LIFEGUARD: Practical repair of persistent route failures

E Katz-Bassett, C Scott, DR Choffnes, Í Cunha… - ACM SIGCOMM …, 2012 - dl.acm.org
The Internet was designed to always find a route if there is a policy-compliant path.
However, in many cases, connectivity is disrupted despite the existence of an underlying …

Yarrp'ing the Internet: Randomized high-speed active topology discovery

R Beverly - Proceedings of the 2016 Internet Measurement …, 2016 - dl.acm.org
Obtaining a" snapshot" of the Internet topology remains an elusive task. Existing active
topology discovery techniques and systems require significant probing time--time during …

Defending tor from network adversaries: A case study of network path prediction

J Juen, A Johnson, A Das, N Borisov… - arXiv preprint arXiv …, 2014 - arxiv.org
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by
autonomous systems and Internet exchanges, which can observe different overlay hops …

Predicting user activity level in social networks

Y Zhu, E Zhong, SJ Pan, X Wang, M Zhou… - Proceedings of the 22nd …, 2013 - dl.acm.org
The study of users' social behaviors has gained much research attention since the advent of
various social media such as Facebook, Renren and Twitter. A major kind of applications is …

Lightweight trilinear pooling based tensor completion for network traffic monitoring

Y Ouyang, K Xie, X Wang, J Wen… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Network traffic engineering and anomaly detection rely heavily on network traffic
measurement. Due to the lack of infrastructure to measure all points of interest, the high …

Sibyl: a practical Internet route oracle

Í Cunha, P Marchetta, M Calder, YC Chiu… - … USENIX Symposium on …, 2016 - usenix.org
Network operators measure Internet routes to troubleshoot problems, and researchers
measure routes to characterize the Internet. However, they still rely on decades-old tools like …

Deep adversarial tensor completion for accurate network traffic measurement

K Xie, Y Ouyang, X Wang, G Xie, K Li… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
Network trouble shooting, failure location, and anomaly detection rely heavily on network
traffic measurement data. Due to the lack of measurement infrastructure, the high …

Neural tensor completion for accurate network monitoring

K Xie, H Lu, X Wang, G Xie, Y Ding… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
Monitoring the performance of a large network is very costly. Instead, a subset of paths or
time intervals of the network can be measured while inferring the remaining network data by …

Malicious sniffing systems detection platform

Z Trabelsi, H Rahmani, K Kaouech… - … on Applications and …, 2004 - ieeexplore.ieee.org
Among various types of attacks on an Ethernet network, a" sniffing attack" is probably one of
the most difficult attacks to handle. Sniffers are programs that allow a host to capture any …

On the delay performance in a large-scale wireless sensor network: Measurement, analysis, and implications

J Wang, W Dong, Z Cao, Y Liu - IEEE/ACM Transactions on …, 2014 - ieeexplore.ieee.org
We present a comprehensive delay performance measurement and analysis in a large-
scale wireless sensor network. We build a lightweight delay measurement system and …