Skip to main content

Showing 1–20 of 20 results for author: Kotronis, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.02346  [pdf, ps, other

    cs.NI

    Estimating the Impact of BGP Prefix Hijacking

    Authors: Pavlos Sermpezis, Vasileios Kotronis, Konstantinos Arakadakis, Athena Vakali

    Abstract: BGP prefix hijacking is a critical threat to the resilience and security of communications in the Internet. While several mechanisms have been proposed to prevent, detect or mitigate hijacking events, it has not been studied how to accurately quantify the impact of an ongoing hijack. When detecting a hijack, existing methods do not estimate how many networks in the Internet are affected (before an… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: IFIP Networking conference 2021

  2. arXiv:2010.03183  [pdf, ps, other

    cs.NI cs.MM

    Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments

    Authors: Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Daniel Menasché, Thrasyvoulos Spyropoulos

    Abstract: Joint caching and recommendation has been recently proposed as a new paradigm for increasing the efficiency of mobile edge caching. Early findings demonstrate significant gains for the network performance. However, previous works evaluated the proposed schemes exclusively on simulation environments. Hence, it still remains uncertain whether the claimed benefits would change in real settings. In th… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: text overlap with arXiv:1806.02704

  3. O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

    Authors: George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos, Vasileios Giotsas

    Abstract: Internet eXchange Points (IXPs) are Internet hubs that mainly provide the switching infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs was to bring together networks residing in the same city or country, and thus keep local traffic local, this model is gradually shifting. Many networks connect to IXPs without having physical presence at their switching inf… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

  4. arXiv:1906.03172  [pdf, ps, other

    cs.NI

    Validating IP Prefixes and AS-Paths with Blockchains

    Authors: Ilias Sfirakis, Vasileios Kotronis

    Abstract: Networks (Autonomous Systems-AS) allocate or revoke IP prefixes with the intervention of official Internet resource number authorities, and select and advertise policy-compliant paths towards these prefixes using the inter-domain routing system and its primary enabler, the Border Gateway Protocol (BGP). Securing BGP has been a long-term objective of several research and industrial efforts during t… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: draft report on BGP blockchain PoC

  5. arXiv:1905.04150  [pdf, ps, other

    cs.NI cs.PF

    Inferring Catchment in Internet Routing

    Authors: Pavlos Sermpezis, Vasileios Kotronis

    Abstract: BGP is the de-facto Internet routing protocol for exchanging prefix reachability information between Autonomous Systems (AS). It is a dynamic, distributed, path-vector protocol that enables rich expressions of network policies (typically treated as secrets). In this regime, where complexity is interwoven with information hiding, answering questions such as "what is the expected catchment of the an… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

    Comments: ACM Sigmetrics 2019

    Journal ref: Proceedings of the ACM on the Measurement and Analysis of Computing Systems (POMACS), Vol. 3, No. 2, Article 30. Publication date: June 2019

  6. arXiv:1806.02704  [pdf, ps, other

    cs.NI

    CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching

    Authors: Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Xenofontas Dimitropoulos

    Abstract: Joint caching and recommendation has been recently proposed for increasing the efficiency of mobile edge caching. While previous works assume collaboration between mobile network operators and content providers (who control the recommendation systems), this might be challenging in today's economic ecosystem, with existing protocols and architectures. In this paper, we propose an approach that enab… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: ACM SIGCOMM 2018 workshops: Workshop on Mobile Edge Communications (MECOMM'18), August 20, 2018, Budapest, Hungary

  7. arXiv:1801.02918  [pdf, ps, other

    cs.NI cs.CR

    A Survey among Network Operators on BGP Prefix Hijacking

    Authors: Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas Dimitropoulos

    Abstract: BGP prefix hijacking is a threat to Internet operators and users. Several mechanisms or modifications to BGP that protect the Internet against it have been proposed. However, the reality is that most operators have not deployed them and are reluctant to do so in the near future. Instead, they rely on basic - and often inefficient - proactive defenses to reduce the impact of hijacking events, or on… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

  8. arXiv:1801.01085  [pdf, ps, other

    cs.NI

    ARTEMIS: Neutralizing BGP Hijacking within a Minute

    Authors: Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti

    Abstract: BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. In fact, they suffer from: (i) lack of detection comprehensiveness, allowing sophisticated attackers to evade detection, (ii) limited accuracy, especially in… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

