Learn More
IP forwarding anomalies, triggered by equipment failures, implementation bugs, or configuration errors, can significantly disrupt and degrade network service. Robust and reliable detection of such anomalies is essential to rapid problem diagnosis, problem mitigation, and repair. We propose a simple, robust method that integrates routing and traffic data(More)
Certain popular metrics have been used to reflect the instability of the Internet control plane, such as the volume and duration of BGP updates. However, it is unclear whether there is a direct relationship between those metrics and the data plane performance, especially as the Internet is becoming more densely connected and many networks become(More)
There are considerable reasons to wish to understand the relationship between the Internet’s control and data planes in times for stress. For example, the much publicized Internet worms—Code Red, Nimda and SQL Slammer—caused BGP storms, but there has been comparatively little study of whether the storms impacted network performance. In this paper, we study(More)
Modern SMTP servers apply a variety of mechanisms to stem the volume of spam delivered to users. These techniques can be broadly classified into two categories: preacceptance approaches, which apply prior to a message being accepted (e.g blacklisting and whitelisting), and post-acceptance techniques which apply after a message has been accepted (e.g.(More)
In recent days, technology has reached new heights. In the same way malicious programs has also touched the level of sky and the above. Secret information are nowadays stored and managed through high secure sites. However, critical problems like hacking happens due to DDOS(Distributed Denial of Service Attacks) resulting in crashing of website for certain(More)
he Internet is an interconnection of multiple networks called domains or autonomous systems (ASes). Each AS appears to the rest of the Internet as a contiguous network with a common routing policy. There are two types of ASes. A stub AS contains end hosts and only forwards packets for which it is either the source or the destination. Enterprise, campus, and(More)
  • 1