A survey on big data for network traffic monitoring and analysis

A D'Alconzo, I Drago, A Morichetta… - … on Network and …, 2019 - ieeexplore.ieee.org
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …

Five years at the edge: Watching internet from the isp network

M Trevisan, D Giordano, I Drago, M Mellia… - Proceedings of the 14th …, 2018 - dl.acm.org
The Internet and the way people use it are constantly changing. Knowing traffic is crucial for
operating the network, understanding users' need, and ultimately improving applications …

A stealthier partitioning attack against bitcoin peer-to-peer network

M Tran, I Choi, GJ Moon, AV Vu… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …

A survey on approaches to reduce BGP interdomain routing convergence delay on the Internet

RB da Silva, ES Mota - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
The Internet interdomain routing protocol (border gateway protocol) exhibits slow
convergence. Many Internet applications suffer from the effects of its high convergence …

ARTEMIS: Neutralizing BGP hijacking within a minute

P Sermpezis, V Kotronis, P Gigis… - … ACM transactions on …, 2018 - ieeexplore.ieee.org
Border gateway protocol (BGP) prefix hijacking is a critical threat to Internet organizations
and users. Despite the availability of several defense approaches (ranging from RPKI to …

Bamboozling certificate authorities with {BGP}

H Birge-Lee, Y Sun, A Edmundson, J Rexford… - 27th USENIX Security …, 2018 - usenix.org
The Public Key Infrastructure (PKI) protects users from malicious man-in-the-middle attacks
by having trusted Certificate Authorities (CAs) vouch for the domain names of servers on the …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

BGP hijacking classification

S Cho, R Fontugne, K Cho, A Dainotti… - 2019 Network Traffic …, 2019 - ieeexplore.ieee.org
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows
malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing …

Inferring BGP blackholing activity in the internet

V Giotsas, G Smaragdakis, C Dietzel, P Richter… - Proceedings of the …, 2017 - dl.acm.org
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to
exchange reachability information among networks in the Internet. However, little is known …

Detecting peering infrastructure outages in the wild

V Giotsas, C Dietzel, G Smaragdakis… - Proceedings of the …, 2017 - dl.acm.org
Peering infrastructures, namely, colocation facilities and Internet exchange points, are
located in every major city, have hundreds of network members, and support hundreds of …