Skip to main content

Showing 1–9 of 9 results for author: Pelsser, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13172  [pdf, other

    cs.NI

    Measuring Internet Routing from the Most Valuable Points

    Authors: Thomas Alfroy, Thomas Holterbach, Thomas Krenc, KC Claffy, Cristel Pelsser

    Abstract: While the increasing number of Vantage Points (VPs) in RIPE RIS and RouteViews improves our understanding of the Internet, the quadratically increasing volume of collected data poses a challenge to the scientific and operational use of the data. The design and implementation of BGP and BGP data collection systems lead to data archives with enormous redundancy, as there is substantial ove… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  2. arXiv:2310.03510  [pdf, other

    cs.NI cs.CR

    Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach

    Authors: François De Keersmaeker, Ramin Sadre, Cristel Pelsser

    Abstract: Internet of Things devices can now be found everywhere, including in our households in the form of Smart Home networks. Despite their ubiquity, their security is unsatisfactory, as demonstrated by recent attacks. The IETF's MUD standard has as goal to simplify and automate the secure deployment of end devices in networks. A MUD file contains a device specific description of allowed network activit… ▽ More

    Submitted 23 January, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: 13 pages of body text, 16 pages total

    ACM Class: C.2.3

  3. arXiv:2304.02992  [pdf, other

    cs.NI

    Routing over QUIC: Bringing transport innovations to routing protocols

    Authors: Thomas Wirtgen, Nicolas Rybowski, Cristel Pelsser, Olivier Bonaventure

    Abstract: By combining the security features of TLS with the reliability of TCP, QUIC opens new possibilities for many applications. We demonstrate the benefits that QUIC brings for routing protocols. Current Internet routing protocols use insecure transport protocols. BGP uses TCP possibly with authentication. OSPF uses its own transport protocol above plain IP. We design and implement a library that allow… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: 2 pages, 1 figure, NSDI '23 Poster Session

    ACM Class: C.2.1; C.2.2; C.2.6

  4. arXiv:2110.09320  [pdf, other

    cs.NI

    Deploying Near-Optimal Delay-Constrained Paths with Segment Routing in Massive-Scale Networks

    Authors: Jean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser

    Abstract: With a growing demand for quasi-instantaneous communication services such as real-time video streaming, cloud gaming, and industry 4.0 applications, multi-constraint Traffic Engineering (TE) becomes increasingly important. While legacy TE management planes have proven laborious to deploy, Segment Routing (SR) drastically eases the deployment of TE paths and is thus increasingly adopted by Internet… ▽ More

    Submitted 18 March, 2022; v1 submitted 18 October, 2021; originally announced October 2021.

  5. arXiv:2101.09002  [pdf, other

    cs.NI

    A Fast-Convergence Routing of the Hot-Potato

    Authors: Jean-Romain Luttringer, Quentin Bramas, Cristel Pelsser, Pascal Mérindol

    Abstract: Interactions between the intra- and inter-domain routing protocols received little attention despite playing an important role in forwarding transit traffic. More precisely, by default, IGP distances are taken into account by BGP to select the closest exit gateway for the transit traffic (hot-potato routing). Upon an IGP update, the new best gateway may change and should be updated through the (fu… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: IEEE INFOCOM 2021, May 2021, Online, France

  6. arXiv:2012.06300  [pdf, other

    cs.CR

    Towards Secure and Leak-Free Workflows Using Microservice Isolation

    Authors: Loïc Miller, Pascal Mérindol, Antoine Gallais, Cristel Pelsser

    Abstract: Data leaks and breaches are on the rise. They result in huge losses of money for businesses like the movie industry, as well as a loss of user privacy for businesses dealing with user data like the pharmaceutical industry. Preventing data exposures is challenging, because the causes for such events are various, ranging from hacking to misconfigured databases. Alongside the surge in data exposures,… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

  7. arXiv:2011.05191  [pdf, other

    cs.NI

    Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think

    Authors: Jean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser

    Abstract: With the growth of demands for quasi-instantaneous communication services such as real-time video streaming, cloud gaming, and industry 4.0 applications, multi-constraint Traffic Engineering (TE) becomes increasingly important. While legacy TE management planes have proven laborious to deploy, Segment Routing (SR) drastically eases the deployment of TE paths and thus became the most appropriate te… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Journal ref: IEEE International Symposium on Network Computing and Applications, Nov 2020, On-Line, France

  8. arXiv:1906.04426  [pdf, other

    cs.NI

    Chocolatine: Outage Detection for Internet Background Radiation

    Authors: Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Merindol, Alistair King, Alberto Dainotti, Cristel Pelsser

    Abstract: The Internet is a complex ecosystem composed of thousands of Autonomous Systems (ASs) operated by independent organizations; each AS having a very limited view outside its own network. These complexities and limitations impede network operators to finely pinpoint the causes of service degradation or disruption when the problem lies outside of their network. In this paper, we present Chocolatine, a… ▽ More

    Submitted 30 September, 2019; v1 submitted 11 June, 2019; originally announced June 2019.

    Comments: TMA 2019

  9. arXiv:1605.04784  [pdf, other

    cs.NI

    Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements

    Authors: Romain Fontugne, Emile Aben, Cristel Pelsser, Randy Bush

    Abstract: Understanding network health is essential to improve Internet reliability. For instance, detecting disruptions in peer and provider networks facilitates the identification of connectivity problems. Currently this task is time consuming for network operators. It involves a fair amount of manual observation because operators have little visibility into other networks. In this paper we leverage the R… ▽ More

    Submitted 15 May, 2017; v1 submitted 16 May, 2016; originally announced May 2016.