office: San Diego Supercomputer Center, room 331
email: alberto AT caida DOT org
address: San Diego Supercomputer Center
University of California San Diego
9500 Gilman Drive, MC 0505
La Jolla, CA 92093-0505
PGP key fingerprint: 039F FC8A C1AA E4EE 371A 7EC3 6948 20E3 FBB5 2865
My Google Scholar page
[Nov 2017] Our work on inferring Carrier-Grade Deployments using passive measurements was accepted to IEEE INFOCOM 2018.
[Aug 2017] "Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem" accepted at IMC 2017
[May 2017] "SWIFT: Predictive Fast Reroute" accepted at ACM SIGCOMM 2017!!
[Jan 2017] I'll be co-chairing the ACM SIGCOMM 2017 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks (Big-DAMA 2017). Consider submitting a paper!
[Dec 2016] Alistair has been awarded the 2017 IRTF Applied Networking Research Prize for our IMC paper on BGPStream!
[Jul 2016] I have been awarded a research grant from Cisco Systems for our work on BGPStream and to collaborate with them to add native support to OpenBMP.
[Jul 2016] Read about the CAIDA BGP Hackathon 2016 on ACM SIGCOMM CCR.[Feb 2016] I'm organizing the 1st CAIDA BGP Hackathon together with USC, RIPE NCC, Route Views, FORTH, UFMG.
[Nov 2015] Check out my invited talk at IETF 94 Measuring and Monitoring BGP
[Nov 2015] We just released BGPStream v1.0
[Sep 2015] Check out our latest paper at IMC 2015 on Leveraging Internet Background Radiation for Opportunistic Network Analysis
[Apr 2015] We published a follow-up analysis of the sipscan at TMA 2015: How Dangerous Is Internet Scanning? A Measurement Study of the Aftermath of an Internet-Wide Scan
[Dec 2014] North Korea got disconnected from the Internet a few times in the last days of 2014. We published a live graph of its BGP reachability status as a preview of our work on detecting and characterizing Internet outages
[Oct 2014] We published a technical report on our Internet census
[Aug 2014] Check our blog post about the recent Time Warner Cable outage
[Aug 2014] Submit your paper to the special issue on the International Journal of Network Management on ``Measure, Detect and Mitigate: Challenges and Trends in Network Security'' (Deadline 1st of December)
[Jan 2014] New estimates of IPv4 address space usage in our paper accepted at ACM SIGCOMM CCR: ``Estimating Internet address space usage through passive measurements''
Check out our blog post on observing the Syrian Internet blackout from the UCSD Network Telescope
Our research activity on Internet outages has been covered in September issue of Communications of the ACM Magazine (link)
..more press coverage also at Heise Online (if you can read Deutsch)
[Jul 2012] Our paper ``Analysis of a "/0" Stealth Scan from a Botnet'' has been accepted at IMC 2012
[Jun 2012] Our work on exploiting malware traffic pollution for detecting and analyzing Internet outages has been awarded as one of the three best papers in ACM SIGCOMM Computer Communication Review of the past 12 months. I will present it in a special session at SIGCOMM 2012
[Jan 2012] Our work on exploiting malware traffic pollution for detecting and analyzing Internet outages has been published on ACM SIGCOMM Computer Communication Review, January 2012
[Jan 2012] Our paper entitled "Issues and Future Directions in Traffic Classification" has been published on IEEE Network, January 2012
[Nov 2011] Our work on the Internet "kill switch" in Libya and Egypt has been presented at IMC 2011, Berlin, November 2012
I am a Research Scientist at CAIDA, the Center for Applied Internet Data Analysis, University of California San Diego, USA. In 2008 I received my Ph.D. in Computer Engineering and Systems at University of Napoli "Federico II", Italy. My main research interests are in the fields of Internet measurement and Internet security, with a focus on the detection and analysis of large-scale Internet events, such as botnet activities, Internet blackouts, and BGP prefix hijacking attacks. While most of my work is basic research, I also enjoy building running systems (such as IODA) and software tools and APIs (BGPStream, TIE). All of which would not be possible without the talented people I am fortunate to work with.
