A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visual analytics for BGP monitoring and prefix hijacking identification
2012
IEEE Network
The control plane of the Internet relies entirely on BGP as inter-domain routing protocol to maintain and exchange routing information between large network providers and their customers. ...
Finally, we present an analysis of a real validated case of prefix hijacking, which took place between April and August 2011. ...
The algorithms can be enriched with additional data sources like traffic flows or router configuration files to improve the diagnosis of BGP anomalies. ...
doi:10.1109/mnet.2012.6375891
fatcat:7btbqq2oirgenbbkgv64nd7kgm
G-RCA: A Generic Root Cause Analysis Platform for Service Quality Management in Large IP Networks
2012
IEEE/ACM Transactions on Networking
In this paper we describe the design and development of a Generic Root Cause Analysis platform (G-RCA) for service quality management (SQM) in large IP networks. ...
As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online banking, and even to mission-critical 911 ...
The reflectors which feed the ingress router with BGP updates are extracted from the daily archive of router configurations; BGP decision process at the ingress router is emulated based on the BGP route ...
doi:10.1109/tnet.2012.2188837
fatcat:hkk5nsi7g5gq5kzhmfsf77vtru
In this paper we describe the design and development of a Generic Root Cause Analysis platform (G-RCA) for service quality management (SQM) in large IP networks. ...
As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online banking, and even to mission-critical 911 ...
The reflectors which feed the ingress router with BGP updates are extracted from the daily archive of router configurations; BGP decision process at the ingress router is emulated based on the BGP route ...
doi:10.1145/1921168.1921175
dblp:conf/conext/YanBGMPY10
fatcat:rye4ohf23zdgldqu6l2yamfotq
Anomaly Detection Approaches for Communication Networks
[chapter]
2010
Computer Communications and Networks
Applications of anomaly detection typically stem from the perspectives of network monitoring and network security. ...
In this chapter we review three main approaches to network anomaly detection: statistical methods, streaming algorithms, and machine learning approaches with a focus on unsupervised learning. ...
In a separate work [36] , Mandjes et al. consider anomaly detection in voice over IP network based on the analysis of the variance of byte counts. ...
doi:10.1007/978-1-84882-765-3_11
dblp:series/ccn/ThottanLJ10
fatcat:md23gj62mjc6jfbc3rfxyzz73a
Darkstar: Using exploratory data mining to raise the bar on network reliability and performance
2009
2009 7th International Workshop on Design of Reliable Communication Networks
This trend challenges service providers to raise the bar on the performance and reliability of network services. ...
We present an overview of key applications that are built on top of the Darkstar system to illustrate the power of the approach. ...
ACKNOWLEDGMENTS The authors thank the AT&T network and service operations teams for invaluable collaborations with us, their Research partners, over the years. ...
doi:10.1109/drcn.2009.5340032
fatcat:wnc4pohr5beb7oqk3ednp5idym
Zooming in on wide-area latencies to a global cloud provider
2019
Proceedings of the ACM Special Interest Group on Data Communication - SIGCOMM '19
BlameIt uses passive diagnosis, using measurements of existing connections between clients and the cloud locations, to localize the cause to one of cloud, middle, or client segments. ...
In particular, we focus on instances of latency degradation and design a tool, BlameIt, that enables cloud operators to localize the cause (i.e., faulty AS) of such degradation. ...
Sorabh Gandhi provided feedback in the early stages of the work. ...
doi:10.1145/3341302.3342073
dblp:conf/sigcomm/JinRAJPSCK19
fatcat:ynioykguqbeahml5yw53zbuj5y
Policy-based BGP control architecture for autonomous routing management
2006
Proceedings of the 2006 SIGCOMM workshop on Internet network management - INM '06
Unexpected temporal and spatial changes of inter-AS routing behavior often lead to the necessity of on-demand inter-domain routingadjustment. ...
Some evaluation results indicate that VR can effectively change routing over BGP data on the actual Internet and some control scenarios based on policy descriptions demonstrate the validity of our basic ...
For diagnosis of inter-AS routing anomalies, we have proposed a CDPS approach [4] to cope with these problems. Simple centralized models are difficult to apply. ...
doi:10.1145/1162638.1162651
fatcat:nxuepftqhbha5jc7p7p3pk453q
Crowd-based detection of routing anomalies on the internet
2015
2015 IEEE Conference on Communications and Network Security (CNS)
In this paper we present and evaluate a user-centric crowd-based approach in which users passively monitor their network traffic, share information about potential anomalies, and apply combined collaborative ...
statistics to identify potential routing anomalies. ...
