Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022 - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

Edgenet: A multi-tenant and multi-provider edge cloud

BC Şenel, M Mouchet, J Cappos, O Fourmaux… - Proceedings of the 4th …, 2021 - dl.acm.org
EdgeNet is a public Kubernetes cluster dedicated to network and distributed systems
research, supporting experiments that are deployed concurrently by independent groups. Its …

{Diamond-Miner}: Comprehensive Discovery of the Internet's Topology Diamonds

K Vermeulen, JP Rohrer, R Beverly… - … USENIX Symposium on …, 2020 - usenix.org
Despite the well-known existence of load-balanced forwarding paths in the Internet, current
active topology Internet-wide mapping efforts are multipath agnostic—largely because of the …

Routing loops as mega amplifiers for dns-based ddos attacks

Y Nosyk, M Korczyński, A Duda - International Conference on Passive and …, 2022 - Springer
DDoS attacks are one of the biggest threats to the modern Internet as their magnitude is
constantly increasing. They are highly effective because of the amplification and reflection …

Chinese wall or Swiss cheese? Keyword filtering in the great firewall of China

Z Weinberg, D Barradas, N Christin - Proceedings of the Web …, 2021 - dl.acm.org
The Great Firewall of China (GFW) prevents Chinese citizens from accessing online content
deemed objectionable by the Chinese government. One way it does this is to search for …

6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery

N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A
complete network topology is of great significance for network security analysis, application …

Internet scale reverse traceroute

K Vermeulen, E Gurmericliler, I Cunha… - Proceedings of the …, 2022 - dl.acm.org
Knowledge of Internet paths allows operators and researchers to better understand the
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …

Flashroute: Efficient traceroute on a massive scale

Y Huang, M Rabinovich, R Al-Dalky - Proceedings of the ACM Internet …, 2020 - dl.acm.org
We propose a new traceroute tool, FlashRoute for efficient large-scale topology discovery.
FlashRoute reduces the time required for tracerouting the entire/24 IPv4 address space by a …

Replication: Towards a publicly available internet scale ip geolocation dataset

O Darwich, H Rimlinger, M Dreyfus, M Gouel… - Proceedings of the …, 2023 - dl.acm.org
IP geolocation is one of the most widely used forms of metadata for IP addresses, and
despite almost twenty years of effort from the research community, the reality is that there is …

Digging the underlying layers of intelligent transportation system networks by mobile crowdsourcing

G Fei, L Yu, M Alazab, S Wen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Understanding the underlying topologies of networks is very important for improving their
performance and security, especially in Intelligent Transportation Systems (ITS). Anonymous …