Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
www.caida.org > ~alberto : publications_c.xml
Alberto Dainotti

Peer-reviewed publications in chronological order

[59] DynamIPs: Analyzing address assignment practices in IPv4 and IPv6
R. Padmanabhan, J. P. Rula, P. Richter, S. D. Strowes, A. Dainotti
CoNEXT 2020

[58] AS-Path Prepending: there is no rose without a thorn
P. Marcos, L. Prehn, L. Leal, A. Dainotti, A. Feldmann, M. Barcellos
IMC 2020

[57] MAnycast2 – Using Anycast to Measure Anycast
R. Sommese, G. Akiwate, L. Bertholdo, M. Jonker, R. van Rijswijk-Deij, A. Dainotti, K. Claffy, A. Sperotto
IMC 2020

[56] To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today (pdf)
C. Testart, P. Richter, A. King, A. Dainotti, D. Clark
PAM 2020

[55] When parents and children disagree: Diving into DNS delegation inconsistency
R. Sommese, G. C. M. Moura, M. Jonker, R. van Rijswijk-Deij, A. Dainotti, KC Claffy, A. Sperotto
PAM 2020

[54] Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table (pdf)
C. Testart, P. Richter, A. King, A. Dainotti, D. Clark
IMC 2019
Distinguished paper award at IMC
Press coverage: ZDNet, IEEE Spectrum, Bruce Schneier's Blog

[53] Towards Passive Analysis of Anycast in Global Routing: Unintended Impact of Remote Peering (pdf)
R. Bian, S. Hao, H. Wang, A. Dhamdhere, A. Dainotti, and C. Cotton
ACM SIGCOMM CCR

[52] At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes (pdf)
P. Lutscher, N. Weidmann, M. Roberts, M. Jonker, A. King, and A. Dainotti
Journal of Conflict Resolution, Jul 2019

[51] BGP hijacking classification (pdf)
S. Cho, R. Fontugne, K. Cho, A. Dainotti, and P. Gill
TMA 2019

[50] Chocolatine: Outage Detection for Internet Background Radiation (pdf)
A. Guillot, R. Fontugne, P. Winter, P. Mérindol, A. King, A. Dainotti, and C. Pelsser
TMA 2019

[49] Geo-Locating BGP prefixes (pdf)
P. Winter, R. Padmanabhan, A. King, and A. Dainotti
TMA 2019

[48] How to find correlated Internet failures (pdf)
R. Padmanabhan, A. Schulman, A. Dainotti, D. Levin, N. Spring
PAM 2019

[47] Blink: Fast Connectivity Recovery Entirely in the Data Plane (pdf)
T. Holterbach, E. Costa Molero, M. Apostolaki, A. Dainotti, S. Vissicchio, L. Vanbever
NSDI 2019

[46] A First Joint Look at DoS Attacks and BGP Blackholing in the Wild (pdf)
M. Jonker, A. Pras, A. Dainotti, A. Sperotto
ACM SIGCOMM Internet Measurement Conference 2018

[45] ARTEMIS: Neutralizing BGP Hijacking within a Minute (pdf)
P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, and A. Dainotti, "ARTEMIS: Neutralizing BGP Hijacking within a Minute"
IEEE/ACM Transactions on Networking
Press coverage: The Register, Cyberscoop

[44] Inferring Carrier Grade NAT Deployments in the Wild (pdf)
I. Livadariu, K. Benson, A. Elmokashfi, A. Dhamdhere, A. Dainotti
IEEE INFOCOM 2018

[43] Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem (pdf)
M. Jonker, A. King, J. Krupp, C. Rossow, A. Sperotto, A. Dainotti
ACM SIGCOMM Internet Measurement Conference IMC 2017
Press coverage: CircleID, ESET WeLiveSecurity, The Register, IBM Security Intelligence

[42] Predictive Fast Reroute upon Remote BGP Outages (pdf)
T. Holterbach, S. Vissicchio, A. Dainotti, L. Vanbever
ACM SIGCOMM 2017

