Lord of the links: a framework for discovering missing links in the internet topology

Y He, G Siganos, M Faloutsos… - … /ACM Transactions On …, 2008 - ieeexplore.ieee.org
The topology of the Internet at the autonomous system (AS) level is not yet fully discovered
despite significant research activity. The community still does not know how many links are …

[PDF][PDF] A Systematic Framework for Unearthing the Missing Links: Measurements and Impact.

Y He, G Siganos, M Faloutsos, SV Krishnamurthy - NSDI, 2007 - usenix.org
The lack of an accurate representation of the Internet topology at the Autonomous System
(AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-domain …

[PDF][PDF] Internet Topology.

Y He, G Siganos, M Faloutsos - 2009 - cs.ucr.edu
Figure 1: The structure of Internet at two levels information and they are harder to get.(3) AS-
level topology is not directly engineered by human; instead, it is driven by technological and …

Bgpeek-a-boo: Active bgp-based traceback for amplification ddos attacks

J Krupp, C Rossow - 2021 IEEE European Symposium on …, 2021 - ieeexplore.ieee.org
Amplification DDoS attacks inherently rely on IP spoofing to steer attack traffic to the victim.
At the same time, IP spoofing undermines prosecution, as the originating attack …

[PDF][PDF] BGP POISONING FOR AS-LEVEL MAPPING

M Sen - 2024 - paradoxicalbit.com
This research investigates the relationships and dynamics of Autonomous System (AS) level
connections on the Internet, focusing on the efficacy and repercussions of Border Gateway …

On the use of Trial and Error Traffic Engineering techniques in the Internet

PAA Gutierrez - 2009 Sixth International Conference on …, 2009 - ieeexplore.ieee.org
The Border Gateway Protocol governs the overall routing in the Internet. With the time, it has
been overloaded with functions which is was not initially designed for. The main example is …

[PDF][PDF] Impact of Topology on BGP Convergence

S Hanif - Master's thesis, Vrije Universiteit Amsterdam …, 2010 - nlnetlabs.nl
For a few decades, the Boarder Gateway Protocol (BGP) realized Internet to be robust and
acceptably stable despite its overwhelming growth. Although it is a fairly simple peer to peer …

Using honeypots to trace back amplification DDoS attacks

J Krupp - 2021 - publikationen.sulb.uni-saarland.de
In today's interconnected world, Denial-of-Service attacks can cause great harm by simply
rendering a target system or service inaccessible. Amongst the most powerful and …

Withdrawal Symptoms: Filtering of Announcements from a Route Collector System

SD Strowes, R Wilhelm, E Aben - Proceedings of the Applied …, 2020 - dl.acm.org
In January 2020 the RIPE NCC announced a new/12 in BGP, the first/12 allocation from
IANA to any Regional Internet Registry in over twelve years. This gave us a unique …

[图书][B] Investigating an Approach for Discovering Second Hop Neighbors in BGP

JH Park - 2017 - search.proquest.com
BGP prefix hijacking, which is illegitimate takeover of IP prefixes by announcing forged AS
paths, is a major threat to the Internet. A number of hijacking events with severe …