A He, X Li, J Fu, H Hu, K Bu, C Miao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Path validation has already been incrementally deployed in the Internet architecture. It secures packet forwarding by enabling end hosts to negotiate specific forwarding paths and …
N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A complete network topology is of great significance for network security analysis, application …
F Hilal, O Gasser - Proceedings of the ACM on Networking, 2023 - dl.acm.org
The end-to-end principle is one of the foundations of the original Internet architecture. This principle is put to the test by middleboxes, ie, devices which change important parts of a …
Persistent routing loops on the Internet are a common misconfiguration that can lead to packet loss, reliability issues, and can even exacerbate denial of service attacks …
J Sommers, N Rudolph, R Durairajan - … of the 1st Workshop on eBPF …, 2023 - dl.acm.org
While networks have evolved in profound ways, the tools to measure them from end hosts have not kept pace. State-of-the-art tools are ill-suited for elucidating observed network …
A He, K Bu, J Huang, Y Pang, Q Gu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Path validation promises a necessary security add-on for future Internet architectures. It authenticates not only source identities but also the exact path where a packet forwards …
L Salamatian, S Anderson, J Mathews… - Communications of the …, 2023 - dl.acm.org
As hyperscalers such as Google, Microsoft, and Amazon play an increasingly important role in today's Internet, they are also capable of manipulating probe packets that traverse their …
Telehealth allows a healthcare facility in a nearby city to provide healthcare access to remote patients through devices connected via communication channels such as the …