Michael G. Kallitsis

Learn More
—In this paper, we present a distributed algorithm to dynamically allocate the available resources of a service-oriented network to delay sensitive network services. We use a utility-based framework to differentiate services based on both their relative profitability and quality-of-service requirements. Our performance metric is the end-to-end delay that a(More)
In this paper, we introduce a model for allocating available resources in service-oriented network, with particular focus on delay-sensitive services. The model is based on a pricing scheme for the offered services and also takes into consideration the quality of service requirements of each service class through a probabilistic delay bound constraint. The(More)
Distributed Denial of Service (DDoS) attacks have become more prominent recently, both in frequency of occurrence, as well as magnitude. Such attacks render key Internet resources unavailable and disrupt its normal operation. It is therefore of paramount importance to quickly identify malicious Internet activity. The DDoS threat model includes(More)
The robustness and integrity of IP networks require efficient tools for traffic monitoring and analysis, which scale well with traffic volume and network size. We address the problem of optimal large-scale monitoring of computer networks under resource constraints. Specifically, we consider the task of selecting the " best " subset of at most K links to(More)
—In this paper, we present a distributed algorithm that dynamically allocates the available resources of a service-oriented network to delay sensitive network services. Our algorithm is based on Gauss-Seidel type iterations. Thus, each node depends on its local information and sends/receives a small number of messages, until convergence is achieved. We use(More)
The Internet, as a global system of interconnected networks, carries an extensive array of information resources and services. Key requirements include good quality-of-service and protection of the infrastructure from nefarious activity (e.g. distributed denial of service—DDoS—attacks). Network monitoring is essential to network engineering, capacity(More)
The robustness and integrity of IP networks require efficient tools for traffic monitoring and analysis, which scale well with traffic volume and network size. We address the problem of optimal large-scale flow monitoring of computer networks under resource constraints. We propose a stochas-tic optimization framework where traffic measurements are done by(More)