[41] BGPStream: a framework for live and historical BGP data analysis (pdf)
C. Orsini, A. King, V. Giotsas, D. Giordano, A. Dainotti
ACM SIGCOMM Internet Measurement Conference IMC 2016
Awarded the IRTF Applied Networking Research Prize 2017

[40] Lost in Space: Improving Inference of IPv4 Address Space Utilization (pdf)
A. Dainotti, K. Benson, A. King, B. Huffaker, E. Glatz, X. Dimitropoulos, P. Richter, A. Finamore, A. Snoeren
IEEE Journal on Selected Areas in Communications (J-SAC), Apr. 2016

[39] Leveraging Internet Background Radiation for Opportunistic Network Analysis (pdf)
K. Benson, A. Dainotti, k. claffy, A. Snoeren, and M. Kallitsis
ACM SIGCOMM Internet Measurement Conference IMC 2015

[38] Analysis of a "/0" Stealth Scan from a Botnet(pdf)
A. Dainotti, A. King, K. C. Claffy, F. Papale, A. Pescapè
IEEE/ACM Transactions on Networking - vol.23, no.2, pp.341,354, April 2015

[37] How Dangerous Is Internet Scanning? A Measurement Study of the Aftermath of an Internet-Wide Scan (pdf)
E. Raftopoulos, E. Glatz, X. Dimitropoulos, and A. Dainotti
Traffic Monitoring and Analysis Workshop (TMA), Apr 2015, Barcelona, Spain.

[36] Analysis of Country-wide Internet Outages Caused by Censorship(pdf)
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, A. Pescapè,
IEEE/ACM Transactions on Networking - vol.22, no.6, pp.1964,1977, Dec. 2014.

[35] Uncovering network tarpits with degreaser (pdf)
L. Alt, R. Beverly, A. Dainotti
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014.

[34] Traffic Identification Engine (TIE): an Open Platform for Traffic Classification (pdf)
W. de Donato, A. Dainotti, A. Pescapè,
IEEE Network - vol.28, no.2, pp.56, 64, March-April 2014

[33] Estimating Internet address space usage through passive measurements (pdf)
A. Dainotti, K. Benson, A. King, K. C. Claffy, M. Kallitsis, E. Glatz, X. Dimitropoulos
ACM SIGCOMM Computer Communication Review -- Volume 44 Issue 1, January 2014. Pages 42-49

[32] Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation (pdf)
K. Benson, A. Dainotti, K. C. Claffy, E. Aben
International Workshop on Traffic Monitoring and Analysis (TMA'13, co-located with INFOCOM 2013) - April 2013, Turin (Italy)

[31] A Coordinated View of the Temporal Evolution of Large-scale Internet Events(pdf)
A. King. B. Huffaker, A. Dainotti, K. C. Claffy
Computing (Springer), January 2013

[30] A Coordinated View of the Temporal Evolution of Large-scale Internet Events (pdf)
A. King. B. Huffaker, A. Dainotti, K. C. Claffy
First IMC Workshop on Internet Visualization (WIV 2012) - colocated with ACM IMC 2012

[29] Analysis of a "/0" Stealth Scan from a Botnet (pdf)
A. Dainotti, A. King, K. C. Claffy, F. Papale, A. Pescapè
ACM SIGCOMM Internet Measurement Conference IMC 2012
Finalist for best paper award at IMC
Press coverage: Dark Reading, Spam Fighter, The H Security

[28] A tool for the generation of realistic network workload for emerging networking scenarios
A. Botta, A. Dainotti, A. Pescapè
Computer Networks (Elsevier), Volume 56, Issue 15, October 2012
in the top25 of most cited articles published in Elsevier Computer Networks since 2012

[27] Analysis of Internet-wide Probing using Darknets (pdf)
A. Dainotti, A. King, K. C. Claffy
ACM 2012 Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS'12) - colocated with ACM CCS 2012

