Internet topology discovery: a survey
Since the beginning of the nineties, the internet has undergone impressive growth. This
growth can be appreciated in terms of the equipment, such as routers and links, that has …
growth can be appreciated in terms of the equipment, such as routers and links, that has …
Network topologies: inference, modeling, and generation
Accurate measurement, inference and modeling techniques are fundamental to Internet
topology research. Spatial analysis of the Internet is needed to develop network planning …
topology research. Spatial analysis of the Internet is needed to develop network planning …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
A model of Internet topology using k-shell decomposition
We study a map of the Internet (at the autonomous systems level), by introducing and using
the method of k-shell decomposition and the methods of percolation theory and fractal …
the method of k-shell decomposition and the methods of percolation theory and fractal …
AS relationships, customer cones, and validation
Business relationships between ASes in the Internet are typically confidential, yet
knowledge of them is essential to understand many aspects of Internet structure …
knowledge of them is essential to understand many aspects of Internet structure …
The rich-club phenomenon in the internet topology
We show that the Internet topology at the autonomous system (AS) level has a rich-club
phenomenon. The rich nodes, which are a small number of nodes with large numbers of …
phenomenon. The rich nodes, which are a small number of nodes with large numbers of …
Stable Internet routing without global coordination
The Border Gateway Protocol (BGP) allows an autonomous system (AS) to apply diverse
local policies for selecting routes and propagating reachability information to other domains …
local policies for selecting routes and propagating reachability information to other domains …
Analyzing peer-to-peer traffic across large networks
The use of peer-to-peer (P2P) applications is growing dramaticaliy, particularly for sharing
large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow …
large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow …
A survey of BGP security issues and solutions
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
A data-driven method for future Internet route decision modeling
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone
network routing behavior, locating network failure and, evaluating network performance for …
network routing behavior, locating network failure and, evaluating network performance for …