  9. arXiv:1710.04422  [pdf, ps, other

    cs.NI

    Shortcuts through Colocation Facilities

    Authors: Vasileios Kotronis, George Nomikos, Lefteris Manassakis, Dimitris Mavrommatis, Xenofontas Dimitropoulos

    Abstract: Network overlays, running on top of the existing Internet substrate, are of perennial value to Internet end-users in the context of, e.g., real-time applications. Such overlays can employ traffic relays to yield path latencies lower than the direct paths, a phenomenon known as Triangle Inequality Violation (TIV). Past studies identify the opportunities of reducing latency using TIVs. However, they… ▽ More

    Submitted 12 October, 2017; originally announced October 2017.

    Comments: In Proceedings of the ACM Internet Measurement Conference (IMC '17), London, GB, 2017

  10. Characterizing User-to-User Connectivity with RIPE Atlas

    Authors: Petros Gigis, Vasileios Kotronis, Emile Aben, Stephen D. Strowes, Xenofontas Dimitropoulos

    Abstract: Characterizing the interconnectivity of networks at a country level is an interesting but non-trivial task. The IXP Country Jedi is an existing prototype that uses RIPE Atlas probes in order to explore interconnectivity at a country level, taking into account all Autonomous Systems (AS) where RIPE Atlas probes are deployed. In this work, we build upon this basis and specifically focus on "eyeball"… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.

    Comments: In Proceedings of the Applied Networking Research Workshop (ANRW '17)

  11. arXiv:1611.03407  [pdf, other

    cs.NI

    Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services

    Authors: Vasileios Kotronis, Rowan Kloti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas Dimitropoulos

    Abstract: In this work, we propose utilizing the rich connectivity between IXPs and ISPs for inter-domain path stitching, supervised by centralized QoS brokers. In this context, we highlight a novel abstraction of the Internet topology, i.e., the inter-IXP multigraph composed of IXPs and paths crossing the domains of their shared member ISPs. This can potentially serve as a dense Internet-wide substrate for… ▽ More

    Submitted 10 November, 2016; originally announced November 2016.

    Comments: Proceedings of ACM SIGMETRICS '15, pages 429-430, 1/1/2015. arXiv admin note: text overlap with arXiv:1611.02642

    Journal ref: ACM Performance Evaluation Review, Vol. 43 / Issue 1, pages 429-430, 24/6/2015

  12. arXiv:1611.03113  [pdf, other

    cs.NI

    Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework

    Authors: Adrian Gamperli, Vasileios Kotronis, Xenofontas Dimitropoulos

    Abstract: A lot of applications depend on reliable and stable Internet connectivity. These characteristics are crucial for mission-critical services such as telemedical applications. An important factor that can affect connection availability is the convergence time of BGP, the de-facto inter-domain routing (IDR) protocol in the Internet. After a routing change, it may take several minutes until the network… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: Proceedings of ACM SIGCOMM '14, pages 369-370, 1/1/2015

    Journal ref: ACM Computer Communication Review, Vol. 44 / Issue 4, pages 369-370, 25/2/2015

  13. arXiv:1611.02842  [pdf, other

    cs.NI

    Policy-Compliant Path Diversity and Bisection Bandwidth

    Authors: Rowan Kloti, Vasileios Kotronis, Bernhard Ager, Xenofontas Dimitropoulos

    Abstract: How many links can be cut before a network is bisected? What is the maximal bandwidth that can be pushed between two nodes of a network? These questions are closely related to network resilience, path choice for multipath routing or bisection bandwidth estimations in data centers. The answer is quantified using metrics such as the number of edge-disjoint paths between two network nodes and the cum… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: Proceedings of IEEE INFOCOM 2015, pages 675-683, 1/4/2015

  14. arXiv:1611.02642  [pdf, other

    cs.NI

    Stitching Inter-Domain Paths over IXPs

    Authors: Vasileios Kotronis, Rowan Kloti, Matthias Rost, Panagiotis Georgopoulos, Bernhard Ager, Stefan Schmid, Xenofontas Dimitropoulos

