Sciweavers

666 search results - page 43 / 134
» Describing and simulating internet routes
Sort
View
CCS
2006
ACM
13 years 11 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
MASCOTS
1998
13 years 9 months ago
Simulation-based 'STRESS' Testing Case Study: A Multicast Routing Protocol
In this work, we propose a method for using simulation to analyze the robustness of multiparty (multicastbased) protocols in a systematic fashion. We call our method Systematic Te...
Ahmed Helmy, Deborah Estrin
IEEEARES
2009
IEEE
14 years 2 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
SIGCOMM
2010
ACM
13 years 8 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
ANNALS
2006
63views more  ANNALS 2006»
13 years 8 months ago
The Virtual Life of ENIAC: Simulating the Operation of the First Electronic Computer
This paper describes an interactive simulation of the Electronical Numerical Integrator and Computer (ENIAC). With the simulator, the user can wire up complex configurations of th...
Till Zoppke, Raúl Rojas