LIFEGUARD: Practical repair of persistent route failures
The Internet was designed to always find a route if there is a policy-compliant path.
However, in many cases, connectivity is disrupted despite the existence of an underlying …
However, in many cases, connectivity is disrupted despite the existence of an underlying …
Yarrp'ing the Internet: Randomized high-speed active topology discovery
R Beverly - Proceedings of the 2016 Internet Measurement …, 2016 - dl.acm.org
Obtaining a" snapshot" of the Internet topology remains an elusive task. Existing active
topology discovery techniques and systems require significant probing time--time during …
topology discovery techniques and systems require significant probing time--time during …
Defending tor from network adversaries: A case study of network path prediction
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by
autonomous systems and Internet exchanges, which can observe different overlay hops …
autonomous systems and Internet exchanges, which can observe different overlay hops …
Predicting user activity level in social networks
The study of users' social behaviors has gained much research attention since the advent of
various social media such as Facebook, Renren and Twitter. A major kind of applications is …
various social media such as Facebook, Renren and Twitter. A major kind of applications is …
Lightweight trilinear pooling based tensor completion for network traffic monitoring
Y Ouyang, K Xie, X Wang, J Wen… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Network traffic engineering and anomaly detection rely heavily on network traffic
measurement. Due to the lack of infrastructure to measure all points of interest, the high …
measurement. Due to the lack of infrastructure to measure all points of interest, the high …
Sibyl: a practical Internet route oracle
Network operators measure Internet routes to troubleshoot problems, and researchers
measure routes to characterize the Internet. However, they still rely on decades-old tools like …
measure routes to characterize the Internet. However, they still rely on decades-old tools like …
Deep adversarial tensor completion for accurate network traffic measurement
Network trouble shooting, failure location, and anomaly detection rely heavily on network
traffic measurement data. Due to the lack of measurement infrastructure, the high …
traffic measurement data. Due to the lack of measurement infrastructure, the high …
Neural tensor completion for accurate network monitoring
Monitoring the performance of a large network is very costly. Instead, a subset of paths or
time intervals of the network can be measured while inferring the remaining network data by …
time intervals of the network can be measured while inferring the remaining network data by …
Malicious sniffing systems detection platform
Z Trabelsi, H Rahmani, K Kaouech… - … on Applications and …, 2004 - ieeexplore.ieee.org
Among various types of attacks on an Ethernet network, a" sniffing attack" is probably one of
the most difficult attacks to handle. Sniffers are programs that allow a host to capture any …
the most difficult attacks to handle. Sniffers are programs that allow a host to capture any …
On the delay performance in a large-scale wireless sensor network: Measurement, analysis, and implications
We present a comprehensive delay performance measurement and analysis in a large-
scale wireless sensor network. We build a lightweight delay measurement system and …
scale wireless sensor network. We build a lightweight delay measurement system and …