    Abstract: Modern Internet applications, from HD video-conferencing to health monitoring and remote control of power-plants, pose stringent demands on network latency, bandwidth and availability. An approach to support such applications and provide inter-domain guarantees, enabling new avenues for innovation, is using centralized inter-domain routing brokers. These entities centralize routing control for mis… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: Proceedings of ACM SOSR 2016, pages 1-12, 1/1/2016

  15. arXiv:1611.02628  [pdf, other

    cs.NI

    Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration

    Authors: Vasileios Kotronis, Xenofontas Dimitropoulos, Rowan Kloti, Bernhard Ager, Panagiotis Georgopoulos, Stefan Schmid

    Abstract: This paper presents the vision of the Control Exchange Point (CXP) architectural model. The model is motivated by the inflexibility and ossification of today's inter-domain routing system, which renders critical QoS-constrained end-to-end (e2e) network services difficult or simply impossible to provide. CXPs operate on slices of ISP networks and are built on basic Software Defined Networking (SDN)… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: Presented as part of the USENIX Open Networking Summit 2014 (ONS 2014), 2/3/2015

  16. arXiv:1611.02624  [pdf, other

    cs.NI

    A Comparative Look into Public IXP Datasets

    Authors: Rowan Kloti, Bernhard Ager, Vasileios Kotronis, George Nomikos, Xenofontas Dimitropoulos

    Abstract: Internet eXchange Points (IXPs) are core components of the Internet infrastructure where Internet Service Providers (ISPs) meet and exchange traffic. During the last few years, the number and size of IXPs have increased rapidly, driving the flattening and shortening of Internet paths. However, understanding the present status of the IXP ecosystem and its potential role in sha** the future Intern… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: ACM Computer Communication Review, Vol. 46 / Issue 1, pages 21-29, 11/1/2016

  17. arXiv:1611.02494  [pdf

    cs.NI

    Routing Centralization Across Domains via SDN: A Model and Emulation Framework for BGP Evolution

    Authors: Vasileios Kotronis, Adrian Gamperli, Xenofontas Dimitropoulos

    Abstract: In this work, we propose a radical, incrementally-deployable Internet routing paradigm in which the control plane of multiple networks is centralized. This follows the Software Defined Networking (SDN) paradigm, although at the inter-domain level involving multiple Autonomous Systems (AS). Multi-domain SDN centralization can be realized by outsourcing routing functions to an external contractor, w… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: Elsevier Computer Networks, Vol. 92, pages 227-239, 1/12/2015

  18. A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks

    Authors: hristos Liaskos, Vasileios Kotronis, Xenofontas Dimitropoulos

    Abstract: Distributed link-flooding attacks constitute a new class of attacks with the potential to segment large areas of the Internet. Their distributed nature makes detection and mitigation very hard. This work proposes a novel framework for the analytical modeling and optimal mitigation of such attacks. The detection is modeled as a problem of relational algebra, representing the association of potentia… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: 9 pages, 8 figures, IEEE INFOCOM 2016

    Journal ref: IEEE INFOCOM 2016

  19. On the Interplay of Link-Flooding Attacks and Traffic Engineering

    Authors: Dimitrios Gkounis, Vasileios Kotronis, Christos Liaskos, Xenofontas Dimitropoulos

    Abstract: Link-flooding attacks have the potential to disconnect even entire countries from the Internet. Moreover, newly proposed indirect link-flooding attacks, such as 'Crossfire', are extremely hard to expose and, subsequently, mitigate effectively. Traffic Engineering (TE) is the network's natural way of mitigating link overload events, balancing the load and restoring connectivity. This work poses the… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: 6 pages, 3 figures, ACM CCR

    Journal ref: ACM SIGCOMM Computer Communications Review, 2016

  20. arXiv:1412.2013  [pdf, ps, other

    cs.NI

    Towards Defeating the Crossfire Attack using SDN

    Authors: Dimitrios Gkounis, Vasileios Kotronis, Xenofontas Dimitropoulos

    Abstract: In this work, we propose online traffic engineering as a novel approach to detect and mitigate an emerging class of stealthy Denial of Service (DoS) link-flooding attacks. Our approach exploits the Software Defined Networking (SDN) paradigm, which renders the management of network traffic more flexible through centralised flow-level control and monitoring. We implement a full prototype of our solu… ▽ More

    Submitted 5 December, 2014; originally announced December 2014.