A comprehensive survey on internet outages
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse,
they are poorly understood, while a deep understanding of them is essential for …
they are poorly understood, while a deep understanding of them is essential for …
Survey and taxonomy of adversarial reconnaissance techniques
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …
vulnerabilities in people and systems. The key to the success of these attacks is information …
Leveraging existing instrumentation to automatically infer invariant-constrained models
Computer systems are often difficult to debug and understand. A common way of gaining
insight into system behavior is to inspect execution logs and documentation. Unfortunately …
insight into system behavior is to inspect execution logs and documentation. Unfortunately …
Analyzing the Great Firewall of China over space and time
A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements
many different types of censorship and content filtering to control China's Internet traffic. Past …
many different types of censorship and content filtering to control China's Internet traffic. Past …
Scamper: a scalable and extensible packet prober for active measurement of the internet
M Luckie - Proceedings of the 10th ACM SIGCOMM conference …, 2010 - dl.acm.org
Large scale active measurement of the Internet requires appropriate software support. The
better tools that we have for executing consistent and systematic measurements, the more …
better tools that we have for executing consistent and systematic measurements, the more …
Revealing middlebox interference with tracebox
G Detal, B Hesmans, O Bonaventure… - Proceedings of the …, 2013 - dl.acm.org
Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly
important role in various types of IP networks, including enterprise and cellular networks …
important role in various types of IP networks, including enterprise and cellular networks …
LIFEGUARD: Practical repair of persistent route failures
The Internet was designed to always find a route if there is a policy-compliant path.
However, in many cases, connectivity is disrupted despite the existence of an underlying …
However, in many cases, connectivity is disrupted despite the existence of an underlying …
Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering
A proposal to improve routing security---Route Origin Authorization (ROA)---has been
standardized. A ROA specifies which network is allowed to announce a set of Internet …
standardized. A ROA specifies which network is allowed to announce a set of Internet …
Dasu: Pushing Experiments to the {Internet's} Edge
We present Dasu, a measurement experimentation platform for the Internet's edge. Dasu
supports both controlled network experimentation and broadband characterization, building …
supports both controlled network experimentation and broadband characterization, building …
Xron: A hybrid elastic cloud overlay network for video conferencing at planetary scale
Quality and cost are two key considerations for video conferencing services. Service
providers face a dilemma when selecting network tiers to build their infrastructure---relying …
providers face a dilemma when selecting network tiers to build their infrastructure---relying …