O peer, where art thou? Uncovering remote peering interconnections at IXPs

G Nomikos, V Kotronis, P Sermpezis, P Gigis… - Proceedings of the …, 2018 - dl.acm.org
Internet eXchange Points (IXPs) are Internet hubs that mainly provide the switching
infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs …

UniSAV: A Unified Framework for Internet-Scale Source Address Validation

L Qin, L Liu, L Chen, D Li, Y Shi, H Yang - Proceedings of the 2024 …, 2024 - dl.acm.org
To mitigate the threats of source address spoofing, many source address validation (SAV)
solutions have been proposed over the past few years. However, none of them are widely …

[PDF][PDF] Characterizing international bgp detours

A Shah, C Papadopoulos - … Report CS-15–104, Colorado State …, 2015 - cs.colostate.edu
There are currently no requirements (technical or otherwise) that BGP paths must be
contained within national boundaries. Indeed, some paths experience international detours …

Server notaries: a complementary approach to the web PKI trust model

E Yüce, AA Selçuk - IET Information Security, 2018 - Wiley Online Library
Secure socket layer/transport layer security (TLS) is the de facto protocol for providing
secure communications over the Internet. It relies on the web PKI<? show [AQ ID= Q1]?> …

Selective focus as a means of improving geographically distributed embedded system co-simulation

K Hines, G Borriello - … Shortening the Path from Specification to …, 1997 - ieeexplore.ieee.org
When dealing with communication-intensive systems, hardware/software co-simulation
usually either requires the communication to be simulated with a uniformly lour level of detail …

[PDF][PDF] Netcalls: End host function calls to network traffic processing services

J Sherry, DC Kim, SS Mahalingam, A Tang, S Wang… - 2012 - eecs.berkeley.edu
Function calls are a basic primitive by which applications invoke services from external
entities. In this paper, we propose “network calls”(netcalls), a general primitive to invoke …

Improved calculation of as resilience against ip prefix hijacking

M Wübbeling, M Meier - 2016 IEEE 41st Conference on Local …, 2016 - ieeexplore.ieee.org
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the
recent past have shown that even small autonomous systems (ASs) are able to manipulate …

[PDF][PDF] Future architectures for middlebox processing services on the Internet and in the cloud

J Sherry - Master's theSIS, EECS Department, University of …, 2012 - Citeseer
Middleboxes, such as caches, firewalls, and intrusion detection systems, form a vital part of
network infrastructure today. Administrators deploy middleboxes in diverse scenarios from …

Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor

A Mitseva, M Aleksandrova, A Panchenko - Computers & Security, 2023 - Elsevier
Tor is the most popular anonymization network with millions of daily users. This makes it an
attractive target for attacks, eg, by malicious autonomous systems (ASs) performing active …

Research on AS path betweenness based filtering policy against BGP prefix hijacking

L Yu**g, L Yuan, B Zhang… - The 2nd International …, 2010 - ieeexplore.ieee.org
BGP prefix hijacking is a sort of security threaten of the Internet. The current effort on
hijacking defense is to deploy filters for hijacking route on the edge of the Internet. In order to …