Lecture 4. Does the Internet have an Achilles' heel?
|
|
- Barnard Fowler
- 5 years ago
- Views:
Transcription
1 Lecture 4 Does the Internet have an Achilles' heel?
2
3 Outline Definition Arguments for that the Internet have an Achilles' heel. Arguments against that the Internet have an Achilles' heel. Network throughput and robustness simulation to support arguments. Conclusion.
4 Does the Internet have an Achilles' heel?: Question specification: Are there high degree routers in the middle of the Internet that can be easily detected and attacked, so to fragment the Internet into many smaller pieces? Node degree = number of physical connections for a node Middle = many network router shortest forwarding paths pass through routers here Attack: - Denial of service: many clients overload one entity with requests. - Bombs...
5 Important problem to worry about, e.g., 2007 cyber attacks on Estonia Series of denial of service attacks that began 27 April, 2007 and swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.
6 Long-tail distribution of node degrees Long-tail distribution of node degrees => inhomogeneous network See whiteboard on long-tail distributions!
7 Nature cover, 2000, top ranked scientific journal It was measured that Internet has a long-tailed router degree distribution =>
8 What worried people in 2000 was that: the higher degree nodes in the long-tailed distribution are assumed to sit in the middle of the network.these can be attacked, and fragment the Internet.
9 Trench digging: Traffic aggregation Highly connected routers (high node degree) are at the edge of the network to divide little throughput among many users. Towards the core, traffic accumulates rapidly to avoid trench digging, so the core routers must have less connections. AT&T topology 2003: maximum degree of core router 68, maximum degree of edge router 313.
10 But the Internet could still have an Achilles' heel? Attack high troughput routers in the core!
11 Hardware: Total router throughput is limited Total throughput (Mbps) Total throughput = throughput per connection * number of connections => Whatever the number of connections, the total throughput is limited => No dominating routers in the middle of the network. [Alderson:2005] Understanding Internet topology: principles, models, and validation, Alderson, D., Lun L., Willinger, W., Doyle, J.C., IEEE/ACM Transactions on Networking, Volume: 13, Issue 6, 2005
12 But the Internet could still have an Achilles' heel? A scoundrel can spend a lot of time to detect a lot of important nodes, and attack all of these? Yes, but as we will see..., the Internet is good at reorganizing itself in case of router failure. - New key routers emerge during the attack, which are difficult to predict. Has to be motivated - Denial of service attack: The attacker must also have enough distributed fire power to maintain the blocking of the routers that were first attacked, while attacking the replacements.
13 Internet simulation Throughput and robustness (to base conclusions on in the end)
14 Throughput
15 Example 1 Degree distribution: G1 G2
16 Connectivity measure S(G) close to 1 <=> clusters of high-degree nodes in the network
17 Example 1 Degree distribution: G1 G2 Maximizes S(G)
18 Example 1: Connectivity measure
19 Example 1: Connectivity measure
20 Throughput optimization Gbps Routing matrix Network fixed, routing done, demand fix Demand for this connection
21 Throughput optimization Linear optimization problem: simplex algorithm and Newton's method!
22 Example 1: Throughput optimization for G1
23 Example 1: Throughput optimization for G1
24 Example 1: Throughput optimization for G1
25 Example 1: Throughput optimization for G1
26 Example 1 results Gbps
27 Example 1 results Better performance! Experimental observation: a small S(G) is better for performance
28 Example 2: Same optimization as in Ex. 1 [Alderson:2005] Random (preferential attachment) Optimized Distribution of node degrees same for all networks!
