Now showing items 1-20 of 104

    • Process Mining, Discovery, and Integration Using Distance Measures 

      Bae, Joonsoo; Caverlee, James; Liu, Ling; Rouse, William B. (Georgia Institute of Technology, 2006)
      Business processes continue to play an important role in today's service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent ...
    • Understanding the Network­-Level Behavior of Spammers 

      Ramachandran, Anirudh; Feamster, Nick (Georgia Institute of Technology, 2006)
      This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent (in time) each spamming host is, ...
    • Network-Wide Prediction of BGP Routes 

      Feamster, Nick; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      This paper presents provably correct algorithms for computing the outcome of the BGP route-selection process for each router in a network, without simulating the complex details of BGP message passing. The algorithms ...
    • How to Lease the Internet in Your Spare Time 

      Feamster, Nick; Gao, Lixin; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new ...
    • Scalable Hash-based IP Traceback Using Rate-limited Probabilistic Packet Marking 

      Sung, Minho; Chiang, Jason; Xu, Jun (Georgia Institute of Technology, 2006)
      Recent surveys show that DDoS attack is still one of the major threats to the Internet security. Many techniques have been proposed to trace the origin of attacking packets, known as IP traceback problem, using either ...
    • Quality Improvement of Requirements Specification via Automatically Created Object Oriented Models 

      Popescu, Daniel (Georgia Institute of Technology, 2006)
      In industry most software requirements specifications are written in natural language. Software analysts prefer natural language over formal languages because it increases the communication between all stakeholders. ...
    • On the Congestion Responsiveness of Aggregate Internet Traffic: Open-loop vs Closed-loop Session Arrivals 

      Prasad, Ravi S.; Dovrolis, Constantinos (Georgia Institute of Technology, 2006)
      A traffic aggregate is congestion responsive if it reacts to network congestion by reducing its rate. The congestion responsiveness of Internet traffic has been largely attributed to TCP's congestion control. In this ...
    • Hierarchical Power Management in Disruption Tolerant Networks with Traffic-Aware Optimization 

      Jun, Hyewon; Ammar, Mostafa H. (Mostafa Hamed); Corner, Mark D.; Zegura, Ellen W. (Georgia Institute of Technology, 2006)
      Disruption tolerant networks (DTNs) are wireless mobile networks that are characterized by frequent partitions and long delays. Such networks can be used in highly-challenged environment in which energy resources are ...
    • Overlay Network Assignment in PlanetLab With NetFinder 

      Zhu, Yong; Ammar, Mostafa H. (Mostafa Hamed) (Georgia Institute of Technology, 2006)
      PlanetLab has been widely used in the networking community to test and deploy user-defined overlays. Serving as a meta testbed to support multiple overlay networks, PlanetLab has significantly lowered the barriers to ...
    • Capacity Enhancement Using Throw-Boxes in Mobile Delay Tolerant Networks 

      Zhao, Wenrui; Chen, Yang; Ammar, Mostafa H. (Mostafa Hamed); Corner, Mark D.; Levine, Brian; Zegura, Ellen W. (Georgia Institute of Technology, 2006)
      Delay tolerant networks (DTNs) are a class of emerging networks that are subject to frequent and long-duration partitions. Due to intermittent connectivity, DTNs might be significantly limited in supporting application ...
    • Building a Better Mousetrap 

      Ramachandran, Anirudh; Seetharaman, Srinivasan; Feamster, Nick; Vazirani, Vijay (Georgia Institute of Technology, 2007)
      Routers in the network core are unable to maintain detailed statistics for every packet; thus, traffic statistics are often based on packet sampling, which reduces accuracy. Because tracking large ("heavy-hitter") traffic ...
    • Life (and routing) on the Wireless Manifold 

      Kanade, Varun; Vempala, Santosh (Georgia Institute of Technology, 2007)
      We present the wireless manifold, a 2-dimensional surface in 3-dimensional space with the property that geodesic distances accurately capture wireless signal strengths. A compact representation of the manifold can be ...
    • Fast Flux Service Networks: Dynamics and Roles in Hosting Online Scams 

      Feamster, Nick; Konte, Maria; Jung, Jaeyeon (Georgia Institute of Technology, 2008)
      This paper studies the dynamics of fast flux service networks and their role in online scam hosting infrastructures. By monitoring changes in DNS records of over 350 distinct fast flux domains collected from URLs in ...
    • A Feature-based Sampling Method to Detect Anomalous Patterns in High Dimensional Datasets 

      Nguyen, Minh Quoc; Mark, Leo; Omiecinski, Edward (Georgia Institute of Technology, 2008)
      We introduce a feature-based sampling method to detect anomalous patterns. By recognizing that an observation is considered normal because there are many observations similar to it, we formally define the problem of ...
    • Operating System Interface Obfuscation and the Revealing of Hidden Operations 

      Srivastava, Abhinav; Lanzi, Andrea; Giffin, Jonathon (Georgia Institute of Technology, 2008)
      Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of standard system call interfaces to reason about ...
    • A Distributed Protocol for Fractional Stable Paths Problem 

      Kintali, Shiva (Georgia Institute of Technology, 2008)
      The Border Gateway Protocol (BGP) is currently the only interdomain routing protocol deployed in the Internet. BGP can be viewed as a distributed algorithm for solving the Stable Paths Problem (SPP) [4]. Not every instance ...
    • Packets with Provenance 

      Ramachandran, Anirudh; Bhandankar, Kaushik; Tariq, Mukarram Bin; Feamster, Nick (Georgia Institute of Technology, 2008)
      Traffic classification and distinction allows network operators to provision resources, enforce trust, control unwanted traffic, and traceback unwanted traffic to its source. Today’s classification mechanisms rely ...
    • Subspace Outlier Detection in Data with Mixture of Variances and Noise 

      Nguyen, Minh Quoc; Mark, Leo; Omiecinski, Edward (Georgia Institute of Technology, 2008)
      In this paper, we introduce a bottom-up approach to discover clusters of outliers in any m-dimensional subspace from an n-dimensional space. First, we propose a method to compute the outlier score for all points in each ...
    • Managing BGP Routes with a BGP Session Multiplexer 

      Valancius, Vytautas; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients ...
    • LOCK: Locating Countermeasure-Capable Prefix Hijackers 

      Qiu, Tongqing; Ji, Lusheng; Pei, Dan; Wang, Jia; Xu, Jun; Ballani, Hitesh (Georgia Institute of Technology, 2008)
      Prefix hijacking is known as one of the security threats on today’s Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step ...