On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Internet Web servers: workload characterization and performance implications
IEEE/ACM Transactions on Networking (TON)
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
On-demand computation of policy based routes for large-scale network simulation
WSC '04 Proceedings of the 36th conference on Winter simulation
A structural approach to latency prediction
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Delving into internet streaming media delivery: a quality and resource utilization perspective
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Small-world characteristics of Internet topologies and implications on multicast scaling
Computer Networks: The International Journal of Computer and Telecommunications Networking
A systematic framework for unearthing the missing links: measurements and impact
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Describing and simulating internet routes
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Measuring the effectiveness of infrastructure-level detection of large-scale botnets
Proceedings of the Nineteenth International Workshop on Quality of Service
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Communication by identity discrimination in bio-inspired multi-agent systems
Concurrency and Computation: Practice & Experience
Cybersim: geographic, temporal, and organizational dynamics of malware propagation
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
The Internet has evolved into an indispensable component of our daily lives and protecting its critical infrastructure has thus become a crucial task. In this work, we present and compare different methods to assess the criticality of individual facilities of the Internet infrastructure at a national-level: graph-theoretical analysis, route-based analysis, traffic-based analysis, and consequence-based analysis. Our key observations are: (1) The geographical topology, which is derived from a national-level IP backbone network, has a power-law degree distribution and is a small-world network; (2) A few locations appear much more frequently among all paths in the IP backbone topology than others, and they also witness a high percentage of US Internet traffic. (3) Relative ranking of Internet facility locations from traffic-based analysis differs significantly from those derived from graph-theoretical analysis and route-based analysis, suggesting that a comprehensive, high-fidelity Internet model is necessary to assess critical Internet infrastructure facilities. (4) Consequence-based analysis, although computationally intense, cannot be replaced by other rankings, including traffic-based analysis. Conclusions drawn from this work extend our knowledge regarding the Internet and also shed lights on which critical Internet infrastructure facilities should be protected with limited resources.