Search For:

Displaying 1-12 out of 12 total
Research Roadmap on Security Measurements
Found in: SysSec Workshop
By Xenofontas Dimitropoulos
Issue Date:July 2011
pp. 83-85
In the context of the SysSec Network of Excellence call for consolidating the European (and international) systems security research community, this position paper aims at summarizing the current research activities in the Communication Systems Group (CSG)...
Modeling Autonomous-System Relationships
Found in: Parallel and Distributed Simulation, Workshop on
By Xenofontas Dimitropoulos, George Riley
Issue Date:May 2006
pp. 143-149
The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocols. Despite the volume of research in this area the last several years, curren...
Large-Scale Simulation Models of BGP
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Xenofontas A. Dimitropoulos, George F. Riley
Issue Date:October 2004
pp. 287-294
The complex nature of the Border Gateway Protocol (BGP) is not amenable to analytical modeling, and thus simulation-based analysis methods are needed to understand its behavior. To this end, we investigate techniques that make large-scale BGP simulations f...
Creating Realistic BGP Models
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Xenofontas A. Dimitropoulos, George F. Riley
Issue Date:October 2003
pp. 64
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lead to demanding requirements for the simulation developer. These requirements i...
Understanding Network Forensics Analysis in an Operational Environment
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Elias Raftopoulos,Xenofontas Dimitropoulos
Issue Date:May 2013
pp. 111-118
The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we conduct a complex experiment to expand our understanding of forensics analysis processes. During...
FaRNet: fast recognition of high multi-dimensional network traffic patterns
Found in: Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems (SIGMETRICS '13)
By Ignasi Paredes-Oliva, Pere Barlet-Ros, Xenofontas Dimitropoulos
Issue Date:June 2013
pp. 355-356
Extracting knowledge from big network traffic data is a matter of foremost importance for multiple purposes ranging from trend analysis or network troubleshooting to capacity planning or traffic classification. An extremely useful approach to profile traff...
RasterZip: compressing network monitoring data with support for partial decompression
Found in: Proceedings of the 2012 ACM conference on Internet measurement conference (IMC '12)
By Francesco Fusco, Michail Vlachos, Xenofontas Dimitropoulos
Issue Date:November 2012
pp. 51-64
Network traffic archival solutions are fundamental for a number of emerging applications that require: a) efficient storage of high-speed streams of traffic records and b) support for interactive exploration of massive datasets. Compression is a fundamenta...
Classifying internet one-way traffic
Found in: Proceedings of the 2012 ACM conference on Internet measurement conference (IMC '12)
By Eduard Glatz, Xenofontas Dimitropoulos
Issue Date:November 2012
pp. 37-50
Internet background radiation (IBR) is a very interesting piece of Internet traffic as it is the result of attacks and misconfigurations. Previous work has primarily analyzed IBR traffic to large unused IP address blocks called network telescopes. In this ...
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
Found in: ACM Transactions on Information and System Security (TISSEC)
By Martin Burkhart, Xenofontas Dimitropoulos
Issue Date:December 2011
pp. 1-30
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use secure mult...
Digging into HTTPS: flow-based classification of webmail traffic
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Dominik Schatzmann, Thrasyvoulos Spyropoulos, Wolfgang Muhlbauer, Xenofontas Dimitropoulos
Issue Date:November 2010
pp. 322-327
Recently, webmail interfaces, e.g., Horde, Outlook Web Access, and webmail platforms such as GMail, Yahoo!, and Hotmail have seen a tremendous boost in popularity. Given the importance of e-mail for personal and business use alike, and its exposure to immi...
Automating root-cause analysis of network anomalies using frequent itemset mining
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Daniela Brauckhoff, Ignasi Paredes-Oliva, Maurizio Molina, Pere Barlet-Ros, Xenofontas Dimitropoulos
Issue Date:August 2010
pp. 112-ff
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work, we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize the traffic flows causing an anomaly. Ou...
Graph annotations in modeling complex network topologies
Found in: ACM Transactions on Modeling and Computer Simulation (TOMACS)
By Amin Vahdat, Dmitri Krioukov, George Riley, Xenofontas Dimitropoulos
Issue Date:October 2009
pp. 1-29
The coarsest approximation of the structure of a complex network, such as the Internet, is a simple undirected unweighted graph. This approximation, however, loses too much detail. In reality, objects represented by vertices and edges in such a graph posse...