Network tomography: A review and recent developments

E Lawrence, G Michailidis, VN Nair, B Xi - Frontiers in statistics, 2006 - World Scientific
The modeling and analysis of computer communications networks give rise to a variety of
interesting statistical problems. This chapter focuses on network tomography, a term used to …

Toward the accurate identification of network applications

AW Moore, K Papagiannaki - International workshop on passive and active …, 2005 - Springer
Well-known port numbers can no longer be used to reliably identify network applications.
There is a variety of new Internet applications that either do not use well-known port …

Efficient multicast algorithms for multichannel wireless mesh networks

G Zeng, B Wang, Y Ding, L Xiao… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
The wireless mesh network is an emerging technology that provides high quality service to
end users as the" last milerdquo of the Internet. Furthermore, multicast communication is a …

A survey on network tomography with network coding

P Qin, B Dai, B Huang, G Xu… - … Communications Surveys & …, 2014 - ieeexplore.ieee.org
The overhead of internal network monitoring motivates techniques of network tomography.
Network coding (NC) presents a new opportunity for network tomography as NC introduces …

Pinpointing delay and forwarding anomalies using large-scale traceroute measurements

R Fontugne, C Pelsser, E Aben, R Bush - Proceedings of the 2017 …, 2017 - dl.acm.org
Understanding data plane health is essential to improving Internet reliability and usability.
For instance, detecting disruptions in distant networks can identify repairable connectivity …

Multiple-source Internet tomography

MG Rabbat, MJ Coates… - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
Information about the topology and link-level characteristics of a network is critical for many
applications including network diagnostics and management. However, this information is …

Network delay tomography using flexicast experiments

E Lawrence, G Michailidis… - Journal of the Royal …, 2006 - academic.oup.com
Estimating and monitoring the quality of service of computer and communications networks
is a problem of considerable interest. The paper focuses on estimating link level delay …

Toward practical defense against traffic analysis attacks on encrypted DNS traffic

A Niakanlahiji, S Orlowski, A Vahid, JH Jafarian - Computers & Security, 2023 - Elsevier
The primary goal of the DNS-over-HTTPS (DoH) protocol is to address users' privacy
concerns regarding on-path adversaries, including local ISPs, who observe DNS traffic to …

Looking glass of NFV: Inferring the structure and state of NFV network from external observations

Y Lin, T He, S Wang, K Chan… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
The rapid development of network function virtualization (NFV) enables a communication
network to provide in-network services using virtual network functions (VNFs) deployed on …

How was your journey? Uncovering routing dynamics in deployed sensor networks with multi-hop network tomography

M Keller, J Beutel, L Thiele - Proceedings of the 10th ACM Conference …, 2012 - dl.acm.org
In the context of wireless data collection, a common application class in wireless sensor
networks, this paper presents a novel, non-intrusive algorithm for the precise reconstruction …