In this paper we collect and analyze traceroute measurements to show that large content providers (eg, Google, Microsoft, Yahoo!) are deploying their own wide-area networks …
Z Duan, X Yuan… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the …
Y He, G Siganos, M Faloutsos… - … /ACM Transactions On …, 2008 - ieeexplore.ieee.org
The topology of the Internet at the autonomous system (AS) level is not yet fully discovered despite significant research activity. The community still does not know how many links are …
The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge, or …
The growing demand for an ever-increasing number of cloud services is profoundly transforming the Internet's interconnection or peering ecosystem, and one example is the …
The popularity of the Internet and the boom of the World Wide Web foster innovative changes in software technology that give birth to a new form of software—networked …
Network researchers often need to evaluate newly proposed algorithms and protocols over realistic topologies. Many researchers use random networks for such evaluations …
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-domain …
Inferring AS-level end-to-end paths can be a valuable tool for both network operators and researchers. A widely known technique for inferring end-to-end paths is to perform …