Author image not provided
 Ítalo S Cunha

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article9.38
Citation Count244
Publication count26
Publication years2004-2017
Available for download17
Average downloads per article515.71
Downloads (cumulative)8,767
Downloads (12 Months)1,815
Downloads (6 Weeks)143
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


31 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 31
Result page: 1 2

Sort by:

1 published by ACM
August 2018 SIGCOMM '18: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16,   Downloads (12 Months): 101,   Downloads (Overall): 101

Full text available: PDFPDF
The PEERING research platform lets researchers exchange actual BGP routes and traffic with hundreds of networks. To date, several researchers have used PEERING to perform interdomain routing experiments. However, PEERING's original design sends experiment data-plane traffic through a VPN, introducing latency and jitter, hindering the applicability of the platform to ...
Keywords: BGP, Interdomain routing, experimentation, testbed

2 published by ACM
August 2018 SIGCOMM '18: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 116,   Downloads (Overall): 116

Full text available: PDFPDF
One of the impediments in performing Internet routing research is the lack of infrastructure capable of supporting experiments with both control and realism. Measurement and experimentation platforms provide minimal control over routing, limited connectivity, and restrict what operations are available. Meanwhile, the proprietary nature of routing policies stymies simulations from ...
Keywords: Border Gateway Protocol, Internet Routing, Testbeds, Traffic Engineering

3 published by ACM
July 2018 ANRW '18: Proceedings of the Applied Networking Research Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 28,   Downloads (Overall): 28

Full text available: PDFPDF
In this talk, we will report on our recent article "Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering", published in ACM Computer Communication Review, January 2018. We will also present new results that arise from ongoing deployment of RPKI route origin validation (\eg default filtering ...

4 published by ACM
April 2018 ACM SIGCOMM Computer Communication Review: Volume 48 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 5,   Downloads (12 Months): 65,   Downloads (Overall): 65

Full text available: PDFPDF
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route ...
Keywords: BGP, Internet security, RPKI, routing policies

5
April 2018 IPSN '18: Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 46,   Downloads (Overall): 51

Full text available: PDFPDF
We demonstrate attribute-based authentication and access control schemes tailored to resource-constrained devices typical of IoT home environments. The demo shows how IoT devices would be managed and controlled in such scenario. The underlying cryptographic scheme relies on an Attribute-Based Cryptosystem (ABC) to cryptographically implement an authenticated Attribute-Based Access Control (ABAC) ...

6 published by ACM
August 2017 SIGCOMM '17: Proceedings of the Conference of the ACM Special Interest Group on Data Communication
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 26,   Downloads (12 Months): 614,   Downloads (Overall): 2,262

Full text available: PDFPDF
Large content providers build points of presence around the world, each connected to tens or hundreds of networks. Ideally, this connectivity lets providers better serve users, but providers cannot obtain enough capacity on some preferred peering paths to handle peak traffic demands. These capacity constraints, coupled with volatile traffic and ...
Keywords: Border Gateway Protocol, Content Distribution Network, Internet Routing, Software Defined Networking, Traffic Engineering

7 published by ACM
November 2016 SenSys '16: Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 39,   Downloads (12 Months): 563,   Downloads (Overall): 1,580

Full text available: PDFPDF
The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices, ranging from mundane artifacts to complex biosensors connected across disparate networks. As the demand for IoT devices grows, the need for stronger authentication and access control mechanisms is greater than ever. Legacy authentication and access control ...
Keywords: Access Control, Authentication, Identity-Based Cryptography, Security, Attribute-Based Cryptography, Internet of Things

8 published by ACM
August 2016 SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 30,   Downloads (Overall): 348

Full text available: PDFPDF
Routing events impact multiple paths in the Internet, but current active topology mapping techniques monitor paths independently. Detecting a routing event on one Internet path does not trigger any measurements on other possibly-impacted paths. This approach leads to outdated and inconsistent routing information. We characterize routing events in the Internet ...
Keywords: Routing events, Traceroute, Topology mapping

9
March 2016 NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Network operators measure Internet routes to troubleshoot problems, and researchers measure routes to characterize the Internet. However, they still rely on decades-old tools like traceroute, BGP route collectors, and Looking Glasses, all of which permit only a single query about Internet routes--what is the path from here to there? This ...

