Reproducible network experiments using container-based emulation

N Handigol, B Heller, V Jeyakumar, B Lantz… - Proceedings of the 8th …, 2012 - dl.acm.org
In an ideal world, all research papers would be runnable: simply click to replicate all results,
using the same setup as the authors. One approach to enable runnable network systems …

Evolve or die: High-availability design principles drawn from googles network infrastructure

R Govindan, I Minei, M Kallahalla, B Koley… - Proceedings of the 2016 …, 2016 - dl.acm.org
Maintaining the highest levels of availability for content providers is challenging in the face
of scale, network evolution and complexity. Little, however, is known about failures large …

An integrated experimental environment for distributed systems and networks

B White, J Lepreau, L Stoller, R Ricci… - ACM SIGOPS …, 2002 - dl.acm.org
Three experimental environments traditionally support network and distributed systems
research: network emulators, network simulators, and live networks. The continued use of …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

[HTML][HTML] Handling churn in a DHT

S Rhea, D Geels, T Roscoe, J Kubiatowicz - Proceedings of the USENIX …, 2004 - usenix.org
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

In VINI veritas: realistic and controlled network experimentation

A Bavier, N Feamster, M Huang, L Peterson… - Proceedings of the …, 2006 - dl.acm.org
This paper describes VINI, a virtual network infrastructure that allows network researchers to
evaluate their protocols and services in a realistic environment that also provides a high …

Dummynet revisited

M Carbone, L Rizzo - ACM SIGCOMM Computer Communication …, 2010 - dl.acm.org
Dummynet is a widely used link emulator, developed long ago to run experiments in user-
configurable network environments. Since its original design, our system has been extended …

Simgrid: A generic framework for large-scale distributed experiments

H Casanova, A Legrand… - … Conference on Computer …, 2008 - ieeexplore.ieee.org
Distributed computing is a very broad and active research area comprising fields such as
cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems …