A survey of techniques for internet topology discovery

R Motamedi, R Rejaie… - … Communications Surveys & …, 2014 - ieeexplore.ieee.org
Capturing an accurate view of the Internet topology is of great interest to the networking
research community as it has many uses ranging from the design and evaluation of new …

The flattening internet topology: Natural evolution, unsightly barnacles or contrived collapse?

P Gill, M Arlitt, Z Li, A Mahanti - … , PAM 2008, Cleveland, OH, USA, April 29 …, 2008 - Springer
In this paper we collect and analyze traceroute measurements to show that large content
providers (eg, Google, Microsoft, Yahoo!) are deploying their own wide-area networks …

Controlling IP spoofing through interdomain packet filters

Z Duan, X Yuan… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the
Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the …

Lord of the links: a framework for discovering missing links in the internet topology

Y He, G Siganos, M Faloutsos… - … /ACM Transactions On …, 2008 - ieeexplore.ieee.org
The topology of the Internet at the autonomous system (AS) level is not yet fully discovered
despite significant research activity. The community still does not know how many links are …

[PDF][PDF] Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates.

Z Duan, X Yuan, J Chandrashekar - INFOCOM, 2006 - cs.fsu.edu
The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of
the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge, or …

How cloud traffic goes hiding: A study of amazon's peering fabric

B Yeganeh, R Durairajan, R Rejaie… - Proceedings of the …, 2019 - dl.acm.org
The growing demand for an ever-increasing number of cloud services is profoundly
transforming the Internet's interconnection or peering ecosystem, and one example is the …

[PDF][PDF] 网络化软件的复杂网络特性实证

马于涛, 何克清, 李兵, 刘婧 - 软件学报, 2011 - jos.org.cn
The popularity of the Internet and the boom of the World Wide Web foster innovative
changes in software technology that give birth to a new form of software—networked …

IGen: Generation of router-level Internet topologies through network design heuristics

B Quoitin, V Van den Schrieck… - 2009 21st …, 2009 - ieeexplore.ieee.org
Network researchers often need to evaluate newly proposed algorithms and protocols over
realistic topologies. Many researchers use random networks for such evaluations …

[PDF][PDF] A Systematic Framework for Unearthing the Missing Links: Measurements and Impact.

Y He, G Siganos, M Faloutsos, SV Krishnamurthy - NSDI, 2007 - usenix.org
The lack of an accurate representation of the Internet topology at the Autonomous System
(AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-domain …

Cam04-4: As path inference by exploiting known as paths

J Qiu, L Gao - IEEE Globecom 2006, 2006 - ieeexplore.ieee.org
Inferring AS-level end-to-end paths can be a valuable tool for both network operators and
researchers. A widely known technique for inferring end-to-end paths is to perform …