Vivaldi: a decentralized network coordinate system
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Modeling distances in large-scale networks by matrix factorization
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Distributed approaches to triangulation and embedding
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Meridian: a lightweight network location service without virtual coordinates
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Scalable routing overlay networks
ACM SIGOPS Operating Systems Review
ClosestNode.com: an open access, scalable, shared geocast service for distributed systems
ACM SIGOPS Operating Systems Review
Advances in metric embedding theory
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
Estimating network proximity and latency
ACM SIGCOMM Computer Communication Review
On suitability of Euclidean embedding of internet hosts
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Grid information service based on network latency
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Evaluation of network impact of content distribution mechanisms
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Real attacks on virtual networks: Vivaldi out of tune
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Improving Gnutella network performance using synthetic coordinates
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Towards a platform for wide-area overlay network deployment and management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Local embeddings of metric spaces
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Should internet service providers fear peer-assisted content distribution?
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
On the accuracy of embeddings for internet coordinate systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Designing a DHT for low latency and high throughput
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Supporting network coordinates on PlanetLab
WORLDS'05 Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2
Reconstructing approximate tree metrics
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Securing internet coordinate embedding systems
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
iPlane: an information plane for distributed services
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
How much anonymity does network latency leak?
Proceedings of the 14th ACM conference on Computer and communications security
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Proceedings of the 14th ACM conference on Computer and communications security
Embedding metric spaces in their intrinsic dimension
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
CHESS: An application-aware space for enhanced scalable services in overlay networks
Computer Communications
Virtual networks under attack: disrupting internet coordinate systems
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Effective diagnosis of routing disruptions from end systems
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
RAQNet: A Topology-Aware Overlay Network
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Online, Dynamic, and Distributed Embeddings of Approximate Ultrametrics
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
On the difficulty of finding the nearest peer in p2p systems
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
On the internet delay space dimensionality
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Shortest-path routing in randomized DHT-based Peer-to-Peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Replication-Aware CDN-P2P Architecture Based on Two-Step Server Selection and Network Coding
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
An application layer multicast approach based on topology-aware clustering
Computer Communications
P2P Networking and Applications
P2P Networking and Applications
Internet Sibilla: utilizing DNS for delay estimation service
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
On the treeness of internet latency and bandwidth
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
iPlane Nano: path prediction for peer-to-peer applications
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
An adaptive latency mitigation scheme for massively multiuser virtual environments
Journal of Network and Computer Applications
Matchmaking for online games and other latency-sensitive P2P systems
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
The partial migration of game state and dynamic server selection to reduce latency
Multimedia Tools and Applications
Scalable Link-Based Relay Selection for Anonymous Routing
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Estimation of network distances using off-line measurements
Computer Communications
IEEE Communications Magazine
DCS: A Distributed Coordinate System for Network Positioning
DS-RT '09 Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications
Practical connectivity-based routing in wireless sensor networks using dimension reduction
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
How much anonymity does network latency leak?
ACM Transactions on Information and System Security (TISSEC)
Estimating internet path properties for distributed applications
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
HNDP: a novel network distance prediction mechanism
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
A cluster based approach for network distance embedding
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
On suitability of Euclidean embedding for host-based network coordinate systems
IEEE/ACM Transactions on Networking (TON)
Veracity: a fully decentralized service for securing network coordinate systems
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Veracity: practical secure network coordinates via vote-based agreements
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Orion: shortest path estimation for large social graphs
WOSN'10 Proceedings of the 3rd conference on Online social networks
Secure latency estimation with treeple
Proceedings of the 17th ACM conference on Computer and communications security
Resolving IP aliases with prespecified timestamps
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Study and performance of localization methods in IP based networks: Vivaldi algorithm
Journal of Network and Computer Applications
Scalable and systematic Internet-wide path and delay estimation from existing measurements
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network coordinates in the wild
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Dynamic landmark triangles: A simple and efficient mechanism for inter-host latency estimation
Computer Networks: The International Journal of Computer and Telecommunications Networking
MISHIMA: multilateration of internet hosts hidden using malicious fast-flux agents
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
ACM Transactions on Information and System Security (TISSEC)
Proximity-aware superpeer overlay topologies
SelfMan'06 Proceedings of the Second IEEE international conference on Self-Managed Networks, Systems, and Services
Locality prediction for oblivious clients
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Internet routing policies and round-trip-times
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Spatial computing: an emerging paradigm for autonomic computing and communication
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Spatial computing: the TOTA approach
Self-star Properties in Complex Information Systems
Securing application-level topology estimation networks: facing the frog-boiling attack
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
NCShield: securing decentralized, matrix factorization-based network coordinate systems
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Network latency prediction using high accuracy prediction tree
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
HybridNN: An accurate and scalable network location service based on the inframetric model
Future Generation Computer Systems
Efficient content-based routing with network topology inference
Proceedings of the 7th ACM international conference on Distributed event-based systems
Shortest-path queries in static networks
ACM Computing Surveys (CSUR)
On the embeddability of random walk distances
Proceedings of the VLDB Endowment
The design and implementation of the A3 application-aware anonymity platform
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper introduces PIC, a practical coordinate-based mechanism to estimate Internet network distance (i.e., round-trip delay or network hops). Network distance estimation is important in many applications, for example, network-aware overlay construction and server selection. There are several proposals for distance estimation in the Internet but they all suffer from problems that limit their benefit. Most rely on a small set of infrastructure nodes that are a single point of failure and limit scalability. Others use sets of peers to compute coordinates but these coordinates can be arbitrarily wrong if one of these peers is malicious. While it may be reasonable to secure a small set of infrastructure nodes, it is unreasonable to secure all peers. PIC addresses these problems: it does not rely on infrastructure nodes and it can compute accurate coordinates even when some peers are malicious. We present PIC's design, experimental evaluation, and an application to network-aware overlay construction and maintenance.