A comprehensive survey on internet outages

G Aceto, A Botta, P Marchetta, V Persico… - Journal of Network and …, 2018 - Elsevier
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

Leveraging existing instrumentation to automatically infer invariant-constrained models

I Beschastnikh, Y Brun, S Schneider, M Sloan… - Proceedings of the 19th …, 2011 - dl.acm.org
Computer systems are often difficult to debug and understand. A common way of gaining
insight into system behavior is to inspect execution logs and documentation. Unfortunately …

Analyzing the Great Firewall of China over space and time

R Ensafi, P Winter, A Mueen… - Proceedings on privacy …, 2015 - petsymposium.org
A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements
many different types of censorship and content filtering to control China's Internet traffic. Past …

Scamper: a scalable and extensible packet prober for active measurement of the internet

M Luckie - Proceedings of the 10th ACM SIGCOMM conference …, 2010 - dl.acm.org
Large scale active measurement of the Internet requires appropriate software support. The
better tools that we have for executing consistent and systematic measurements, the more …

Revealing middlebox interference with tracebox

G Detal, B Hesmans, O Bonaventure… - Proceedings of the …, 2013 - dl.acm.org
Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly
important role in various types of IP networks, including enterprise and cellular networks …

LIFEGUARD: Practical repair of persistent route failures

E Katz-Bassett, C Scott, DR Choffnes, Í Cunha… - ACM SIGCOMM …, 2012 - dl.acm.org
The Internet was designed to always find a route if there is a policy-compliant path.
However, in many cases, connectivity is disrupted despite the existence of an underlying …

Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering

A Reuter, R Bush, I Cunha, E Katz-Bassett… - ACM SIGCOMM …, 2018 - dl.acm.org
A proposal to improve routing security---Route Origin Authorization (ROA)---has been
standardized. A ROA specifies which network is allowed to announce a set of Internet …

Dasu: Pushing Experiments to the {Internet's} Edge

MA Sánchez, JS Otto, ZS Bischof, DR Choffnes… - … USENIX Symposium on …, 2013 - usenix.org
We present Dasu, a measurement experimentation platform for the Internet's edge. Dasu
supports both controlled network experimentation and broadband characterization, building …

Xron: A hybrid elastic cloud overlay network for video conferencing at planetary scale

B Wu, K Qian, B Li, Y Ma, Q Zhang, Z Jiang… - Proceedings of the …, 2023 - dl.acm.org
Quality and cost are two key considerations for video conferencing services. Service
providers face a dilemma when selecting network tiers to build their infrastructure---relying …