QoE management of multimedia streaming services in future networks: A tutorial and survey

AA Barakabitze, N Barman, A Ahmad… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The highly demanding Over-The-Top (OTT) multimedia applications pose increased
challenges to Internet Service Providers (ISPs) for assuring a reasonable Quality of …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

A stealthier partitioning attack against bitcoin peer-to-peer network

M Tran, I Choi, GJ Moon, AV Vu… - 2020 IEEE symposium …, 2020 - ieeexplore.ieee.org
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …

[책][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …

Why is it taking so long to secure internet routing?

S Goldberg - Communications of the ACM, 2014 - dl.acm.org
Why is it taking so long to secure internet routing? Page 1 56 COMMUNICATIONS OF THE
ACM | OCTOBER 2014 | VOL. 57 | NO. 10 practice DOI:10.1145/2659899 Article development …

Peering at peerings: On the role of IXP route servers

P Richter, G Smaragdakis, A Feldmann… - Proceedings of the …, 2014 - dl.acm.org
During the last few years, more and more of the medium-to-large Internet eXchange Points
(IXP) around the world have started to operate a route server and offer its use as a free value …

BGP security in partial deployment: Is the juice worth the squeeze?

R Lychev, S Goldberg, M Schapira - Proceedings of the ACM SIGCOMM …, 2013 - dl.acm.org
As the rollout of secure route origin authentication with the RPKI slowly gains traction among
network operators, there is a push to standardize secure path validation for BGP (ie, S* BGP …

Investigating interdomain routing policies in the wild

R Anwar, H Niaz, D Choffnes, Í Cunha, P Gill… - Proceedings of the …, 2015 - dl.acm.org
Models of Internet routing are critical for studies of Internet security, reliability and evolution,
which often rely on simulations of the Internet's routing system. Accurate models are difficult …

A System to Detect {Forged-Origin}{BGP} Hijacks

T Holterbach, T Alfroy, A Phokeer, A Dainotti… - … USENIX Symposium on …, 2024 - usenix.org
Despite global efforts to secure Internet routing, attackers still successfully exploit the lack of
strong BGP security mechanisms. This paper focuses on an attack vector that is frequently …