Share This Author
Named data networking
The NDN project investigates Van Jacobson's proposed evolution from today's host-centric network architecture (IP) to a data-centricnetwork architecture (NDN), which has far-reaching implications for how the authors design, develop, deploy, and use networks and applications.
NFD Developer's Guide
NFD’s internals are explained including the overall design, major modules, their implementations, and their interactions to help developers extend and improve NFD.
A framework for classifying denial of service attacks
A framework for classifying DoS attacks based on header content, and novel techniques such as transient ramp-up behavior and spectral analysis are introduced, showing that characteristics of attack ramps-up and attack spectrum are more difficult to spoof.
Census and survey of the visible internet
- J. Heidemann, Y. Pryadkin, R. Govindan, C. Papadopoulos, G. Bartlett, J. Bannister
- Computer ScienceIMC '08
- 20 October 2008
This paper is the first to take a census of edge hosts in the visible Internet since 1982, to evaluate the accuracy of active probing for address census and survey, and to quantify these aspects of the Internet.
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks
- Jakub Czyz, M. Kallitsis, Manaf Gharaibeh, C. Papadopoulos, M. Bailey, M. Karir
- Computer ScienceInternet Measurement Conference
- 5 November 2014
The magnitude of this major Internet threat, the community's response, and the effect of that response are shown, in aggregate.
An error control scheme for large-scale multicast applications
- C. Papadopoulos, G. Parulkar, G. Varghese
- Computer ScienceProceedings. IEEE INFOCOM '98, the Conference on…
- 29 March 1998
This work extends the IP multicast service model so that routers provide a more refined form of multicasting, that enables local recovery and presents a scheme that achieves finer grain fault recovery by exploiting new forwarding services that allow to create a dynamic hierarchy of receivers.
Eliminating Steganography in Internet Traffic with Active Wardens
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
COSSACK: Coordinated Suppression of Simultaneous Attacks
- C. Papadopoulos, R. Lindell, J. Mehringer, Alefiya Hussain, R. Govindan
- Computer ScienceProceedings DARPA Information Survivability…
- 22 April 2003
The Cossack project is developing technology to thwart distributed denial of service (DDoS) attacks by deploying a set of watchdogs at edge networks, which employ distributed coordination to rapidly detect, and neutralize attacks.
Argus: End-to-end service anomaly detection and localization from an ISP's point of view
This paper proposes a new approach to detect and localize end-to-end service quality issues in such ISP-managed networked services by utilizing traffic data passively monitored at the ISP side, the ISP network topology, routing tables and geographic information.
Performance of Networked XML-Driven Co-Operative Applications
- Shahram Ghandeharizadeh, C. Papadopoulos, M. Cai, Krishna Chintalapudi
- Computer ScienceConcurr. Eng. Res. Appl.
- 1 September 2004
This paper identifies factors that this middleware must consider in order to reduce response time and must ensure the overhead of compression (increased CPU time) does not exceed its savings (lower transmission time).