10
March 2016 Multimedia Systems: Volume 22 Issue 2, March 2016
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

The Peer-to-Peer (P2P) architecture has been successfully used to reduce costs and increase the scalability of Internet live streaming systems. However, the effectiveness of these applications depends largely on user (peer) cooperation. In this article we use data collected from SopCast, a popular P2P live application, to show that there ...
Keywords: Live streaming, P2P, Overlay graph, Peer cooperation, Prediction model

11 published by ACM
October 2015 IMC '15: Proceedings of the 2015 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 5,   Downloads (12 Months): 32,   Downloads (Overall): 163

Full text available: PDFPDF
Models of Internet routing are critical for studies of Internet security, reliability and evolution, which often rely on simulations of the Internet's routing system. Accurate models are difficult to build and suffer from a dearth of ground truth data, as ISPs often treat their connectivity and routing policies as trade ...
Keywords: bgp, network measurement, routing

12
May 2015 SBRC '15: Proceedings of the 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing, and to network administrators, e.g., who provision and pay for the traffic. Recent proposals aim to identify and filter spam messages at the origin, restraining message propagation ...
Keywords: Spam traffic, costs, Network Operators

13 published by ACM
October 2014 HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 6,   Downloads (12 Months): 33,   Downloads (Overall): 145

Full text available: PDFPDF
Internet routing suffers from persistent and transient failures, circuitous routes, oscillations, and prefix hijacks. A major impediment to progress is the lack of ways to conduct impactful interdomain research. Most research is based either on passive observation of existing routes, keeping researchers from assessing how the Internet will respond to ...

14
August 2014 IEEE/ACM Transactions on Networking (TON): Volume 22 Issue 4, August 2014
Publisher: IEEE Press
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 62

Full text available: PDFPDF
In this paper, we implement and evaluate a system that predicts and tracks Internet path changes to maintain an up-to-date network topology. Based on empirical observations, we claim that monitors can enhance probing according to the likelihood of path changes. We design a simple predictor of path changes and show ...
Keywords: path changes, topology mapping, tracking

15
May 2014 SBRC '14: Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we characterize the impact of failures in Brazil's national education and research network on traffic at a client university. In particular, we study the impact of failures on traffic, user, and application behavior. The failures are interesting in that they persist for several hours and impact only ...
Keywords: Characterization, Computer Networks, Failures Impact

16 published by ACM
December 2013 CoNEXT Student Workhop '13: Proceedings of the 2013 workshop on Student workhop
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 5,   Downloads (Overall): 68

Full text available: PDFPDF
Interdomain routing has long been primed for an overhaul. Designed for a previous era and since dragged into today's networks through complex configurations, little progress has been made on aligning interdomain routing capabilities with network operator needs. Yet substantial growth has occurred in tangential areas such as datacenter networking. We ...
Keywords: interdomain routing, internet routing, network architecture, routing protocols, testbeds

17 published by ACM
August 2013 SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 9,   Downloads (12 Months): 63,   Downloads (Overall): 430

Full text available: PDFPDF
Interdomain path changes occur frequently. Because routing protocols expose insufficient information to reason about all changes, the general problem of identifying the root cause remains unsolved. In this work, we design and evaluate PoiRoot , a real-time system that allows a provider to accurately isolate the root cause (the network ...
Keywords: bgp, measurement, monitoring, path changes, root cause analysis
Also published in:
September 2013  ACM SIGCOMM Computer Communication Review: Volume 43 Issue 4, October 2013

18
March 2013 PAM'13: Proceedings of the 14th international conference on Passive and Active Measurement
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Estimating per-flow performance characteristics such as latency, loss, and jitter from a location other than the connection end-points can help locate performance problems affecting end-to-end flows. However, doing this accurately in real-time is challenging and requires tracking extensive amounts of TCP state and is thus infeasible on nodes that process ...

19 published by ACM
August 2012 SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 0,   Downloads (12 Months): 15,   Downloads (Overall): 328

Full text available: PDFPDF
The Internet was designed to always find a route if there is a policy-compliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying valid path. The research community has focused on short-term outages that occur during route convergence. There has been less progress on addressing ...
Keywords: availability, bgp, internet, measurement, outages, repair, routing

20 published by ACM
August 2012 ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12: Volume 42 Issue 4, October 2012
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 161

Full text available: PDFPDF
The Internet was designed to always find a route if there is a policy-compliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying valid path. The research community has focused on short-term outages that occur during route convergence. There has been less progress on addressing ...
Keywords: availability, bgp, internet, measurement, outages, repair, routing



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us