Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
Drawing graphs to convey proximity: an incremental arrangement method
ACM Transactions on Computer-Human Interaction (TOCHI)
Computer
JIGGLE: Java Interactive Graph Layout Environment
GD '98 Proceedings of the 6th International Symposium on Graph Drawing
A Fast Adaptive Layout Algorithm for Undirected Graphs
GD '94 Proceedings of the DIMACS International Workshop on Graph Drawing
H3: laying out large directed graphs in 3D hyperbolic space
INFOVIS '97 Proceedings of the 1997 IEEE Symposium on Information Visualization (InfoVis '97)
An Introduction to the Conjugate Gradient Method Without the Agonizing Pain
An Introduction to the Conjugate Gradient Method Without the Agonizing Pain
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
Topology inference from BGP routing dynamics
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Looking for Science in the Art of Network Measurement
IWDC '01 Proceedings of the Thyrrhenian International Workshop on Digital Communications: Evolutionary Trends of the Internet
Geographic Properties of Internet Routing
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Communications of the ACM - Wireless networking security
Space-optimized tree: a connection+enclosure approach for the visualization of large hierarchies
Information Visualization
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
Experience with an evolving overlay network testbed
ACM SIGCOMM Computer Communication Review
Topology discovery for public IPv6 networks
ACM SIGCOMM Computer Communication Review
Home-centric visualization of network traffic for security administration
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
(Awarded Best Theory Paper!) A Probabilistic Approach to Estimating Computer System Reliability
LISA '01 Proceedings of the 15th USENIX conference on System administration
Efficient algorithms for large-scale topology discovery
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A Visual Exploration Process for the Analysis of Internet Routing Data
Proceedings of the 14th IEEE Visualization 2003 (VIS'03)
EncCon: an approach to constructing interactive visualization of large hierarchical data
Information Visualization
Visualizing Internet Routing Changes
IEEE Transactions on Visualization and Computer Graphics
Proceedings of the 3rd international workshop on Visualization for computer security
Smashing Peacocks Further: Drawing Quasi-Trees from Biconnected Components
IEEE Transactions on Visualization and Computer Graphics
Modifying first person shooter games to perform real time network monitoring and control tasks
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
CluVis: dual-domain visual exploration of cluster/network metadata
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Defense against spoofed IP traffic using hop-count filtering
IEEE/ACM Transactions on Networking (TON)
Role classification of hosts within enterprise networks based on connection patterns
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
IEEE Transactions on Visualization and Computer Graphics
Proceedings of the first international workshop on Location and the web
Faster symmetry discovery using sparsity of symmetries
Proceedings of the 45th annual Design Automation Conference
Knowledge Discovery by Network Visualization
Edutainment '08 Proceedings of the 3rd international conference on Technologies for E-Learning and Digital Entertainment
Visualizing Real-Time Network Resource Usage
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Detection of DDoS attack and defense against IP spoofing
Proceedings of the International Conference on Advances in Computing, Communication and Control
On the Impact of Clustering on Measurement Reduction
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Network stack diagnosis and visualization tool
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
Configuration management and security
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Increasing the coverage of a cooperative internet topology discovery algorithm
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Visualizing internet evolution on the autonomous systems level
GD'07 Proceedings of the 15th international conference on Graph drawing
Journal of Visual Languages and Computing
Demystifying service discovery: implementing an internet-wide scanner
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Proceedings of the 26th Annual Computer Security Applications Conference
Brief announcement: on the hardness of topology inference
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
On the hardness of topology inference
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
The weak network tracing problem
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Misleading stars: what cannot be measured in the Internet?
DISC'11 Proceedings of the 25th international conference on Distributed computing
Evaluation of a large-scale topology discovery algorithm
IPOM'06 Proceedings of the 6th IEEE international conference on IP Operations and Management
Algorithmic foundations of the internet: roundup
CAAN'04 Proceedings of the First international conference on Combinatorial and Algorithmic Aspects of Networking
Improved algorithms for network topology discovery
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Victim-Assisted mitigation technique for TCP-Based reflector DDoS attacks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
GerbilSphere: Inner sphere network visualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Conflict anticipation in the search for graph automorphisms
LPAR'12 Proceedings of the 18th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
A survey of security visualization for computer network logs
Security and Communication Networks
Visual analysis of complex firewall configurations
Proceedings of the Ninth International Symposium on Visualization for Cyber Security
The readability of path-preserving clusterings of graphs
EuroVis'10 Proceedings of the 12th Eurographics / IEEE - VGTC conference on Visualization
A novel and efficient source-path discovery and maintenance method for application layer multicast
Computers and Electrical Engineering
DataTraffic Monitoring and Analysis
Demystifying internet-wide service discovery
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
We have been collecting and recording routing paths from a test host to each of over 90,000 registered networks on the Internet since August 1998. The resulting database contains intersting routing and reachability information, and is available to the public for research purpose. The daily scans cover approximately a tenth of the networks on the Internet, with a full scan run roughly once a month. We have also been collecting Lucent's intranet data, and applied these tools to understanding its size and connectivity. We have also detected the sloss of power to routers in Yugoslavia as the result of NATO bombing. A simulated spring-force algorithm lays out the graphs thgat results from these database. This algorithm is well known, but has never been applied to such a large problem. The Internet graph, with around 88,000 nodes and 100,000 edges, is larger than those previsouly considered tractable by the data visualization community. The resulting Internet layouts are pleasent, though rather cluttered. On smaller networks, like Lucent's intranet, the layouts present the data in a useful way. For the Internet data, we have also tried plotting a minimum distance spanning tree; by throwing away edges, the remaining graph can be made more accessible. Once a layout is chosen, it can be colored in various ways to show network-relevant data, such as IP address, domain information, location, ISPs, and result of scan (completed, filtered, loop, etc). This paper expands and updates the description of the project given in an IEEE Computer article [1].