A survey of fast-recovery mechanisms in packet-switched networks
In order to meet their stringent dependability requirements, most modern packet-switched
communication networks support fast-recovery mechanisms in the data plane. While …
communication networks support fast-recovery mechanisms in the data plane. While …
BGP anomaly detection techniques: A survey
The border gateway protocol (BGP) is the Internet's default inter-domain routing protocol that
manages connectivity among autonomous systems (ASes). Over the past two decades many …
manages connectivity among autonomous systems (ASes). Over the past two decades many …
Debugging the data plane with anteater
Diagnosing problems in networks is a time-consuming and error-prone process. Existing
tools to assist operators primarily focus on analyzing control plane configuration …
tools to assist operators primarily focus on analyzing control plane configuration …
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to
evaluate their protocols and services in a realistic environment that also provides a high …
evaluate their protocols and services in a realistic environment that also provides a high …
Blink: Fast connectivity recovery entirely in the data plane
In this paper, we explore new possibilities, created by programmable switches, for fast
rerouting upon signals triggered by Internet traffic disruptions. We present Blink, a data …
rerouting upon signals triggered by Internet traffic disruptions. We present Blink, a data …
Moving beyond end-to-end path information to optimize CDN performance
R Krishnan, HV Madhyastha, S Srinivasan… - Proceedings of the 9th …, 2009 - dl.acm.org
Replicating content across a geographically distributed set of servers and redirecting clients
to the closest server in terms of latency has emerged as a common paradigm for improving …
to the closest server in terms of latency has emerged as a common paradigm for improving …
FireCol: a collaborative protection network for the detection of flooding DDoS attacks
Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation
of which is very hard especially when it comes to highly distributed botnet-based attacks …
of which is very hard especially when it comes to highly distributed botnet-based attacks …
[PDF][PDF] Planetseer: Internet path failure monitoring and characterization in wide-area services.
Detecting network path anomalies generally requires examining large volumes of traffic data
to find misbehavior. We observe that wide-area services, such as peerto-peer systems and …
to find misbehavior. We observe that wide-area services, such as peerto-peer systems and …
ROFL: routing on flat labels
It is accepted wisdom that the current Internet architecture conflates network locations and
host identities, but there is no agreement on how a future architecture should distinguish the …
host identities, but there is no agreement on how a future architecture should distinguish the …
10 lessons from 10 years of measuring and modeling the internet's autonomous systems
Formally, the Internet inter-domain routing system is a collection of networks, their policies,
peering relationships and organizational affiliations, and the addresses they advertize. It …
peering relationships and organizational affiliations, and the addresses they advertize. It …