Large-scale Measurements and Optimizations on Latency in Edge Clouds

H Zhang, S Huang, M Xu, D Guo… - … on Cloud Computing, 2024 - ieeexplore.ieee.org
The emergence of next-generation latency-critical applications places strict requirements on
network latency and stability. Edge cloud, an instantiated paradigm for edge computing, is …

Realizing Personalized and Adaptive Inference of AS Paths With a Generative and Measurable Process

X Li, C Wang, T Yang, A Shen, Z Qiu… - … /ACM Transactions on …, 2024 - ieeexplore.ieee.org
In the global Internet, understanding paths between autonomous systems (ASes) is valuable
for improving the Internet routing system and optimizing various applications. However, due …

Collecting Self-reported Semantics of BGP Communities and Investigating Their Consistency with Real-world Usage

Y Liu, T Wu, JH Wang, J Wang, S Zhuang - … of the 2024 ACM on Internet …, 2024 - dl.acm.org
People can extract various kinds of information about the Internet from BGP routes tagged
with BGP community values with known semantics. In this paper, we conduct a study on the …

Investigating Location-aware Advertisements in Anycast IP Networks

S Kastanakis, V Giotsas, I Livadariu, N Suri - Proceedings of the 2024 …, 2024 - dl.acm.org
Anycast routing offers transparent service replication by distributing traffic across multiple
Points of Presence (PoP). By advertising the same IP prefix from each PoP via BGP, traffic is …

Hidden-SAGE: For the Inference of Complex Autonomous System Business Relationships Involving Hidden Links

H Gao, N Li, Y Xie - Electronics, 2024 - mdpi.com
Routing security is a crucial aspect of internet security. The main issues involved in routing
security include Border Gateway Protocol (BGP) route leak and prefix hijacking. Currently …

Assessing the security of Internet paths: A case study of Dutch critical infrastructures

SK Khadka, S Bayhan, R Holz… - Proceedings of the 2024 …, 2024 - dl.acm.org
Many critical infrastructures (CIs) rely on cloud services (eg, email) for their daily operations.
However, these CIs typically have limited insight into the security status of the paths that their …