Internet topology discovery: a survey

B Donnet, T Friedman - IEEE Communications Surveys & …, 2007 - ieeexplore.ieee.org
Since the beginning of the nineties, the internet has undergone impressive growth. This
growth can be appreciated in terms of the equipment, such as routers and links, that has …

Network topologies: inference, modeling, and generation

H Haddadi, M Rio, G Iannaccone… - … Surveys & Tutorials, 2008 - ieeexplore.ieee.org
Accurate measurement, inference and modeling techniques are fundamental to Internet
topology research. Spatial analysis of the Internet is needed to develop network planning …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

A model of Internet topology using k-shell decomposition

S Carmi, S Havlin, S Kirkpatrick… - Proceedings of the …, 2007 - National Acad Sciences
We study a map of the Internet (at the autonomous systems level), by introducing and using
the method of k-shell decomposition and the methods of percolation theory and fractal …

AS relationships, customer cones, and validation

M Luckie, B Huffaker, A Dhamdhere, V Giotsas… - Proceedings of the …, 2013 - dl.acm.org
Business relationships between ASes in the Internet are typically confidential, yet
knowledge of them is essential to understand many aspects of Internet structure …

The rich-club phenomenon in the internet topology

S Zhou, RJ Mondragón - IEEE communications letters, 2004 - ieeexplore.ieee.org
We show that the Internet topology at the autonomous system (AS) level has a rich-club
phenomenon. The rich nodes, which are a small number of nodes with large numbers of …

Stable Internet routing without global coordination

L Gao, J Rexford - IEEE/ACM Transactions on networking, 2001 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) allows an autonomous system (AS) to apply diverse
local policies for selecting routes and propagating reachability information to other domains …

Analyzing peer-to-peer traffic across large networks

S Sen, J Wang - Proceedings of the 2nd ACM SIGCOMM Workshop on …, 2002 - dl.acm.org
The use of peer-to-peer (P2P) applications is growing dramaticaliy, particularly for sharing
large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

A data-driven method for future Internet route decision modeling

Z Tian, S Su, W Shi, X Du, M Guizani, X Yu - Future Generation Computer …, 2019 - Elsevier
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone
network routing behavior, locating network failure and, evaluating network performance for …