Filters








55 Hits in 3.4 sec

Visual analytics for BGP monitoring and prefix hijacking identification

E. Biersack, Q. Jacquemart, F. Fischer, J. Fuchs, O. Thonnard, G. Theodoridis, D. Tzovaras, P. Vervier
2012 IEEE Network  
The control plane of the Internet relies entirely on BGP as inter-domain routing protocol to maintain and exchange routing information between large network providers and their customers.  ...  Finally, we present an analysis of a real validated case of prefix hijacking, which took place between April and August 2011.  ...  The algorithms can be enriched with additional data sources like traffic flows or router configuration files to improve the diagnosis of BGP anomalies.  ... 
doi:10.1109/mnet.2012.6375891 fatcat:7btbqq2oirgenbbkgv64nd7kgm

G-RCA: A Generic Root Cause Analysis Platform for Service Quality Management in Large IP Networks

He Yan, Lee Breslau, Zihui Ge, Dan Massey, Dan Pei, Jennifer Yates
2012 IEEE/ACM Transactions on Networking  
In this paper we describe the design and development of a Generic Root Cause Analysis platform (G-RCA) for service quality management (SQM) in large IP networks.  ...  As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online banking, and even to mission-critical 911  ...  The reflectors which feed the ingress router with BGP updates are extracted from the daily archive of router configurations; BGP decision process at the ingress router is emulated based on the BGP route  ... 
doi:10.1109/tnet.2012.2188837 fatcat:hkk5nsi7g5gq5kzhmfsf77vtru

G-RCA

He Yan, Lee Breslau, Zihui Ge, Dan Massey, Dan Pei, Jennifer Yates
2010 Proceedings of the 6th International COnference on - Co-NEXT '10  
In this paper we describe the design and development of a Generic Root Cause Analysis platform (G-RCA) for service quality management (SQM) in large IP networks.  ...  As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online banking, and even to mission-critical 911  ...  The reflectors which feed the ingress router with BGP updates are extracted from the daily archive of router configurations; BGP decision process at the ingress router is emulated based on the BGP route  ... 
doi:10.1145/1921168.1921175 dblp:conf/conext/YanBGMPY10 fatcat:rye4ohf23zdgldqu6l2yamfotq

Anomaly Detection Approaches for Communication Networks [chapter]

Marina Thottan, Guanglei Liu, Chuanyi Ji
2010 Computer Communications and Networks  
Applications of anomaly detection typically stem from the perspectives of network monitoring and network security.  ...  In this chapter we review three main approaches to network anomaly detection: statistical methods, streaming algorithms, and machine learning approaches with a focus on unsupervised learning.  ...  In a separate work [36] , Mandjes et al. consider anomaly detection in voice over IP network based on the analysis of the variance of byte counts.  ... 
doi:10.1007/978-1-84882-765-3_11 dblp:series/ccn/ThottanLJ10 fatcat:md23gj62mjc6jfbc3rfxyzz73a

Darkstar: Using exploratory data mining to raise the bar on network reliability and performance

Charles R. Kalmanek, Ihui Ge, Seungjoon Lee, Carsten Lund, D an Pei, Joseph Seidel, Jacobus van der Merwe, Jennifer Ates
2009 2009 7th International Workshop on Design of Reliable Communication Networks  
This trend challenges service providers to raise the bar on the performance and reliability of network services.  ...  We present an overview of key applications that are built on top of the Darkstar system to illustrate the power of the approach.  ...  ACKNOWLEDGMENTS The authors thank the AT&T network and service operations teams for invaluable collaborations with us, their Research partners, over the years.  ... 
doi:10.1109/drcn.2009.5340032 fatcat:wnc4pohr5beb7oqk3ednp5idym

Zooming in on wide-area latencies to a global cloud provider

Yuchen Jin, Sundararajan Renganathan, Ganesh Ananthanarayanan, Junchen Jiang, Venkata N. Padmanabhan, Manuel Schroder, Matt Calder, Arvind Krishnamurthy
2019 Proceedings of the ACM Special Interest Group on Data Communication - SIGCOMM '19  
BlameIt uses passive diagnosis, using measurements of existing connections between clients and the cloud locations, to localize the cause to one of cloud, middle, or client segments.  ...  In particular, we focus on instances of latency degradation and design a tool, BlameIt, that enables cloud operators to localize the cause (i.e., faulty AS) of such degradation.  ...  Sorabh Gandhi provided feedback in the early stages of the work.  ... 
doi:10.1145/3341302.3342073 dblp:conf/sigcomm/JinRAJPSCK19 fatcat:ynioykguqbeahml5yw53zbuj5y

Policy-based BGP control architecture for autonomous routing management

Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara
2006 Proceedings of the 2006 SIGCOMM workshop on Internet network management - INM '06  
Unexpected temporal and spatial changes of inter-AS routing behavior often lead to the necessity of on-demand inter-domain routingadjustment.  ...  Some evaluation results indicate that VR can effectively change routing over BGP data on the actual Internet and some control scenarios based on policy descriptions demonstrate the validity of our basic  ...  For diagnosis of inter-AS routing anomalies, we have proposed a CDPS approach [4] to cope with these problems. Simple centralized models are difficult to apply.  ... 
doi:10.1145/1162638.1162651 fatcat:nxuepftqhbha5jc7p7p3pk453q