29 Example 2 (d) (e) (c) (b) (e) S(G)
30 (d) corresponds to Internet (d) High router degree on network edge, low router degree in the middle (traffic aggregation slide) (d) is optimized for performance while (b) is random. Internet is not constructed randomly, but by skilled engineers who optimize for performance. More discussion in [Alderson:2005] and in [Doyle:2005] The robust yet fragile nature of the Internet, J. C. Doyle, D. L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger, Proceedings of the National Academy of Sciences of the United States of America, vol. 102, no. 41, 2005
31 Robustness optimization
32 Example 2: Remove the router that decreases capacity most. Let the network rerun the routing algorithms [Doyle:2005]: Experiments: Network is not much fragmented (d) nominal 20% of routers deconnected (b) nominal (b) attacked (d) attacked (d) less fragile, yet fragile, cf., [Doyle 2005] title
33 Summary A long-tailed distribution of node degrees does not imply an Achilles' heel (graph optimization and routing should be taken into account). Before drawing conclusions, careful modeling of phenomena is important! The book does not show any robustness simulation at all (lecture's second last slide).
Strategies, approaches and ethical considerations
Strategies, approaches and ethical considerations q Internet design principles and measurements q Strategies and standards q Experimental approaches q Ethical considerations Design principles of the Internet
More informationThe missing links in the BGP-based AS connectivity maps
The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070
More informationDiscriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric
Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,
More informationDynamics of Feedback-induced Packet Delay in Power-law Networks
Dynamics of Feedback-induced Packet Delay in Power-law Networks Takahiro Hirayama, Shin ichi Arakawa, Ken-ichi Arai, and Masayuki Murata Graduate School of Information Science and Technology Osaka University,
More information(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks
More informationChoosing Routers for the Campus
Choosing Routers for the Campus Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationNetworks in economics and finance. Lecture 1 - Measuring networks
Networks in economics and finance Lecture 1 - Measuring networks What are networks and why study them? A network is a set of items (nodes) connected by edges or links. Units (nodes) Individuals Firms Banks
More informationChoosing Switches and Routers for the Campus
Choosing Switches and Routers for the Campus Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationAdvanced Computer Networks
Advanced Computer Networks Network Topology Jianping Pan Summer 2007 1 Motivation Knowing network topology is important network planning traffic engineering performance evaluation protocol design... 2
More informationOn Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection
On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection CPSR-SG 2016 CPS Week 2016 April 12, 2016 Vienna, Austria Outline CPS Security
More informationTime Aware Least Recent Used (TLRU) Cache Management Policy in ICN
Time Aware Least Recent Used (T) Cache Management Policy in ICN Muhammad Bilal*, Shin-Gak Kang** *Dept. of Engineering, University of Science and Technology (ETRI-Campus), Daejeon, Rep. of Korea ** Electronics
More informationAlgorithm and Complexity for a Network Assortativity Measure
Algorithm and Complexity for a Network Assortativity Measure Sarah J. Kunkler M. Drew LaMar Rex K. Kincaid David Phillips July 2, 2013 Abstract We show that finding a graph realization with the minimum
More informationOn the impact of small-world on local search
On the impact of small-world on local search Andrea Roli andrea.roli@unibo.it DEIS Università degli Studi di Bologna Campus of Cesena p. 1 Motivation The impact of structure whatever it is on search algorithms
More informationGame Theoretic Solutions to Cyber Attack and Network Defense Problems
Game Theoretic Solutions to Cyber Attack and Network Defense Problems 12 th ICCRTS "Adapting C2 to the 21st Century Newport, Rhode Island, June 19-21, 2007 Automation, Inc Dan Shen, Genshe Chen Cruz &
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationApplication-Aware SDN Routing for Big-Data Processing
Application-Aware SDN Routing for Big-Data Processing Evaluation by EstiNet OpenFlow Network Emulator Director/Prof. Shie-Yuan Wang Institute of Network Engineering National ChiaoTung University Taiwan
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationAn Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization
An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science
More informationAN INTRODUCTION TO ARP SPOOFING
AN INTRODUCTION TO ARP SPOOFING April, 2001 Sean Whalen Sophie Engle Dominic Romeo GENERAL INFORMATION Introduction to ARP Spoofing (April 2001) Current Revision: 1.8 Available: http://chocobospore.org
More informationF28HS Hardware-Software Interface: Systems Programming
F28HS Hardware-Software Interface: Systems Programming Hans-Wolfgang Loidl School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh Semester 2 2017/18 0 No proprietary software has
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationImplementation of a Reliable Multicast Transport Protocol (RMTP)
Implementation of a Reliable Multicast Transport Protocol (RMTP) Greg Nilsen University of Pittsburgh Pittsburgh, PA nilsen@cs.pitt.edu April 22, 2003 Abstract While many network applications can be created
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationOutline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006
EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering
More informationCS 458 Internet Engineering Spring First Exam
CS 458 Internet Engineering Spring 2005 First Exam Instructions (read carefully): There are 6 problems for a total of 60 points. This is a closed book and closed notes in-class exam. If any problem is
More informationCloudflare Advanced DDoS Protection
Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com
More informationFile Systems: FFS and LFS
File Systems: FFS and LFS A Fast File System for UNIX McKusick, Joy, Leffler, Fabry TOCS 1984 The Design and Implementation of a Log- Structured File System Rosenblum and Ousterhout SOSP 1991 Presented
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationCourse 6. Internetworking Routing 1/33
Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node
More informationTraffic Engineering with Estimated Traffic Matrices
Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup Yin Zhang www.research.att.com/~roughan www.research.att.com/~mthorup www.research.att.com/~yzhang Shannon Lab AT&T Research
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationNetwork and Hardware Technology (NHT) Road Map: P2M Politeknik Negeri Batam NHT
Network and Hardware Technology (NHT) Road Map: 2015-2019 P2M Politeknik Negeri Batam NHT OUTLINE INTRODUCTION RATIONALE, VISION & MISSION MAIN ACTIVITIES & SERVICE COVERAGE RESEARCH AREA, FRAMEWORK &
More informationA Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet
A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India
More informationSETTING UP A GB-X3 LINK FOR 2 or 3 Gbps OPERATION
APPLICATION NOTE: Version: 1.1 SETTING UP A GB-X3 LINK FOR 2 or 3 Gbps OPERATION This application note provides examples of how to configure a GB-X3 link for 2 or 3 Gbps operations. The following procedures
More informationACEAIT On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method
ACEAIT-5239 On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method Kairat Jaroenrat *, Tichakon Sumrongsub, Thanachot Thitivichienlert and Natdanai Suksaeng
More informationHierarchically Aggregated Fair Queueing (HAFQ) for Per-flow Fair Bandwidth Allocation in High Speed Networks
Hierarchically Aggregated Fair Queueing () for Per-flow Fair Bandwidth Allocation in High Speed Networks Ichinoshin Maki, Hideyuki Shimonishi, Tutomu Murase, Masayuki Murata, Hideo Miyahara Graduate School
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More information21: IP Multicast. Classic example: British and Indian communities in the US want to watch cricket. Americans worldwide want to watch baseball.
21: IP Multicast Mark Handley TV on the net Suppose you want to broadcast an event live to a million people worldwide, but your audience is too distributed for mainstream TV to carry. How do you do it?
More informationCOM-208: Computer Networks - Homework 6
COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationLoad Balance. Wen-Neng Tsai
Load Balance Wen-Neng Tsai 1 Outline Introduction to Load Balance Feature Failover Link aggregation LB for wired network Strategies LB for wireless network Protocols LACP (802.3ad) PPP Multi-link Protocol(RFC
More informationOperating Systems. Process scheduling. Thomas Ropars.
1 Operating Systems Process scheduling Thomas Ropars thomas.ropars@univ-grenoble-alpes.fr 2018 References The content of these lectures is inspired by: The lecture notes of Renaud Lachaize. The lecture
More informationIJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Performance Comparison of ADSDV and DSDV in MANET Brahm Prakash Dahiya Shaym Lal College,New Delhi, India brahmprakasd@gmail.com
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationMotivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control
Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control
More informationPractical, Real-time Centralized Control for CDN-based Live Video Delivery
Practical, Real-time Centralized Control for CDN-based Live Video Delivery Matt Mukerjee, David Naylor, Junchen Jiang, Dongsu Han, Srini Seshan, Hui Zhang Combating Latency in Wide Area Control Planes
More informationInternational Journal of Research and Innovation in Applied Science (IJRIAS) Volume I, Issue IX, December 2016 ISSN
Comparative Analysis of Latency, Throughput and Network Power for West First, North Last and West First North Last Routing For 2D 4 X 4 Mesh Topology NoC Architecture Bhupendra Kumar Soni 1, Dr. Girish
More informationIntServ and RSVP. Overview. IntServ Fundamentals. Tarik Cicic University of Oslo December 2001
IntServ and RSVP Tarik Cicic University of Oslo December 2001 Overview Integrated Services in the Internet (IntServ): motivation service classes Resource Reservation Protocol (RSVP): description of the
More informationDenial of Service Attacks in Networks with Tiny Buffers
Denial of Service Attacks in Networks with Tiny Buffers Veria Havary-Nassab, Agop Koulakezian, Department of Electrical and Computer Engineering University of Toronto {veria, agop}@comm.toronto.edu Yashar
More informationComplex-Network Modelling and Inference
Complex-Network Modelling and Inference Lecture 13: Random Graphs: HOT and COLD Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/notes/ Network_Modelling/
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationA Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh
A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which
More informationOutline. Availability Analysis of Span- Restorable Mesh Networks. Motivation. Definition
Outline Availability Analysis of Span- Restorable Mesh Networks Partly adapted from slides originally presented attrlabstech Forum by, Matthieu Clouqueur and Wayne D. Grover Natthapol Pongthaipat Motivation
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationCLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,
More informationEXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS
EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,
More informationUnderstanding Router-level Topology: Principles, Models, and Validation
Understanding Router-level Topology: Principles, Models, and Validation David Alderson California Institute of Technology ISMA Workshop on Internet Topology May 10, 2006 Acknowledgments Primary Coauthors
More informationWeb Application Encipherment Key Management using Distributed Object Activation
Volume 3, Number 3, September 29 Web Application Encipherment Key Management using Distributed Object Activation Division of Cyber Investigation Police, Howon University, 727 Wolha-ri, Impi-myun, Gunsan-si,
More informationComputer Networks - Midterm
Computer Networks - Midterm October 30, 2015 Duration: 2h15m This is a closed-book exam Please write your answers on these sheets in a readable way, in English or in French You can use extra sheets if
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationSprinkler: Distributed Content Storage for Just-in-Time Streaming. CellNet Taipei, Taiwan Presented By: Sourav Kumar Dandapat
Sprinkler: Distributed Content Storage for Just-in-Time Streaming CellNet -2013 Taipei, Taiwan Presented By: Sourav Kumar Dandapat Background Mobile data traffic and its demand is increasing in exponential
More informationDiscriminative Clustering for Image Co-Segmentation
Discriminative Clustering for Image Co-Segmentation Joulin, A.; Bach, F.; Ponce, J. (CVPR. 2010) Iretiayo Akinola Josh Tennefoss Outline Why Co-segmentation? Previous Work Problem Formulation Experimental
More informationA proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing
A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School
More informationDoctoral Written Exam in Networking, Fall 2008
Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December
More informationSampling Large Graphs for Anticipatory Analysis
Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015
More informationINTERNETWORKING: CONCEPTS, ARCHITECTURE AND PROTOCOL
Lecture Handout Computer Networks Lecture No. 23 CHAPTER 17 INTERNETWORKING: CONCEPTS, ARCHITECTURE AND PROTOCOL THE MOTIVATION FOR INTERNETWORKING: There is no single networking technology that is best
More informationComputer Vision 6 Segmentation by Fitting
Computer Vision 6 Segmentation by Fitting MAP-I Doctoral Programme Miguel Tavares Coimbra Outline The Hough Transform Fitting Lines Fitting Curves Fitting as a Probabilistic Inference Problem Acknowledgements:
More informationDDoS Attack Detection Using Moment in Statistics with Discriminant Analysis
DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com
More informationCQNCR: Optimal VM Migration Planning in Cloud Data Centers
CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,
More informationRole of Genetic Algorithm in Routing for Large Network
Role of Genetic Algorithm in Routing for Large Network *Mr. Kuldeep Kumar, Computer Programmer, Krishi Vigyan Kendra, CCS Haryana Agriculture University, Hisar. Haryana, India verma1.kuldeep@gmail.com
More informationDiscrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation
Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel
More informationOperating System Support for Multimedia. Slides courtesy of Tay Vaughan Making Multimedia Work
Operating System Support for Multimedia Slides courtesy of Tay Vaughan Making Multimedia Work Why Study Multimedia? Improvements: Telecommunications Environments Communication Fun Outgrowth from industry
More informationDDoS Mitigation & Case Study Ministry of Finance
DDoS Mitigation Service @Belnet & Case Study Ministry of Finance Julien Dandoy, FODFin Technical Architect Grégory Degueldre, Belnet Network Architect Agenda DDoS : Definition and types DDoS Mitigation
More informationCross-Monotonic Multicast
Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live
More informationTCP so far Computer Networking Outline. How Was TCP Able to Evolve
TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments
More informationLecture (08, 09) Routing in Switched Networks
Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.
More informationCS 557 Congestion and Complexity
CS 557 Congestion and Complexity Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic Zhang, Shenker, and Clark, 1991 Spring 2013 The Story So Far. Transport layer:
More informationClustering. RNA-seq: What is it good for? Finding Similarly Expressed Genes. Data... And Lots of It!
RNA-seq: What is it good for? Clustering High-throughput RNA sequencing experiments (RNA-seq) offer the ability to measure simultaneously the expression level of thousands of genes in a single experiment!
More informationSpectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph
Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph Sung-Yeol Kim, Seung-Uk Yoon, and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oryong-dong, Buk-gu, Gwangju,
More informationL21: Putting it together: Tree Search (Ch. 6)!
Administrative CUDA project due Wednesday, Nov. 28 L21: Putting it together: Tree Search (Ch. 6)! Poster dry run on Dec. 4, final presentations on Dec. 6 Optional final report (4-6 pages) due on Dec. 14
More informationWhen Everything Looks Like a Nail: Graph Models of the Internet. Walter Willinger AT&T Labs-Research
When Everything Looks Like a Nail: Graph Models of the Internet Walter Willinger AT&T Labs-Research walter@research.att.com Isaac Newton Institute, June 25, 2010 Outline Internet connectivity structures
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationCSCI 680: Computer & Network Security
CSCI 680: Computer & Network Security Lecture 15 Prof. Adwait Nadkarni Fall 2017 Derived from slides by William Enck and Micah Sherr 1 Grading Class Participat ion and Quizzes 10% Grade Breakdown Homewo
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationCOMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319
COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents
More informationSecurity Control Methods for Statistical Database
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security Statistical Database A statistical database is a database which provides statistics on subsets of records OLAP
More informationCutting the Cord: A Robust Wireless Facilities Network for Data Centers
Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao and Haitao Zheng U.C. Santa Barbara, Dartmouth College, U.C.
More informationSimulation in Cyber Security
Simulation in Cyber Security Andres Ojamaa Institute of Cybernetics, Tallinn University of Technology CS Theory Days, 25 Jan 2008, Põlva Outline Cyber Security and Simulation What is this thing called
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationCS 557 Internet Routing Policies
CS 557 Internet Routing Policies On Inferring and Characterizing Internet Routing Policies Feng Wang and Lixin Gao, 2003 Spring 2013 Characterizing Routing Policies Objective: Infer and characterize BGP
More informationA Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection
A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationTopology basics. Constraints and measures. Butterfly networks.
EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April
More informationRIPE Nov 2010, Rome, IT
Michael H. Behringer Cisco Systems RIPE-61 16 Nov 2010, Rome, IT 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 1995 1996 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009
More informationTuning RED for Web Traffic
Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)
More informationModeling the Routing of an ISP
Modeling the Routing of an ISP Bruno Quoitin (bruno.quoitin@uclouvain.be) Computer Science & Engineering Department Université catholique de Louvain, Belgium This is a joint work with Sebastien Tandel,
More information