[26] Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the Internet (pdf)
A. Dainotti, R. Amman, E. Aben, K. C. Claffy
ACM SIGCOMM Computer Communication Review, January 2012
Best of ACM SIGCOMM CCR award 2012
Press coverage: Wall Street Journal Blog, Communications of the ACM, ACM TechNews, Tom's Guide

[25] Issues and Future Directions in Traffic Classification (pdf)
A. Dainotti, A. Pescapè, K. C. Claffy,
IEEE Network, Vol. 26, Issue 1, pp. 35-40, January-February 2012

[24] Analysis of Country-wide Internet Outages Caused by Censorship (pdf)
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, A. Pescapè,
ACM SIGCOMM Internet Measurement Conference IMC 2011 - November 2011, Berlin (Germany)
Awarded the IRTF Applied Networking Research Prize 2012
Press coverage: Communications of the ACM

[23] Traffic Classification through Joint Distributions of Packet-level Statistics
A. Dainotti, A. Pescapè, H. Kim
IEEE GLOBECOM 2011 - December 2011, Houston (TX, USA)

[22] Using a Behaviour Knowledge Space Approach for Detecting Unknown IP Traffic Flows, 10th International Workshop on Multiple Classifier Systems
A. Dainotti, A. Pescapè, C. Sansone, A. Quintavalle
MCS 2011 - June 2011, Napoli (Italy)

[21] Early Classification of Network Traffic through Multi-Classification
A. Dainotti, A. Pescapè, C. Sansone
International Workshop on Traffic Monitoring and Analysis (TMA'11) - April 2011, Vienna (Austria)

[20] Do You Trust Your Software-based Traffic Generator? (pdf)
A. Botta, A. Dainotti, A. Pescapè,
IEEE Communications Magazine, September 2010, pp. 158-165

[19] PortLoad: taking the best of two worlds in traffic classification
G. Aceto, A. Dainotti, W. de Donato, A. Pescapè
IEEE INFOCOM 2010 - WIP Track - March 2010, San Diego (CA, USA)

[18] K-dimensional trees for continuous traffic classification
V. Carela-Espanol, P. Barlet-Ros, M. Solé-Simò, A. Dainotti, W. de Donato, A. Pescapè
International Workshop on Traffic Monitoring and Analysis (TMA'10) @ PAM 2010 - April 2010, Zurich (Switzerland)

[17] Identification of traffic flows hiding behind TCP port 80
A. Dainotti, F. Gargiulo, L. Kuncheva, A. Pescapè, C. Sansone
IEEE ICC 2010 - May 2010, Capetown (South Africa)

[16] A Cascade Architecture for DoS Attacks Detection Based on the Wavelet Transform
A. Dainotti, A. Pescapè, G. Ventre
Journal of Computer Security, Vol. 17, Issue 6, pp. 945-968

[15] Combining Multiple Traffic Classification Techniques within a Single Platform
G. Aceto, A. Dainotti, W. de Donato, F. Gargiulo, A. Pescapè C. Sansone
Book chapter in RECIPE Robust and Efficient traffic Classification in IP nEtworks, Fridericiana Editrice Universitaria, pp.1-16, ISBN:978-88-833-8081-5, Napoli, Italy, 2009

[14] TIE: a Community-Oriented Traffic Classification Platform
A. Dainotti, W. de Donato, A. Pescapè
International Workshop on Traffic Monitoring and Analysis (TMA'09) @ IFIP Networking 2009 - May 2009, Aachen (Germany)

[13] Traffic Analysis of Peer-to-Peer IPTV Communities
T. Silverston, O. Fourmaux, A. Botta, A. Dainotti, A. Pescapé, G. Ventre, K. Salamatian,
Computer Networks (Elsevier). Volume 53, Issue 4, 18 March 2009, Pages 470-484.
in the top25 of most cited articles published in Elsevier Computer Networks since 2009

[12] Classification of Network Traffic via Packet-Level Hidden Markov Models
A. Dainotti, W. de Donato, A. Pescapè, P. Salvo Rossi
IEEE GLOBECOM 2008 - Dec 2008, New Orleans (LA, USA)