Crowd-based detection of routing anomalies on the internet

Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
2015 2015 IEEE Conference on Communications and Network Security (CNS)  
In this paper we present and evaluate a user-centric crowd-based approach in which users passively monitor their network traffic, share information about potential anomalies, and apply combined collaborative  ...  statistics to identify potential routing anomalies.  ...  Without large-scale deployment of crypto-based solutions [1] , organizations often instead rely on centralized and decentralized monitoring solutions for anomaly detection in BGP.  ... 
doi:10.1109/cns.2015.7346850 dblp:conf/cns/HiranCS15 fatcat:qyihgs2l35btfky62ufi2tmpra

Topology-Aware Correlated Network Anomaly Event Detection and Diagnosis

Prasad Calyam, Manojprasadh Dhanapalan, Mukundan Sridharan, Ashok Krishnamurthy, Rajiv Ramnath
2013 Journal of Network and Systems Management  
as having a common root-cause(s), (b) order anomaly events based on severity (i.e., the entry with the highest ratio value of 'common event ratio temporally' to 'common hops ratio spatially' tops the  ...  Our scheme involves spatial and temporal analyses on combined topology and uncorrelated anomaly events information for detection of correlated anomaly events.  ...  Various traffic related anomaly events are caused due to IP route/AS path change events that involve traffic re-routing on backup paths due to ISP traffic migration for maintenance reasons involving BGP  ... 
doi:10.1007/s10922-013-9286-0 fatcat:ha3acm7h7nfsdcb3qipg4nl2ry

NetSearch: Googling large-scale network management data

Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Jim Xu
2014 2014 IFIP Networking Conference  
In order to ensure the service quality, modern Internet Service Providers (ISPs) invest tremendously on their network monitoring and measurement infrastructure.  ...  We observe that unlike the textural information on the Internet, network data are typically annotated with time and location information, which can be further augmented using information based on network  ...  time: from BGP neighbor IP to a local interface IP then to interface name.  ... 
doi:10.1109/ifipnetworking.2014.6857131 dblp:conf/networking/QiuGPWX14 fatcat:si6gfnyorfftdkib4n2gqbohna

I-seismograph: Observing and measuring Internet earthquakes

Jun Li, Scott Brooks
2011 2011 Proceedings IEEE INFOCOM  
Since routing is the most basic function of the Internet and the Border Gateway Protocol (BGP) is the de facto standard inter-domain routing protocol, we focus on BGP.  ...  We show that we can evaluate the impact on BGP during an arbitrary period, including doing so in real time.  ...  In doing so, it must consider both the spatial and temporal aspects of BGP.  ... 
doi:10.1109/infcom.2011.5935090 dblp:conf/infocom/LiB11 fatcat:2m6up2rszzhitplhfzgri4vxja

Failure Diagnosis of Complex Systems [chapter]

Soila P. Kavulya, Kaustubh Joshi, Felicita Di Giandomenico, Priya Narasimhan
2012 Resilience Assessment and Evaluation of Computing Systems  
Failure diagnosis is the process of identifying the causes of impairment in a system's function based on observable symptoms, i.e., determining which fault led to an observed failure.  ...  This chapter presents a survey of automated failure diagnosis techniques including both model-based and model-free approaches.  ...  analysis to detect faults in BGP router configurations by checking them against a high-level correctness specification.  ... 
doi:10.1007/978-3-642-29032-9_12 fatcat:dyxufulyhfgpfbjruwizaj7eia

Diagnosing network-wide traffic anomalies

Anukool Lakhina, Mark Crovella, Christophe Diot
2004 Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04  
This method is based on a separation of the high-dimensional space occupied by a set of network traffic measurements into disjoint subspaces corresponding to normal and anomalous network conditions.  ...  It is a difficult problem because one must extract and interpret anomalous patterns from large amounts of high-dimensional, noisy data.  ...  We also thank Tim Griffin and Gianluca Iannaccone for feedback on early drafts.  ... 
doi:10.1145/1015467.1015492 dblp:conf/sigcomm/LakhinaCD04 fatcat:jihyxhjijbhwnb5b7dinpmnamm

Diagnosing network-wide traffic anomalies

Anukool Lakhina, Mark Crovella, Christophe Diot
2004 Computer communication review  
This method is based on a separation of the high-dimensional space occupied by a set of network traffic measurements into disjoint subspaces corresponding to normal and anomalous network conditions.  ...  It is a difficult problem because one must extract and interpret anomalous patterns from large amounts of high-dimensional, noisy data.  ...  We also thank Tim Griffin and Gianluca Iannaccone for feedback on early drafts.  ... 
doi:10.1145/1030194.1015492 fatcat:qpr5hm7fl5flbh5vcogjkfw4xq

Detecting the performance impact of upgrades in large operational networks

Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Joanne Emmons
2010 Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10  
This can be achieved manually for a small number of devices, but does not scale to large networks with hundreds or thousands of routers and extremely large number of different upgrades made on a regular  ...  The current operational practice in determining the impact of a network upgrade on a set of KPIs involves manual comparison and tracking of each KPI before and after the upgrade at each network location  ...  We are grateful to the network operations team for their invaluable help on the data collection, the case-study analysis and application of MERCURY.  ... 
doi:10.1145/1851182.1851219 dblp:conf/sigcomm/MahimkarSGSWYZE10 fatcat:4xz65nbka5blrnb7aqk4zry3f4
« Previous Showing results 1 — 15 out of 55 results