: detecting when interdomain routing goes wrong Usenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2009
Eberle, W.
Holder, L.
Cook, D.
Identifying threats using graph-based anomaly detection Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Ch. 4 Topology with BGP
2009
Zhang, G. Measuring the impacts of sampling bias on internet AS-level topology inference WRI Conf. on Communications and Mobile Computing (CMC) Topology with BGP
2009
Lumezanu, C.
Baden, R.
Spring, N.
Bhattacharjee, B.
Triangle inequality and routing policy violations in the internet Passive and Active Measurement (PAM) Topology with BGP
2009
Leskovec, J.
Lang, K.J.
Dasgupta, A.
Mahoney, M.W.
Large-scale community structure in social and information networks Carnegie Mellon Univ. Topology with BGP
Topology with Skitter
2009
Puzis, R.
Yagil, D.
Elovici, Y.
Braha, D.
Collaborative attack on internet users anonymity Internet Research Topology with BGP
2008
Kang, U.
Tsourakakis, C.
Appel, A.P.
Faloutsos, C.
Leskovec, J.
HADI: Fast diameter estimation and mining in massive graphs with Hadoop Carnegie Mellon Univ. Topology with BGP
2008
Hei, Y.
Nakao, A.
Hasegawa, T.
Ogishi, T.
Yamamoto, S.
AS alliance: cooperatively improving resilience of intra-alliance communication ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2008
Serrano, M.A.
De Los Rios, P.
Structural efficiency of percolated landscapes in flow networks Plos One Topology with BGP
2008
MacArthur, B.D.
Sanchez-Garcia, R.J.
Anderson, J.W.
Symmetry in complex networks Discrete Applied Mathematics Topology with BGP
2008
Vilhar, A.
Novak, R.
Policy relationship annotations of predefined AS-level topologies Computer Networks Topology with BGP
2008
Wojciechowski, M. Border Gateway modeling and simulation Dep. Computer Science, VU Univ. Amsterdam Topology with BGP
2008
Raghavan, V.
Riley, G.
Jaafar, T.
Realistic topology modeling for the internet BGP infrastructure IEEE Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) Topology with BGP
2008
Hazeyama, H.
Suzuki, M.
Miwa, S.
Miyamoto, D.
Kadobayashi, Y.
Outfitting an inter-AS topology to a network emulation testbed for realistic performance tests of DDoS countermeasures Conf. on Cyber Security Experimentation and Test Topology with BGP
2008
Katz, G.J.
Kider, J.T.
All-pairs shortest-paths for large graphs on the GPU ACM SIGGRAPH/EUROGRAPHICS Symp. on Graphics hardware Topology with BGP
2008
Li, L.
Chen, C.
Exploring possible strategies for competitions between Autonomous Systems IEEE Conf. on Communications (ICC) Topology with BGP
2008
John, J.P.
Katz-Bassett, E.
Krishnamurthy, A.
Anderson, T.
Venkataramani, A.
Consensus routing: the internet as a distributed system Usenix Symp. on Networked Systems Design and Implementation (NSDI) Topology with BGP
2008
Xiao, Y.
MacArthur, B.D.
Wang, H.
Xiong, M.
Wang, W.
Network quotients: structural skeletons of complex systems Phys. Rev. E Topology with BGP
2007
Qazi, S.
Moors, T.
Using type-of-relationship (ToR) graphs to select disjoint paths in overlay networks IEEE Global Telecommunications Conf. (GLOBECOM) Topology with BGP
2007
Muehlbauer, W.
Uhlig, S.
Fu, B.
Meulle, M.
Maennel, O.
In search for an appropriate granularity to model routing policies ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Ballani, H.
Francis, P.
Zhang, X.
A study of prefix hijacking and interception in the internet ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2007
Wu, J.
Zhang, Y.
Mao, Z.M.
Shin, K.G.
Internet routing resilience to failures: analysis and implications ACM Conf. on Emerging Networking Experiments and Technologies (CoNEXT) Topology with BGP
2007
Huang, C.
Li, J.
Ross, K.W.