[11] Internet traffic modeling by means of Hidden Markov Models
A. Dainotti, A. Pescapè, P. Salvo Rossi, F. Palmieri, G. Ventre
Computer Networks (Elsevier). Volume 52, Issue 14, 9 October 2008, Pages 2645-2662

[10] Do You Know What You Are Generating?
A. Dainotti, A. Botta, A. Pescapè
Poster at ACM Co-Next 2007 Student Workshop. 2-pages abstract published in Co-Next '07 Proceedings

[09] Multi-protocol and multi-platform traffic generation and measurement
A. Botta, A. Dainotti, A. Pescapè
Demo at INFOCOM 2007 DEMO Session, May 2007, Anchorage (Alaska, USA)

[08] Worm Traffic Analysis and Characterization
A. Dainotti, A. Pescapè, G. Ventre
IEEE ICC 2007 - Jun 2007, Glasgow (Scotland)

[07] Reducing Network Traffic Data Sets
A. Botta, A. Dainotti, A. Pescapè, G. Ventre
IEEE ICC 2007 - Jun 2007, Glasgow (Scotland)

[06] SCTP performance evaluation over Heterogeneous Networks
A. Dainotti, S. Loreto, A. Pescapè, G. Ventre
Concurrency and Computation: Practice and Experience (Wiley) , Vol 19, Issue 8 (June 2007), Special Issue on Performance Analysis and Enhancements of Wireless Networks. pp. 1207 - 1218.

[05] Searching for Invariants in Network Games Traffic
A. Dainotti, A. Botta, A. Pescapè, G. Ventre
Poster at ACM Co-Next 2006 Student Workshop. 2-pages abstract published in Co-Next '06 Proceedings

[04] Wavelet-based Detection of DoS Attacks
A. Dainotti, A. Pescapè, G. Ventre,
2006 IEEE GLOBECOM - Nov 2006, San Francisco (CA, USA)

[03] An HMM Approach to Internet Traffic Modeling
A. Dainotti, A. Pescapè, P. Salvo Rossi, G. Iannello, F. Palmieri, G. Ventre
2006 IEEE GLOBECOM - Nov 2006, San Francisco (CA, USA)

[02] A Packet-level Characterization of Network Traffic
A. Dainotti, A. Pescapè, G. Ventre,
11th IEEE International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD 2006) - Trento (Italy), June 2006

[01] A packet-level model of Starcraft traffic
A. Dainotti, A. Pescapè, G. Ventre,
IEEE Second International Workshop on Hot Topics in Peer-to-Peer Systems 2005 (co-located with IEEE Mobiquitous 2005) pp. 244-253, 0-7695-2417-6/05 - July 2005, San Diego (CA, USA)

Editorials (non peer-reviewed)

Lessons learned organizing the PAM 2020 virtual conference
C. Misa, D. Guse, O. Hohlfeld, R. Durairajan, A. Sperotto, A. Dainotti, R. Rejaie
ACM SIGCOMM Computer Communication Review, Vol. 50 Issue 3, July 2020

Open collaborative hyperpapers: a call to action (pdf)
A. Dainotti, R. Holz, M. Kühlewind, A. Lutu, J. Sommers, B. Trammell
ACM SIGCOMM Computer Communication Review, Vol. 49 Issue 1, January 2019, Pages 31-33

A Survey among Network Operators on BGP Prefix Hijacking (pdf)
P. Sermpezis, V. Kotronis, A. Dainotti, and X. Dimitropoulos
ACM SIGCOMM Computer Communication Review, Vol. 48 Issue 1, January 2018, Pages 64-69

The BGP Hackathon 2016 Report (pdf)
A. Dainotti, E. Katz-Bassett, and X. Dimitropoulos
ACM SIGCOMM Computer Communication Review, Vol. 46 Issue 3, July 2016

  Last Modified: Mon Oct-26-2020 04:56:03 UTC
  Page URL: https://www.caida.org/~alberto/publications_c.xml