Publications

this is the page that is built with the complete set of publications, which is

seaerchable. There is a link from the shorter version to here. quite useful.

DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at Scale

Volumetric Distributed Denial of Service (DDoS) attacks have been a severe threat to the Internet for more than two decades. Some …

Provable Non-Frameability for 5G Lawful Interception

Mobile networks have grown in size and relevance, with novel applications in areas including transportation, finance, and health. The …

Light, Camera, Actions: characterizing the usage of IXPs' action BGP communities

Border Gateway Protocol (BGP) communities, an optional message attribute, allow network operators to tag BGP announcements and act on …

POSTER: No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios

The expansion of mobile network capabilities throughout the decades has increased people’s exposure to the digital world, and the …

Shoehorn: Towards Portable P4 for Low Cost Hardware

Having a consistent application stack for hardware from multiple vendors allows operators to build simpler, more stable networks. …

On the Latency Impact of Remote Peering

Internet Exchange Points (IXPs) play an essential role in the Internet, providing a fabric for thousands of Autonomous Systems (ASes) …

Helix: Traffic Engineering for Multi-Controller SDN

Recent trends in software-defined networking have extended network programmability to the data plane through programming languages such …

Dynamic Property Enforcement in Programmable Data Planes

Network programmers can currently deploy an arbitrary set of protocols in forwarding devices through data plane programming languages …

AS-Path Prepending: there is no rose without a thorn

Inbound traffic engineering (ITE)—the process of announcing routes to, e.g., maximize revenue or minimize congestion—is an essential …

POSTER: Dynam-IX: a Dynamic Interconnection eXchange

Internet connectivity is changing. Autonomous Systems (ASes) can now reach hundreds of networks directly through Internet eXchange …

Picking a Partner: A Fair Blockchain Based Scoring Protocol for Autonomous Systems

We tackle the problem of enabling Autonomous Systems (ASes) to evaluate network providers on the basis of their adherence to Service …

POSTER: Dynam-IX: a Dynamic Interconnection eXchange

Internet connectivity is changing: Autonomous Systems (ASes) can now reach hundreds of networks directly through interconnections at …

POSTER: Finding vulnerabilities in P4 programs with assertion-based verification

Current trends in SDN extend network programmability to the data plane through the use of programming languages such as P4. In this …

Sandboxing Data Plane Programs for Fun and Profit

This paper describes the design and implementation of a general-purpose compile-time sandbox for P4 data plane programs. Our mechanism …

Packer: Minimizing multi-resource fragmentation and performance interference in datacenters

—Cloud applications perform rich and complex tasks, with time-varying demands for multiple types of resources (CPU, memory, disk I/O …

Optimal Service Function Chain Composition in Network Functions Virtualization

Network Functions Virtualization (NFV) is an emerging ini- tiative where virtualization is used to consolidate Network Functions (NFs) …

Off the Wire Control: Improving the Control Plane Resilience through Cellular Networks

Software Defined Networks simplify network pro- grammability by detaching the control plane from forwarding devices and deploying it …

IoNCloud: exploring application affinity to improve utilization and predictability in datacenters

The intra-cloud network is typically shared in a best-effort manner, which causes tenant applications to have no actual bandwidth …

Hierarchical Content Stores in High-Speed ICN Routers

Recent work motivates the design of Information-centric rou- ters that make use of hierarchies of memory to jointly scale in the size …

CCNrel: Leveraging relations among objects to improve the performance of CCN

Content-Centric Networking (CCN) is a promising architectural approach that focuses on the efficient distribution of uniquely named …

Survivor: An enhanced controller placement strategy for improving SDN survivability.

In SDN, forwarding devices can only operate cor- rectly while connected to a logically centralized controller. To avoid …

Slowing down to speed up: Protecting users against massive attacks in content distribution systems

Content Distribution Systems (CDS) are those de- signed to efficiently deliver (to interested parties) a variety of contents. CDS may …

Reconnecting Partitions on Physical Infrastructures: Towards an Expansion Strategy for Efficient Virtual Network Embedding

One of the research challenges approached recently in the literature is the efficient mapping of virtual networks on top of physical …

HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding

As research in the area of network virtualization continues to advance, there have been numerous efforts to solve the challenge of …

A heuristic-based algorithm for privacy-oriented virtual network embedding

Network virtualization has become increasingly popular in recent years. It has the potential to allow timely handling of network …

DoS-resilient virtual networks through multipath embedding and opportunistic recovery

Network virtualization can potentially limit the impact of attacks by isolating traffic from different networks. However, routers and …

Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems

Content Distribution Systems (CDS) are those designed to efficiently deliver (to interested parties) a variety of contents. CDS may be …

No more backups: Toward efficient embedding of survivable virtual networks

Although network virtualization can improve security by isolating traffic from different networks, routers and links are still …

Characterizing the impact of network substrate topologies on virtual network embedding

Network virtualization is a mechanism that allows the coexistence of multiple virtual networks on top of a single physical substrate. …

Disconnecting to connect: Understanding optimistic disconnection in BitTorrent

The significance of BitTorrent motivated various studies focused on modeling and evaluating the protocol charac- teristics and its …

Beyond network simulators: Fostering novel distributed applications and protocols through extendible design

Simulation has been of paramount importance to the development of novel Internet protocols. Such an approach typically focuses on one …

Funnel: Choking Polluters in BitTorrent File Sharing Communities

BitTorrent-based file sharing communities are very popular nowadays. Anecdotal evidence hints that such communi- ties are exposed to …

Flexible and secure service discovery in ubiquitous computing

The realization of ubiquitous computing requires achieving seamless service provisioning for users and devices everywhere. However, …

TorrentLab: Investigating BitTorrent through simulation and live experiments

BitTorrent is probably the most popular file sharing protocol nowadays. Since it is a complex protocol which was created mostly as an …

Protecting BitTorrent: Design and evaluation of effective countermeasures against DoS attacks

BitTorrent is a P2P file-sharing protocol that can be used to efficiently distribute files such as software updates and digital content …

Attacking a swarm with a band of liars: Evaluating the impact of attacks on BitTorrent

BitTorrent has become one of the most popular Internet applications, given the number of users and the fraction of the Internet traffic …

Bridging the gap between simulation and experimental evaluation in computer networks

Simulation and experimentation are two complementary techniques for performance evaluation, each one of them having opposite …

Hybrid reliable multicast with TCP-XM

In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. …

Congestion control with ECN support in poll-based multicast protocols

Most of the traffic in the Internet nowadays is transmitted using TCP, or Transport Control Protocol. The stability of the Internet …

Evaluating high-throughput reliable multicast for grid applications in production networks

Grid computing can be characterized as a distributed infrastructure that is a collection of computing resources within or across …

High-Performance Reliable Multicasting for Grid Applications

Grid computing can be characterized as a distributed infrastructure that joins computing resources of multiple organizations together …

Towards a flexible security framework for peer-to-peer based grid computing

The dynamic, multi-organization nature of large-scale grid computing introduces security issues that must be addressed before grid …

Simmcast: a Simulation Tool for Multicast Protocol Evaluation

This paper describes Simmcast, a process-based discrete-event simulation framework that helps the design and evaluation of multicast …

PRMP: A Scaleable Polling-based Reliable Multicast Protocol

Traditional reliable unicast protocols (e.g., TCP), known as sender-initiated schemes, do not scale well for one-to-many reliable …