Internet Measurement, Traffic Analysis, Traffic Classification, Network Security
Recent Selected Publications (full list here)
Inferring Carrier Grade NAT Deployments in the Wild
I. Livadariu, K. Benson, A. Elmokashfi, A. Dhamdhere, A. Dainotti
IEEE INFOCOM 2018
Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem
M. Jonker, A. King, J. Krupp, C. Rossow, A. Sperotto, A. Dainotti
ACM SIGCOMM Internet Measurement Conference IMC 2017
SWIFT: Predictive Fast Reroute
T. Holterbach, S. Vissicchio, A. Dainotti, L. Vanbever
ACM SIGCOMM 2017
BGPStream: a framework for live and historical BGP data analysis (pdf)
C. Orsini, A. King, V. Giotsas, D. Giordano, A. Dainotti
ACM SIGCOMM Internet Measurement Conference IMC 2016
Awarded the IRTF Applied Networking Research Prize 2017
Lost in Space: Improving Inference of IPv4 Address Space Utilization
A. Dainotti, K. Benson, A. King, B. Huffaker, E. Glatz, X. Dimitropoulos, P. Richter, A. Finamore, A. Snoeren
IEEE Journal on Selected Areas in Communications (J-SAC), 2016
Leveraging Internet Background Radiation for Opportunistic Network Analysis (pdf)
K. Benson, A. Dainotti, k. claffy, A. Snoeren, and M. Kallitsis
ACM SIGCOMM Internet Measurement Conference IMC 2015
Uncovering network tarpits with degreaser
L. Alt, R. Beverly, A. Dainotti
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014.
Estimating Internet address space usage through passive measurements
A. Dainotti, K. Benson, A. King, K. C. Claffy, M. Kallitsis, E. Glatz, X. Dimitropoulos
ACM SIGCOMM Computer Communication Review -- Volume 44 Issue 1, January 2014. Pages 42-49
Analysis of a "/0" Stealth Scan from a Botnet
A. Dainotti, A. King, K. C. Claffy, F. Papale, A. Pescapè
ACM SIGCOMM Internet Measurement Conference IMC 2012
IEEE/ACM Transactions on Networking - vol.23, no.2, pp.341,354, April 2015
Finalist for best paper award at IMC
Analysis of Country-wide Internet Outages Caused by Censorship (pdf)
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, A. Pescapè,
ACM SIGCOMM Internet Measurement Conference IMC 2011 - November 2011, Berlin (Germany)
IEEE/ACM Transactions on Networking - vol.22, no.6, pp.1964,1977, Dec. 2014.
Awarded the IRTF Applied Networking Research Prize 2012
Traffic Identification Engine (TIE): an Open Platform for Traffic Classification
W. de Donato, A. Dainotti, A. Pescapè,
IEEE Network - vol.28, no.2, pp.56, 64, March-April 2014
A tool for the generation of realistic network workload for emerging networking scenarios
A. Botta, A. Dainotti, A. Pescapè
Computer Networks (Elsevier), Volume 56, Issue 15, October 2012
in the top25 of most cited articles published in Elsevier Computer Networks since 2012
Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the Internet (pdf)
A. Dainotti, R. Amman, E. Aben, K. C. Claffy
ACM SIGCOMM Computer Communication Review, January 2012
Awarded as one of top-three papers in ACM SIGCOMM Computer Communication Review in 2012 and presented at SIGCOMM 2012
Other Professional Activities
Independent reviewer of projects and evaluator of project proposals for the European Commission (Horizon 2020, FP7 ICT) and the US National Science Foundation
- Editorial board member:for ACM SIGCOMM Computer Communication Review, IEEE/ACM Transactions on Networking
- Guest editor for: International Journal of Network Management (Wiley)
- Steering Committee member for the TMA Conference
TPC chair for: TMA 2014, Big-DAMA 2017
TPC member for: CoNEXT 2017, PAM 2017, 2015, 2014, IEEE ICC 2017 - 2014, ACM IMC 2013, TMA 2017 - 2012, IEEE WNM 2013, IEEE ICNC 2013, IEEE Globecom 2012, IEEE ICC 2007
Reviewer for: ACM SIGCOMM Computer Communication Review, IEEE/ACM Transactions on Networking, IEEE Communications Letters, IEEE Communications Magazine, Computer Networks (Elsevier), Computer Communications (Elsevier), ...
I gratefully acknowledge funding from the National Science Foundation, the US Department of Homeland Security, Cisco Systems, and Comcast