P Sermpezis, L Prehn, S Kostoglou… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
Network operators and researchers frequently use Internet measurement platforms (IMPs), such as RIPE Atlas, RIPE RIS, or RouteViews for, eg, monitoring network performance …
In 2003, Wang and Gao [67] presented an algorithm to infer and characterize routing policies as this knowledge could be valuable in predicting and debugging routing paths …
A Milolidakis, T Bühler, K Wang, M Chiesa… - IEEE …, 2023 - ieeexplore.ieee.org
Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route …
Online services all seek to provide their customers with the best Quality of Experience (QoE) possible. Milliseconds of delay can cause users to abandon a cat video or move onto a …
The key to optimizing the performance of an anycast-based system (eg, the root DNS or a CDN) is choosing the right set of sites to announce the anycast prefix. One challenge here is …
The Border Gateway Protocol (BGP) is a policy-based protocol, which enables Autonomous Systems (ASes) to independently define their routing policies with little or no global …
The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packet headers. IP source spoofing is the basis for amplification denial …
Despite prior efforts, the vast majority of the AS-level topology of the Internet remains hidden from BGP and traceroute vantage points. In this work, we introduce metAScritic, a novel …
P Sermpezis, V Kotronis, K Arakadakis… - 2021 IFIP Networking …, 2021 - ieeexplore.ieee.org
BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate …