67 Hits in 4.0 sec

A Routing Strategy for Multihomed ISP to Mitigate the Impact of Overlay Traffic

2013 IEICE transactions on information and systems  
impact of overlay traffic.  ...  In this paper, we study the interaction between overlay routing and a multihomed ISP's routing strategy with a Nash game model, and propose a routing strategy for the multihomed ISP to alleviate the negative  ...  For the case shown in Fig. A· 1 (b) withβ * < β * , we see directly from the figure that in the second link classification schemeà * < A * .  ... 
doi:10.1587/transinf.e96.d.193 fatcat:tyyhuvpfinfbbgnidhyfp2them

Improving the Performance of Route Control Middleboxes in a Competitive Environment

M. Yannuzzi, X. Masip-Bruin, E. Marin-Tordera, J. Domingo-Pascual, A. Fonte, E. Monteiro
2008 IEEE Network  
Multihomed subscribers are increasingly adopting intelligent route control solutions to optimize the cost and end-to-end performance of the traffic routed among the different links connecting their networks  ...  In this article, we present a more scalable route control strategy that can better support the foreseeable spread of IRC solutions.  ...  Most available IRC solutions follow the same principle, that is, they dynamically shift part of the egress traffic of a multihomed subscriber from one of its ISPs to another, using measurement-driven path  ... 
doi:10.1109/mnet.2008.4626233 fatcat:znps4b6spbfjjfxped2a44qx7y

Resolving Cross-Layer Conflict Between Overlay Routing and Traffic Engineering

S. Seetharaman, V. Hilt, M. Hofmann, M. Ammar
2009 IEEE/ACM Transactions on Networking  
The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load.  ...  Overlay routing is known to cause undesired instability in a network by operating in a selfish manner.  ...  Thus, irrespective of the time-scale at which TE operates, the native layer TE objective is disrupted by overlay routing and there is a need to adopt mitigation strategies like those presented in Section  ... 
doi:10.1109/tnet.2009.2018280 fatcat:vz54pbkgwraw7fexsiirhr6vge

Exploiting the Power of Multiplicity: A Holistic Survey of Network-Layer Multipath

Junaid Qadir, Anwaar Ali, Kok-Lim Alvin Yau, Arjuna Sathiaseelan, Jon Crowcroft
2015 IEEE Communications Surveys and Tutorials  
We will present a detailed investigation of two important design issues, namely the control plane problem of how to compute and select the routes, and the data plane problem of how to split the flow on  ...  The aim of this paper is to provide a comprehensive survey of the literature on network-layer multipath solutions.  ...  Arjuna Sathiaseelan was also part funded by the EC H2020 RIFE project Grant No. 644663. The authors would also like to thank Gareth Tyson and the anonymous reviewers for their useful feedback.  ... 
doi:10.1109/comst.2015.2453941 fatcat:pvatolih4ngwrooewos2rgeaoe

Practical defenses against BGP prefix hijacking

Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao
2007 Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07  
Motivated the need for proactive defenses to complement reactive mitigation response, we evaluate customer route filtering, a best common practice among large ISPs today, and show its limited effectiveness  ...  We are the first to demonstrate that detection systems based on a limited number of BGP feeds are subject to detection evasion by hijackers.  ...  Acknowledgments We thank the anonymous reviewers and Olivier Bonaventure for their helpful comments.  ... 
doi:10.1145/1364654.1364658 dblp:conf/conext/ZhangZHM07 fatcat:krukqi53lvgczgwqxaw3eidbmy

Inter-domain policy violations in multi-hop overlay routes: Analysis and mitigation

Srinivasan Seetharaman, Mostafa Ammar
2009 Computer Networks  
Further, we investigate the impact of two types of overlay traffic filtering that aim to prevent these routing policy violations: blind filtering and policyaware filtering.  ...  We develop a single cost-sharing framework that allows the incorporation of both approaches into a single strategy.  ...  [20] addresses the impact of P2P networks on ISPs' costs. We address the impact of service overlays on inter-domain policies.  ... 
doi:10.1016/j.comnet.2008.09.014 fatcat:lutwt5ack5devp4hd4lkdm7zqe

Location authentication through Power Line Communication: Design, protocol, and analysis of a new out-of-band strategy

Alan T. Sherman, Dhananjay Phatak, Bhushan Sonawane, Vivek G. Relan
2010 ISPLC2010  
Similarly, in response to a name resolution query from the source gateway, the trusted authoritative DNS server for the destination host dynamically and randomly assigns an IP address for the destination  ...  For each session between a source and destination host, the trusted source gateway dynamically and randomly assigns an IP address for the source from the pool of all routable IP addresses within the source  ...  We are currently exploring prevention technique for such DDoS attack, but impact of such strategic DDoS attack can be lessened by implementing spread identity at ISP level, because ISPs are connected to  ... 
doi:10.1109/isplc.2010.5479919 fatcat:wmy4jx5mb5cinife6vkobdf2bm

Reliability as an interdomain service

Hao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert Greenberg
2007 Computer communication review  
We use real IP network topologies and traffic traces to demonstrate the effectiveness of our framework and algorithms.  ...  Reliability is a critical requirement of the Internet. The availability and resilience of the Internet under failures can have significant global effects.  ...  We are grateful to Anees Shaikh, our shepherd, for his extensive help in revising the paper.  ... 
doi:10.1145/1282427.1282407 fatcat:j5rcvgqhrffdzg5mku2kwyomre

Reliability as an interdomain service

Hao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert Greenberg
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
We use real IP network topologies and traffic traces to demonstrate the effectiveness of our framework and algorithms.  ...  Reliability is a critical requirement of the Internet. The availability and resilience of the Internet under failures can have significant global effects.  ...  We are grateful to Anees Shaikh, our shepherd, for his extensive help in revising the paper.  ... 
doi:10.1145/1282380.1282407 dblp:conf/sigcomm/WangYLWGG07 fatcat:2eqnfolzejaqhkocb3ufvidygq

Protecting Insecure Communications with Topology-aware Network Tunnels

Georgios Kontaxis, Angelos D. Keromytis
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We eliminate plain-text traffic to the Internet for 20% of web servers, reduce it to 1 network hop for an additional 20% and minimize it for the rest.  ...  TNT is not a substitute for TLS. We determine that popular web destinations are collocated in a small set of networks with 10 autonomous systems hosting 66% of traffic.  ...  Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors, and do not necessarily reflect those of the US Government or the NSF.  ... 
doi:10.1145/2976749.2978305 dblp:conf/ccs/KontaxisK16 fatcat:bybuzblukrh3flqqa6itqfr3xq

Better Internet routing through intrinsic support for selfishness

Holly Esquivel, Chitra Muthukrishnan, Aditya Akella, Shuchi Chawla
2012 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)  
In S4R, ISPs announce links connecting different parts of the Internet. ISPs can selfishly price their links to attract maximal amount of traffic.  ...  The BGP routing system is inflexible and suboptimal for both stub networks and ISPs.  ...  Each ISP therefore can employ a learning algorithm to determine the best strategy.  ... 
doi:10.1109/comsnets.2012.6151317 dblp:conf/comsnets/EsquivelMAC12 fatcat:4l75pvzvirbq7ixcktxmwpwuw4

Overfort: Combating DDoS with peer-to-peer DDoS puzzle

Soon Hin Khor, Akihiro Nakao
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
Furthermore, Overfort has a mechanism to segregate LDNSes that are serving DDoS agents and restrict them to a limited number of IPs thus saving the other available IPs for productive use.  ...  An attacker will be faced with the daunting puzzle of finding all the IPs and thereafter the confusion of how much traffic to clog each IP with.  ...  The incentive to co-operate can vary; end-user peers benefit from the synergy of shared resources in mitigating DDoS while with a distributed packet accounting service to keep track of traffic routed by  ... 
doi:10.1109/ipdps.2008.4536561 dblp:conf/ipps/KhorN08 fatcat:poy6eb66cnabzlvwzfotg4j3wa

Secure and Policy-Compliant Source Routing

B. Raghavan, P. Verkaik, A.C. Snoeren
2009 IEEE/ACM Transactions on Networking  
traffic policies, nor to accurately determine the correct party to charge for forwarding the traffic.  ...  While researchers have proposed a number of source routing techniques to combat this limitation, there has thus far been no way for independent ASes to ensure that such traffic does not circumvent local  ...  In this case, assuming ISP is not a transit provider, it is permissible only because is a customer of the ISP and is willing to be charged for 's traffic.  ... 
doi:10.1109/tnet.2008.2007949 fatcat:jlhvrpigcffwxokaggkpw7atfe

Multihoming aware optimization mechanism

Bruno Sousa, Kostas Pentikousis, Marilia Curado
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
., 2003 ] is a mechanism that supports traffic engineering for unequal load balancing distribution, without impacting the routing system.  ...  Core Router-Integrated Overlay Core Router-Integrated Overlay (CRIO) [Zhang et al., 2006] aims at mitigating the trade-off between path length and routing table size.  ...  Improving Multihoming Objectives and Requirements The objectives to improve multihoming support include: 1. Improve the multihoming support of MIPv6. 2.  ... 
doi:10.1109/inm.2015.7140437 dblp:conf/im/SousaPC15 fatcat:mexhxgjbkvd3foptgzuqubwpuq

A new location layer for the TCP/IP protocol stack

André Zúquete, Carlos Frade
2012 Computer communication review  
For a proof of concept, we modified the TCP/IP stack of a Linux host to handle our new protocol layer and we designed and conceived a novel NAT box to enable current hosts to interact with the modified  ...  In this paper we propose the introduction of a location layer, between transport and network layers, to address both problems.  ...  The purpose of the location layer is to enable the deployment of overlay addressing, location and routing strategies over IP.  ... 
doi:10.1145/2185376.2185379 fatcat:5v4hcpptgraj7dishytxhbkpui
« Previous Showing results 1 — 15 out of 67 results