Can internet video-on-demand be profitable? ACM SIGCOMM Conf. on Applications, technologies, architectures, and protocols for computer communications Topology with BGP
2006
Restrepo, J.G.
Ott, E.
Hunt, B.R.
Characterizing the dynamical importance of network nodes and links Phys. Rev. Lett. Topology with BGP
2006
DIgnazio, A.
Giovannetti, E.
Antitrust analysis for the internet upstream market: a Border Gateway Protocol approach J. Competition Law and Economics Topology with BGP
2020
Yeganeh, Bahador
Durairajan, Ramakrishnan
Rejale, Reza
Willinger, Walter
A First Comparative Characterization of Multi-cloud Connectivity in Today Internet Passive and Active Measurement Topology with Skitter
2018
Qiu, K.
Zhu, Y.
Yuan, J.
Zhao, J.
Wang, X.
Wolf, T.
ParaPLL: Fast parallel shortest-path distance query on large-scale weighted graphs Intl Conf. on Parallel Processing Topology with Skitter
2018
Murugesan, V.
Shalini, M.
Yang, M.H.
Design and analysis of hybrid single packet IP traceback scheme IET Networks Topology with Skitter
2018
Rezvanian, A.
Saghiri, A. M.
Vahidipour, S. M.
Esnaashari, M.
Meybodi, M. R.
Learning Automata for Cognitive Peer-to-Peer Networks Recent Advances in Learning Automata Topology with Skitter
2018
Murugesan, V.
Selvaraj, M. S.
Yang, M. H.
HPSIPT: A high-precision single-packet IP traceback scheme Computer Networks Topology with Skitter
2018
Murugesan, V.
Selvaraj, M.
UDP based IP Traceback for Flooding DDoS Attack The International Arab Journal of Information Technology Topology with Skitter
2018
Cai, J.
Luo, J. Z.
Liu, Y.
Wei, W.
Lei, F.
A network community restructuring mechanism for transport efficiency improvement in scale-free complex networks Concurrency and Computation Practice and Experience Topology with Skitter
2018
Alrasheed, H. On the Eccentricity Function in Graphs Intl Workshop on Complex Networks Topology with Skitter
2017
Gilmore, J.S.
Engelbrecht, H.A.
Pithos: Distributed storage for nassive nulti-user virtual environments ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM) Topology with Skitter
2017
Eppstein, D.
Goodrich, M.T.
Mitzenmacher, M.
Torres, M.R.
2-3 Cuckoo filters for faster triangle listing and set intersection ACM SIGMOD-SIGACT-SIGAI Symp. on Principles of Database Systems Topology with Skitter
2017
Luo, J.N.
Yang, M.H.
Improved single packet traceback scheme with Bloom filters Intl Conf. on Internet of Things as a Service Topology with Skitter
2016
An, H.
Lee, H.
Perrig, A.
Coordination of anti-spoofing mechanisms in partial deployments J. of Communications and Networks Topology with Skitter
2016
Bhardwaj, O.
Anschelevich, E.
Kar, K.
Coalitionally stable pricing schemes for inter-domain forwarding Computer Networks Topology with Skitter
2016
Malliga, S.
Selvi, C.
Kogilavani, S.
Low storage and traceback overhear IP traceback system J. of Information Science and Engineering Topology with Skitter
2015
Kloster, K.
Gleich, D.F.
Seeded PageRank solution paths arxiv.org Topology with Skitter
2015
Francois, G.
Festor, O.
Anomaly traceback using software defined networking Intl. Workshop on Information Forensics and Security (WIFS) Topology with Skitter
2015
Staudt, C.L.
Sazonovs, A.
Meyerhenke, H.
NetworKit: A tool suite for large-scale complex network analysis arxiv.org Topology with Skitter
2015
Saha, S. Efficient methods on reducing data redundancy in the Internet Aalto Univ., FI Topology with Skitter
2015
Huang, T.T.
Sun, B.Q.
The impact of the Internet on global industry: New evidence of Internet measurement Research in Intl Business and Finance Topology with Skitter
2015
Li, D.
Sha, W.
