skip to main content
10.1145/3123878.3131982acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free access

AS Hegemony: A Robust Metric for AS Centrality

Published: 22 August 2017 Publication History
First page of PDF

References

[1]
S. H. Lee, P.-J. Kim, and H. Jeong. Statistical properties of sampled networks. Phys. Rev. E, 73:016102, Jan 2006.
[2]
Y. Liu, X. Luo, R. K. Chang, and J. Su. Characterizing inter-domain rerouting by betweenness centrality after disruptive events. IEEE JSAC, 31(6):1147--1157, 2013.
[3]
P. Mahadevan, D. Krioukov, M. Fomenkov, X. Dimitropoulos, k. c. claffy, and A. Vahdat. The internet as-level topology: Three data sources and one definitive metric. SIGCOMM CCR, 36(1):17--26, Jan. 2006.
[4]
M. Schuchard, A. Mohaisen, D. Foo Kune, N. Hopper, Y. Kim, and E. Y. Vasserman. Losing control of the internet: using the data plane to attack the control plane. In CCS'10, pages 726--728. ACM, 2010.
[5]
M. Wählisch, T. C. Schmidt, M. de Brün, and T. Häberlen. Exposing a nation-centric view on the german internet--a change in perspective on as-level. In PAM'12, pages 200--210. Springer, 2012.

Cited By

View all
  • (2024)The Quest for a Resilient Internet Access in a Constrained Geopolitical EnvironmentProceedings of the Asian Internet Engineering Conference 202410.1145/3674213.3674220(55-66)Online publication date: 9-Aug-2024
  • (2024)RoLL+: Real-Time and Accurate Route Leak Locating With AS Triplet Features at ScaleIEEE/ACM Transactions on Networking10.1109/TNET.2024.345894332:6(5263-5278)Online publication date: Dec-2024
  • (2023)Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179456(111-125)Online publication date: May-2023
  • Show More Cited By

Index Terms

  1. AS Hegemony: A Robust Metric for AS Centrality

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM Posters and Demos '17: Proceedings of the SIGCOMM Posters and Demos
    August 2017
    158 pages
    ISBN:9781450350570
    DOI:10.1145/3123878
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 August 2017

    Check for updates

    Qualifiers

    • Poster
    • Research
    • Refereed limited

    Conference

    SIGCOMM '17
    Sponsor:
    SIGCOMM '17: ACM SIGCOMM 2017 Conference
    August 22 - 24, 2017
    CA, Los Angeles, USA

    Acceptance Rates

    Overall Acceptance Rate 92 of 158 submissions, 58%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)86
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Quest for a Resilient Internet Access in a Constrained Geopolitical EnvironmentProceedings of the Asian Internet Engineering Conference 202410.1145/3674213.3674220(55-66)Online publication date: 9-Aug-2024
    • (2024)RoLL+: Real-Time and Accurate Route Leak Locating With AS Triplet Features at ScaleIEEE/ACM Transactions on Networking10.1109/TNET.2024.345894332:6(5263-5278)Online publication date: Dec-2024
    • (2023)Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179456(111-125)Online publication date: May-2023
    • (2021)Graph Metrics for Network Robustness—A SurveyMathematics10.3390/math90808959:8(895)Online publication date: 17-Apr-2021
    • (2021)Feature Selection Evaluation towards a Lightweight Deep Learning DDoS DetectorICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500458(1-6)Online publication date: Jun-2021
    • (2019)Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph FeaturesProceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks10.1145/3359992.3366640(35-41)Online publication date: 9-Dec-2019
    • (2018)BLT: A taxonomy and classification tool for mining BGP update messagesIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406955(409-414)Online publication date: Apr-2018
    • (2018)The (Thin) Bridges of AS Connectivity: Measuring Dependency Using AS HegemonyPassive and Active Measurement10.1007/978-3-319-76481-8_16(216-227)Online publication date: 2-Mar-2018

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media