There are considerable reasons to wish to understand the relationship between the Internet's control and data planes in times for stress. For example, the much publicized Internet worms - Code Red, Nimda and SQL Slammer - caused BGP storms, but there has been comparatively little study of whether the storms impacted network performance. In this paper, we study these worm events and see whether the BGP storms observed during the worms actually corresponded to problems in the Internet's data plane. By processing and analyzing two datasets from RIPE, we have found that while BGP update storms occurred in all three worms, the performance of the data plane degraded during the Slammer worm but did not during the Code Red and the Nimda. No direct ...
It would valuable to have early warning of disruptions to the Internet. One aspect of Internet funct...
Best paper award.International audienceNetwork operators use the Border Gateway Protocol (BGP) to co...
Malware is becoming an epidemic in computer network nowadays. Malware attacks are a significant thr...
Despite BGP\u27s critical importance as the de-facto Internet inter-domain routing protocol, there i...
Abstract — Despite BGP’s critical importance as the de-facto Internet inter-domain routing protocol,...
Abstract — The increasing incidences of worm attacks in the Internet and the resulting instabilities...
Internet worms pose a significant threat to the stability of the Internet infrastructure. First, the...
We analyze the global BGP routing instabilities observed during the Code Red II and Nimda worm attac...
Abstract. Certain popular metrics have been used to reflect the instability of the Internet control ...
In this paper, we present a snapshot of Internet worm activity from September to November 2001, bear...
Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. T...
This paper examines the network inter-domain routing information exchanged between backbone service ...
In the Internet, Autonomous Systems continuously exchange routing information via the BGP protocol: ...
Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but a...
Abstract—The routing system is playing a critical role in the Internet. Numerous routing security ev...
It would valuable to have early warning of disruptions to the Internet. One aspect of Internet funct...
Best paper award.International audienceNetwork operators use the Border Gateway Protocol (BGP) to co...
Malware is becoming an epidemic in computer network nowadays. Malware attacks are a significant thr...
Despite BGP\u27s critical importance as the de-facto Internet inter-domain routing protocol, there i...
Abstract — Despite BGP’s critical importance as the de-facto Internet inter-domain routing protocol,...
Abstract — The increasing incidences of worm attacks in the Internet and the resulting instabilities...
Internet worms pose a significant threat to the stability of the Internet infrastructure. First, the...
We analyze the global BGP routing instabilities observed during the Code Red II and Nimda worm attac...
Abstract. Certain popular metrics have been used to reflect the instability of the Internet control ...
In this paper, we present a snapshot of Internet worm activity from September to November 2001, bear...
Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. T...
This paper examines the network inter-domain routing information exchanged between backbone service ...
In the Internet, Autonomous Systems continuously exchange routing information via the BGP protocol: ...
Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but a...
Abstract—The routing system is playing a critical role in the Internet. Numerous routing security ev...
It would valuable to have early warning of disruptions to the Internet. One aspect of Internet funct...
Best paper award.International audienceNetwork operators use the Border Gateway Protocol (BGP) to co...
Malware is becoming an epidemic in computer network nowadays. Malware attacks are a significant thr...