SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
BANANAS: an evolutionary framework for explicit and multipath routing in the internet
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
A comparison of overlay routing and multihoming route control
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Why is the internet traffic bursty in short time scales?
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
The problem of synthetically generating IP traffic matrices: initial recommendations
ACM SIGCOMM Computer Communication Review
Providing public intradomain traffic matrices to the research community
ACM SIGCOMM Computer Communication Review
MIRO: multi-path interdomain routing
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
IEEE/ACM Transactions on Networking (TON)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Horizon: balancing tcp over multiple paths in wireless mesh network
Proceedings of the 14th ACM international conference on Mobile computing and networking
Performance evaluation of path splicing on the GÉANT and the Sprint networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Path splicing is a proposed routing architecture for the Internet in which end-hosts could change the path their traffic uses by changing a number of bits in the packet header. Path splicing improves the reliability of the network against link failures since it ensures that physically connected links can be discovered and used. To that end, this paper studies the performance of path splicing in non-adversarial and adversarial environments. In a non-adversarial setting, we investigate the implications behind giving the end-hosts the power to select routes in the absence/presence of errors in the probing mechanisms they are employing to infer the state of the network. In an adversarial setting, we examine the extent to which attackers can exploit path splicing to mount attacks that cause a series of route changes by end-hosts in searching for better paths. Our results are derived from real traffic matrices obtained from the GÉANT network.