Without large-scale deployment of crypto-based solutions [1] , organizations often instead rely on centralized and decentralized monitoring solutions for anomaly detection in BGP. ...
doi:10.1109/cns.2015.7346850
dblp:conf/cns/HiranCS15
fatcat:qyihgs2l35btfky62ufi2tmpra
Topology-Aware Correlated Network Anomaly Event Detection and Diagnosis
2013
Journal of Network and Systems Management
as having a common root-cause(s), (b) order anomaly events based on severity (i.e., the entry with the highest ratio value of 'common event ratio temporally' to 'common hops ratio spatially' tops the ...
Our scheme involves spatial and temporal analyses on combined topology and uncorrelated anomaly events information for detection of correlated anomaly events. ...
Various traffic related anomaly events are caused due to IP route/AS path change events that involve traffic re-routing on backup paths due to ISP traffic migration for maintenance reasons involving BGP ...
doi:10.1007/s10922-013-9286-0
fatcat:ha3acm7h7nfsdcb3qipg4nl2ry
NetSearch: Googling large-scale network management data
2014
2014 IFIP Networking Conference
In order to ensure the service quality, modern Internet Service Providers (ISPs) invest tremendously on their network monitoring and measurement infrastructure. ...
We observe that unlike the textural information on the Internet, network data are typically annotated with time and location information, which can be further augmented using information based on network ...
time: from BGP neighbor IP to a local interface IP then to interface name. ...
doi:10.1109/ifipnetworking.2014.6857131
dblp:conf/networking/QiuGPWX14
fatcat:si6gfnyorfftdkib4n2gqbohna
I-seismograph: Observing and measuring Internet earthquakes
2011
2011 Proceedings IEEE INFOCOM
Since routing is the most basic function of the Internet and the Border Gateway Protocol (BGP) is the de facto standard inter-domain routing protocol, we focus on BGP. ...
We show that we can evaluate the impact on BGP during an arbitrary period, including doing so in real time. ...
In doing so, it must consider both the spatial and temporal aspects of BGP. ...
doi:10.1109/infcom.2011.5935090
dblp:conf/infocom/LiB11
fatcat:2m6up2rszzhitplhfzgri4vxja
Failure Diagnosis of Complex Systems
[chapter]
2012
Resilience Assessment and Evaluation of Computing Systems
Failure diagnosis is the process of identifying the causes of impairment in a system's function based on observable symptoms, i.e., determining which fault led to an observed failure. ...
This chapter presents a survey of automated failure diagnosis techniques including both model-based and model-free approaches. ...
analysis to detect faults in BGP router configurations by checking them against a high-level correctness specification. ...
doi:10.1007/978-3-642-29032-9_12
fatcat:dyxufulyhfgpfbjruwizaj7eia
Diagnosing network-wide traffic anomalies
2004
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04
This method is based on a separation of the high-dimensional space occupied by a set of network traffic measurements into disjoint subspaces corresponding to normal and anomalous network conditions. ...
It is a difficult problem because one must extract and interpret anomalous patterns from large amounts of high-dimensional, noisy data. ...
We also thank Tim Griffin and Gianluca Iannaccone for feedback on early drafts. ...
doi:10.1145/1015467.1015492
dblp:conf/sigcomm/LakhinaCD04
fatcat:jihyxhjijbhwnb5b7dinpmnamm
Diagnosing network-wide traffic anomalies
2004
Computer communication review
This method is based on a separation of the high-dimensional space occupied by a set of network traffic measurements into disjoint subspaces corresponding to normal and anomalous network conditions. ...
It is a difficult problem because one must extract and interpret anomalous patterns from large amounts of high-dimensional, noisy data. ...
We also thank Tim Griffin and Gianluca Iannaccone for feedback on early drafts. ...
doi:10.1145/1030194.1015492
fatcat:qpr5hm7fl5flbh5vcogjkfw4xq
Detecting the performance impact of upgrades in large operational networks
2010
Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10
This can be achieved manually for a small number of devices, but does not scale to large networks with hundreds or thousands of routers and extremely large number of different upgrades made on a regular ...
The current operational practice in determining the impact of a network upgrade on a set of KPIs involves manual comparison and tracking of each KPI before and after the upgrade at each network location ...
We are grateful to the network operations team for their invaluable help on the data collection, the case-study analysis and application of MERCURY. ...
doi:10.1145/1851182.1851219
dblp:conf/sigcomm/MahimkarSGSWYZE10
fatcat:4xz65nbka5blrnb7aqk4zry3f4
« Previous
Showing results 1 — 15 out of 55 results