Dynamic ring for seamless mobility in identity centric networks Computers and Communication (ISCC) Topology with Skitter
2015
Pares Palacin, A. Random graphs and applications Univ. of Barcelona Topology with Skitter
2014
Yang, M.H. Storage-efficient 16-bit hybrid IP traceback with single packet The Scientific World J. Topology with Skitter
2014
Yang, M.H.
Yang, M.C.
Luo, J.-N.
Hsu, W.C.
High accuracy and low storage hybrid IP traceback Conf. on Computer, Information and Telecommunication Systems (CITS) Topology with Skitter
2014
Medrano-Chavez, A.G.
Perez-Cortes, E.
Lopez-Guerrero, M.
A performance comparison of Chord and Kademlia DHTs in high churn scenarios Peer-to-Peer Networking and Applications Topology with Skitter
2014
Zhang, J. Statistical inference on network data Univ. Illinois, Urbana-Champaign Topology with Skitter
2014
Arora, D.
Verigin, A.
Godkin, T.
Neville, S.W.
Statistical assessment of sybil-placement strategies within DHT-structured Peer-to-Peer botnets Conf. on Advanced Information Networking and Applications (AINA) Topology with Skitter
2014
Fallah, M.S.
Kahani, N.
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks Security and Communication Networks Topology with Skitter
2014
Dundjerski, D.
Tomasevic, M.
Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols Concurrency Computation: Practice and Experience Topology with Skitter
2013
Freno, A.
Keller, M.
Tommasi, M.
Probability estimation over large-scale random networks via the Fiedler delta statistic J. of Machine Learning Research Topology with Skitter
2013
Seo, D.
Lee, H.
Perrig, A.
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks Computers and Security Topology with Skitter
2013
Preciado, V.M.
Jadbabaie, A.
Moment-based spectral analysis of large-scale networks using local structural information IEEE/ACM Trans. on Networking (TON) Topology with Skitter
2013
Godkin, T. Statistical assessment of peer-to-peer botnet features Univ. of Victoria, Victoria, CA Topology with Skitter
2013
Fu, A.W.
Wu, H.
Cheng, J.
Wong, R.C.
IS-Label: an independent-set based labeling scheme for point-to-point distance querying VLDB Endowment Topology with Skitter
2013
Nikolaevskiy, I.
Lukyanenko, A.
Polishchuk, T.
Polishchuk, V.
Gurtov, A.
isBF: scalable in-packet Bloom filter based multicast ACM Symp. on Applied Computing (SAC) Topology with Skitter
2013
Chen, Y.
Kawadia, V.
Urgaonkar, R.
Detecting overlapping temporal community structure in time-evolving networks arxiv.org Topology with Skitter
2013
Tang, M.
Zhang, G.
Lin, T.
Liu, J.
HDLBR: A name-independent compact routing scheme for power-law networks Computer Communications Topology with Skitter
2013
Ni, C.
Jin, G.
CTFPi: A new method for packet filtering of firewall Conf. on Information Technology and Software Engineering, Ch. 48 Topology with Skitter
2012
Karasawa, T.
Soshi, M.
Miyaji, A.
A novel hybrid IP traceback scheme with packet counters Conf. on Internet and Distributed Computing Systems (IDCS) Topology with Skitter
2012
Parno, B.
Zhou, Z.
Perrig, A.
Using trustworthy host-based information in the network Workshop on Scalable trusted computing (STC) Topology with Skitter
2012
Preciado, V.M.
Draief, M.
Jadbabaie, A.
Structural analysis of viral spreading processes in social and communication networks using egonets arxiv.org Topology with Skitter
2012
Goltsev, A.V.
Dorogovtsev, S.N.
Oliveira, J.G.
Mendes, J.F.F.
Localization and spreading of diseases in complex networks Phys. Rev. Lett. Topology with Skitter
2012
Fay, D.
Haddadi, H.
Moore, A.W.
Mortier, R.
Thomason, A.G.
Uhlig, S.
Weighted spectral distribution: A metric for structural analysis of networks Statistical and Machine Learning Approaches for Network Analysis, Ch. 6 Topology with Skitter
2012
Yang, M.-H.
