Security for 5G and beyond
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …
connect almost all aspects of life through the network with much higher speed, very low …
Data-driven cybersecurity incident prediction: A survey
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …
recent years we have witnessed a paradigm shift in understanding and defending against …
A clean slate 4D approach to network control and management
A Greenberg, G Hjalmtysson, DA Maltz… - ACM SIGCOMM …, 2005 - dl.acm.org
Today's data networks are surprisingly fragile and difficult to manage. We argue that the root
of these problems lies in the complexity of the control and management planes--the software …
of these problems lies in the complexity of the control and management planes--the software …
Debugging the data plane with anteater
Diagnosing problems in networks is a time-consuming and error-prone process. Existing
tools to assist operators primarily focus on analyzing control plane configuration …
tools to assist operators primarily focus on analyzing control plane configuration …
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each
other, allowing nodes to communicate beyond their direct wireless transmission range …
other, allowing nodes to communicate beyond their direct wireless transmission range …
Why do Internet services fail, and what can be done about it?
D Oppenheimer, A Ganapathi… - 4th Usenix Symposium on …, 2003 - usenix.org
In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems
and the techniques Tandem used to prevent such failures See J. Gray. Why do computers …
and the techniques Tandem used to prevent such failures See J. Gray. Why do computers …
Understanding the network-level behavior of spammers
A Ramachandran, N Feamster - Proceedings of the 2006 conference on …, 2006 - dl.acm.org
This paper studies the network-level behavior of spammers, including: IP address ranges
that send the most spam, common spamming modes (eg, BGP route hijacking, bots), how …
that send the most spam, common spamming modes (eg, BGP route hijacking, bots), how …
A general approach to network configuration analysis
A Fogel, S Fung, L Pedrosa… - … USENIX Symposium on …, 2015 - usenix.org
We present an approach to detect network configuration errors, which combines the benefits
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
Evolve or die: High-availability design principles drawn from googles network infrastructure
R Govindan, I Minei, M Kallahalla, B Koley… - Proceedings of the 2016 …, 2016 - dl.acm.org
Maintaining the highest levels of availability for content providers is challenging in the face
of scale, network evolution and complexity. Little, however, is known about failures large …
of scale, network evolution and complexity. Little, however, is known about failures large …
Machine learning meets communication networks: Current trends and future challenges
The growing network density and unprecedented increase in network traffic, caused by the
massively expanding number of connected devices and online services, require intelligent …
massively expanding number of connected devices and online services, require intelligent …