Stable and Practical AS Relationship Inference with ProbLink
暂无分享,去创建一个
Scott Shenker | Vasileios Giotsas | Arvind Krishnamurthy | Colin Scott | Amogh Dhamdhere | Yuchen Jin | S. Shenker | A. Krishnamurthy | V. Giotsas | Colin Scott | Yuchen Jin | A. Dhamdhere | Vasileios Giotsas
[1] Nick Feamster,et al. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes , 2015, SIGCOMM.
[2] Dmitri V. Krioukov,et al. Inferring AS Relationships: Dead End or Lively Beginning? , 2005, WEA.
[3] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[4] Ítalo S. Cunha,et al. Machiavellian routing: improving internet availability with BGP poisoning , 2011, HotNets-X.
[5] Walter Willinger,et al. Internet Topology Research Redux , 2013 .
[6] Thomas Engel,et al. The state of affairs in BGP security: A survey of attacks and defenses , 2018, Comput. Commun..
[7] Paul Laskowski,et al. Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM 2006.
[8] Lixin Gao,et al. On the evaluation of AS relationship inferences [Internet reachability/traffic flow applications] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[9] Peyman Faratin,et al. The Growing Complexity of Internet Interconnection , 2008 .
[10] Irina Rish,et al. An empirical study of the naive Bayes classifier , 2001 .
[11] Aemen Lodhi. The economics of internet peering interconnections , 2014 .
[12] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[13] G. Di Battista,et al. Computing the types of the relationships between autonomous systems , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Lixin Gao,et al. On inferring autonomous system relationships in the Internet , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[15] Olivier Bonaventure,et al. Interdomain traffic engineering with redistribution communities , 2004, Comput. Commun..
[16] Nikita Borisov,et al. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction , 2014, Proc. Priv. Enhancing Technol..
[17] Vasileios Giotsas,et al. Valley-free violation in Internet routing — Analysis based on BGP Community data , 2012, 2012 IEEE International Conference on Communications (ICC).
[18] Jennifer Rexford,et al. BGP routing policies in ISP networks , 2005, IEEE Network.
[19] Michael Schapira,et al. Measuring and Mitigating AS-level Adversaries Against Tor , 2016, NDSS.
[20] Dario Rossi,et al. Violation of Interdomain Routing Assumptions , 2014, PAM.
[21] Sharon Goldberg,et al. Let the market drive deployment: a strategy for transitioning to BGP security , 2011, SIGCOMM.
[22] Vaibhav Bajpai,et al. Inferring persistent interdomain congestion , 2018, SIGCOMM.
[23] Vasileios Giotsas,et al. Inferring Complex AS Relationships , 2014, Internet Measurement Conference.
[24] Florian Schmidt,et al. Unikernels Everywhere: The Case for Elastic CDNs , 2017, VEE.
[25] Michalis Faloutsos,et al. Lord of the links: a framework for discovering missing links in the internet topology , 2009, IEEE/ACM Trans. Netw..
[26] J. Tiedje,et al. Naïve Bayesian Classifier for Rapid Assignment of rRNA Sequences into the New Bacterial Taxonomy , 2007, Applied and Environmental Microbiology.
[27] Lu Ruan,et al. Computing Customer Cones of Peering Networks , 2016, ANRW '16.
[28] Anja Feldmann,et al. Detecting Peering Infrastructure Outages in the Wild , 2017, SIGCOMM.
[29] Ítalo S. Cunha,et al. Investigating Interdomain Routing Policies in the Wild , 2015, Internet Measurement Conference.
[30] Dmitri V. Krioukov,et al. AS relationships: inference and validation , 2006, CCRV.
[31] Randy H. Katz,et al. Characterizing the Internet hierarchy from multiple vantage points , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[32] Amir Herzberg,et al. Jumpstarting BGP Security with Path-End Validation , 2016, SIGCOMM.
[33] Olivier Bonaventure,et al. On BGP communities , 2008, CCRV.
[34] Olivier Bonaventure,et al. Interdomain traffic engineering with BGP , 2003, IEEE Commun. Mag..
[35] Vasileios Giotsas,et al. Inferring multilateral peering , 2013, CoNEXT.
[36] Paul N. Bennett. Assessing the Calibration of Naive Bayes Posterior Estimates , 2000 .
[37] Yongqiang Lyu,et al. Video delivery networks: Challenges, solutions and future directions , 2017, Comput. Electr. Eng..
[38] Grenville Armitage,et al. BGP Anomaly Detection Techniques: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[39] Sebastian Thrun,et al. Text Classification from Labeled and Unlabeled Documents using EM , 2000, Machine Learning.
[40] Zongpeng Li,et al. The Flattening Internet Topology: Natural Evolution, Unsightly Barnacles or Contrived Collapse? , 2008, PAM.
[41] Anja Feldmann,et al. Building an AS-topology model that captures route diversity , 2006, SIGCOMM 2006.
[42] Mark Crovella,et al. Detecting Unusually-Routed ASes: Methods and Applications , 2016, Internet Measurement Conference.
[43] Vasileios Giotsas,et al. AS relationships, customer cones, and validation , 2013, Internet Measurement Conference.
[44] Harry Zhang,et al. The Optimality of Naive Bayes , 2004, FLAIRS.