Difficulties of simulation: Heterogenity of topology, protocol, link properties. Also the changing nature of the internet, e.g. routes changing all the time, trend of applications, topology, router features.
[more]
Kim, Lau, Chuah, Chao (2004) PacketScore: Statistics-based Overload Control against DDoS Attacks (INFOCOM)
DDD: Detect for the victim, Differentiate traffic into attack and legitimate, Discard suspicious packets according to legitimate score and congestion level
[more]
Fang et al (1999) Computing Iceberg Queries Efficiently (VLDB'98)
Find the elements in a set-with-duplicates for top-\(K\) frequencies. Two approaches are proposed: sampling and coarse counting. Sampling is to take \(s\) samples from a pool of \(N\) and count for the frequencies in \(s\). The result is then scaled by \(N/s\). Afterwards, report those with scaled frequency larger than...
[more]
Welzl, Papadimitriou, Scharf, Briscoe (2008) Open Research Issues in Internet Congestion Control (Internet Draft)
In chapter 1 of the draft, an overview of the history of congestion control research of TCP/IP is presented.
[more]
Hei et al (2007) A Measurement Study of a Large-Scale P2P IPTV System (IEEE T. of Multimedia 9(8))
Measuring PPLive by setting up a couple clients and trace the packets by passive sniffing. Following information are harvested: (1) Diurnal and weekly trend; (2) Peer arrival and departures, i.e. flash crowd; (3) geographic distribution; (4) overheads of content; (5) redundancy; (6) upload-download ratio; (7) live time of each connections...
[more]