Network measurement methods for locating and examining censorship devices
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …
censorship devices that can perform large-scale, highly-performant content blocking. While …
Edgenet: A multi-tenant and multi-provider edge cloud
EdgeNet is a public Kubernetes cluster dedicated to network and distributed systems
research, supporting experiments that are deployed concurrently by independent groups. Its …
research, supporting experiments that are deployed concurrently by independent groups. Its …
{Diamond-Miner}: Comprehensive Discovery of the Internet's Topology Diamonds
Despite the well-known existence of load-balanced forwarding paths in the Internet, current
active topology Internet-wide mapping efforts are multipath agnostic—largely because of the …
active topology Internet-wide mapping efforts are multipath agnostic—largely because of the …
Routing loops as mega amplifiers for dns-based ddos attacks
DDoS attacks are one of the biggest threats to the modern Internet as their magnitude is
constantly increasing. They are highly effective because of the amplification and reflection …
constantly increasing. They are highly effective because of the amplification and reflection …
Chinese wall or Swiss cheese? Keyword filtering in the great firewall of China
The Great Firewall of China (GFW) prevents Chinese citizens from accessing online content
deemed objectionable by the Chinese government. One way it does this is to search for …
deemed objectionable by the Chinese government. One way it does this is to search for …
6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery
Topology discovery can infer the interconnection relationship between network entities. A
complete network topology is of great significance for network security analysis, application …
complete network topology is of great significance for network security analysis, application …
Internet scale reverse traceroute
Knowledge of Internet paths allows operators and researchers to better understand the
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …
Flashroute: Efficient traceroute on a massive scale
Y Huang, M Rabinovich, R Al-Dalky - Proceedings of the ACM Internet …, 2020 - dl.acm.org
We propose a new traceroute tool, FlashRoute for efficient large-scale topology discovery.
FlashRoute reduces the time required for tracerouting the entire/24 IPv4 address space by a …
FlashRoute reduces the time required for tracerouting the entire/24 IPv4 address space by a …
Replication: Towards a publicly available internet scale ip geolocation dataset
IP geolocation is one of the most widely used forms of metadata for IP addresses, and
despite almost twenty years of effort from the research community, the reality is that there is …
despite almost twenty years of effort from the research community, the reality is that there is …
Digging the underlying layers of intelligent transportation system networks by mobile crowdsourcing
G Fei, L Yu, M Alazab, S Wen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Understanding the underlying topologies of networks is very important for improving their
performance and security, especially in Intelligent Transportation Systems (ITS). Anonymous …
performance and security, especially in Intelligent Transportation Systems (ITS). Anonymous …