O peer, where art thou? Uncovering remote peering interconnections at IXPs
Internet eXchange Points (IXPs) are Internet hubs that mainly provide the switching
infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs …
infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs …
UniSAV: A Unified Framework for Internet-Scale Source Address Validation
To mitigate the threats of source address spoofing, many source address validation (SAV)
solutions have been proposed over the past few years. However, none of them are widely …
solutions have been proposed over the past few years. However, none of them are widely …
[PDF][PDF] Characterizing international bgp detours
There are currently no requirements (technical or otherwise) that BGP paths must be
contained within national boundaries. Indeed, some paths experience international detours …
contained within national boundaries. Indeed, some paths experience international detours …
Server notaries: a complementary approach to the web PKI trust model
Secure socket layer/transport layer security (TLS) is the de facto protocol for providing
secure communications over the Internet. It relies on the web PKI<? show [AQ ID= Q1]?> …
secure communications over the Internet. It relies on the web PKI<? show [AQ ID= Q1]?> …
Selective focus as a means of improving geographically distributed embedded system co-simulation
K Hines, G Borriello - … Shortening the Path from Specification to …, 1997 - ieeexplore.ieee.org
When dealing with communication-intensive systems, hardware/software co-simulation
usually either requires the communication to be simulated with a uniformly lour level of detail …
usually either requires the communication to be simulated with a uniformly lour level of detail …
[PDF][PDF] Netcalls: End host function calls to network traffic processing services
J Sherry, DC Kim, SS Mahalingam, A Tang, S Wang… - 2012 - eecs.berkeley.edu
Function calls are a basic primitive by which applications invoke services from external
entities. In this paper, we propose “network calls”(netcalls), a general primitive to invoke …
entities. In this paper, we propose “network calls”(netcalls), a general primitive to invoke …
Improved calculation of as resilience against ip prefix hijacking
M Wübbeling, M Meier - 2016 IEEE 41st Conference on Local …, 2016 - ieeexplore.ieee.org
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the
recent past have shown that even small autonomous systems (ASs) are able to manipulate …
recent past have shown that even small autonomous systems (ASs) are able to manipulate …
[PDF][PDF] Future architectures for middlebox processing services on the Internet and in the cloud
J Sherry - Master's theSIS, EECS Department, University of …, 2012 - Citeseer
Middleboxes, such as caches, firewalls, and intrusion detection systems, form a vital part of
network infrastructure today. Administrators deploy middleboxes in diverse scenarios from …
network infrastructure today. Administrators deploy middleboxes in diverse scenarios from …
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor
A Mitseva, M Aleksandrova, A Panchenko - Computers & Security, 2023 - Elsevier
Tor is the most popular anonymization network with millions of daily users. This makes it an
attractive target for attacks, eg, by malicious autonomous systems (ASs) performing active …
attractive target for attacks, eg, by malicious autonomous systems (ASs) performing active …
Research on AS path betweenness based filtering policy against BGP prefix hijacking
L Yu**g, L Yuan, B Zhang… - The 2nd International …, 2010 - ieeexplore.ieee.org
BGP prefix hijacking is a sort of security threaten of the Internet. The current effort on
hijacking defense is to deploy filters for hijacking route on the edge of the Internet. In order to …
hijacking defense is to deploy filters for hijacking route on the edge of the Internet. In order to …