Yang, M.-C.
RIHT: A novel hybrid IP traceback scheme IEEE Trans. on Information Forensics and Security Topology with Skitter
2012
Wehmuth, K.
Ziviani, A.
Distributed assessment of the closeness centrality ranking in complex networks Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX) Topology with Skitter
2011
Mukaddam, A.
ELHajj, I.
Hop count variability Conf. for Internet Technology and Secured Transactions (ICITST) Topology with Skitter
2011
Wehmuth, K.
Ziviani, A.
Distributed location of the critical nodes to network robustness based on spectral analysis Latin American Network Operations and Management Symp. (LANOMS) Topology with Skitter
2011
Bell, C. Examining change in Internet topology in terms of external events, April 2001 - April 2002 Univ. Nebraska at Omaha Topology with Skitter
2011
Youssef, M.
Kooij, R.
Scoglio, C.
Viral conductance: Quantifying the robustness of networks with respect to spread of epidemics J. Computational Science Topology with Skitter
2011
Alvarez-Hamelin, J.I.
Beiro, M.G.
Busch, J.R.
Understanding edge connectivity in the Internet through core decomposition Internet Mathematics Topology with Skitter
2010
Song, J.
Zhao, H.
Yang, B.
Sun, H.
AS-level Internet macroscopic topology centralization evolvement analysis J. Software Engineering and Applications Topology with Skitter
2010
de Montgolfier, F.
Soto, M.
Viennot, L.
Autour du caractere arborescent dInternet MajecSTIC Topology with Skitter
2010
Xu, Y.
Wang, Z.
On an IBA topology model for internet topology structure Conf. on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Topology with Skitter
2010
Yan, G.
Eidenbenz, S.
Thulasidasan, S.
Datta, P.
Ramaswamy, V.
Criticality analysis of Internet infrastructure Computer Networks Topology with Skitter
2010
Scholtes, I.
Botev, J.
Esch, M.
Hohfeld, A.
Schloss, H.
Zech, B.
TopGen - internet router-level topology generation based on technology constraints Conf. on Simulation Tools and Techniques for Communications, Networks and Systems Topology with Skitter
2010
Fay, D.
Haddadi, H.
Thomason, A.
Moore, A.W.
Mortier, R.
Jamakovic, A.
Uhlig, S.
Rio, M.
Weighted spectral distribution for Internet topology analysis: Theory and applications IEEE/ACM Trans. on Networking Topology with Skitter
2009
Augustin, B.
Krishnamurthy, B.
Willinger, W.
IXPs: mapped? Internet Measurement Conf. (IMC) Topology with Skitter
2009
Jin, G.
Zhang, F.
Li, Y.
Zhang, H.
Qian, J.
A hash-based path identification scheme for DDoS attacks defense Conf. on Computer and Information Technology Topology with Skitter
2009
Haddadi, H.
Fay, D.
Uhlig, S.
Moore, A.
Jamakovic, A.
Mortier, R.
Analysis of the Internets structural evolution Univ. of Cambridge Topology with Skitter
2009
Haddadi, H.
Fay, D.
Jamakovic, A.
Maennel, O.
Moore, A.
Mortier, R.
Uhlig, S.
On the importance of local connectivity for Internet topology models Intl Teletraffic Congress Topology with Skitter
2009
Erlebach, T.
Moonen, L.S.
Spieksma, F.C.R.
Vukadinovic, D.
Connectivity measures for internet topologies on the level of autonomous systems Operations Research Topology with Skitter
2009
Korn, A.
Schubert, A.
Telcs, A.
Lobby index in networks Physica A: Statistical Mechanics and its Applications Topology with Skitter
2009
Xu, Y.
Zhao, H.
An improved BA model for router-level internet macroscopic topology IAENG J. Computer Science Topology with Skitter
2009
Madhyastha, H.V.
Katz-Bassett, E.
Anderson, T.
Krishnamurthy, A.
Venkataramani, A.
iPlane Nano: path prediction for peer-to-peer applications USENIX Symp. on Networked Systems Design and Implementation (NSDI)