- Cybersecurity and Cyber Warfare Studies
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Topological and Geometric Data Analysis
- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Cross-Border Cooperation and Integration
- Opportunistic and Delay-Tolerant Networks
- Advanced Neuroimaging Techniques and Applications
- Wireless Networks and Protocols
- Geometric Analysis and Curvature Flows
- Peer-to-Peer Network Technologies
- Cancer-related Molecular Pathways
- Homotopy and Cohomology in Algebraic Topology
- Image and Video Quality Assessment
- Diverse multidisciplinary academic research
- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Belt and Road Initiative
- Network Traffic and Congestion Control
- Intelligence, Security, War Strategy
- Globalization and Cultural Identity
- Quantum-Dot Cellular Automata
- Advanced Data Storage Technologies
- Cell Image Analysis Techniques
Columbia University
2019-2024
Abstract In November 2019, in the wake of political demonstrations against regime, Iran managed to selectively cut off most traffic from global Internet while fully operating its own domestic network. It seemingly confirmed main hypothesis our research had led us to, based on prior observation data routing: Iran’s architecture connectivity enables selective censorship international traffic. This paper examines, through case Iran, how states can leverage Border Gateway Protocol (BGP) as a...
This paper presents the results of a year-long research project conducted by GEODE (geode.science), multidisciplinary team made up geographers, computer scientists and area specialists.We developed new methodology for mapping cyberspace in its lower layers (infrastructures routing protocols) order to measure represent level fragmentation Internet areas geopolitical tensions using Border Gateway Protocol (BGP). Our hypothesis was that BGP could be used reasons context large-scale crisis,...
To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public to suffice for many devices assigned private space. Even though has greatly extended the shelf-life of IPv4, some networks need more space than what is officially allocated by IANA due their size and/or network management practices. Some these resort using squat , term operations community uses large blocks organizations but historically never announced Internet. While squatting IP addresses an...
In this paper, we argue that data routing is of geopolitical significance. We propose new methodologies to understand and represent the forms power rivalries imbalances occur within lower layers cyberspace, through analysis Eastern Ukraine. The Internet a network networks where each an Autonomous System (ASes). ASes are independent administrative entities controlled by variety actors such as governments, companies, universities. Their administrators have agree communicate on paths followed...
Maps of physical and logical Internet connectivity that are informed by consistent with each other can expand scope improve accuracy in analysis performance, robustness security. In this paper, we describe a methodology for linking maps aims toward consistent, cross-layer representation. Our approach is constructive uses geographic location as the key feature layers. We begin building representation using online sources to identify locations house transport hardware (i.e., PoPs, colocation...
Google, Netflix, Meta, and Akamai serve content to users from offnet servers in thousands of ISPs. These offnets benefit both services ISPs, via better performance reduced interdomain WAN traffic. We argue that this widespread distribution leads a concentration traffic previously unacknowledged risk, as many ISPs colocate multiple providers. This trend contributes Internet likely accessing popular fetching the majority their single facility -- perhaps even rack creating shared resources...
Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...
Network verification (NWV), broadly defined as the of properties distributed protocols used in network systems, cannot be efficiently solved on classical hardware via brute force. Prior work has developed a variety methods that scale by observing structure search space and then evaluating classes within instead individual instances. However, even these classification mechanisms have their limitations. In this paper, we consider radically different approach: applying quantum computing to more...
As hyperscalers such as Google, Microsoft, and Amazon play an increasingly important role in today's Internet, they are also capable of manipulating probe packets that traverse their privately owned operated backbones. a result, standard traceroute-based measurement techniques no longer reliable means for assessing network connectivity these global-scale cloud provider infrastructures. In response to developments, we present new empirical approach elucidating private backbone networks. Our...
Bloom Filters are a space-efficient data structure used for the testing of membership in set that errs only False Positive direction. However, standard analysis measures this rate provides form worst case bound is both overly conservative majority network applications utilize Filters, and reduces accuracy by not taking into account actual state (number bits set) Filter after each arrival. In paper, we more accurately characterize dynamics as they commonly networking applications. particular,...
Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...
Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...
The global expansion of the Internet has brought many challenges to geopolitics. Cyberspace is a space strategic priority for states. Understanding and representing its geography remains an ongoing challenge. Nevertheless, we need comprehend as organized by humans analyse strategies actors. This requires multidisciplinary dialogue associating geopolitics, computer science mathematics. represented three superposed interacting layers: physical, logical, informational layers. paper focuses on...
Les systèmes autonomes (AS) sont les unités de base du routage des données : ils réseaux (fournisseurs d'accès Internet, fournisseurs contenu, entreprises etc.) qui, par leurs interconnexions, constituent l'Internet. En établissant entre eux accords connexion via le protocole BGP, AS permettent faire circuler d'un point à l'autre globe. Dans cet article, nous montrons comment réseau est la fois révélateur et partie prenante luttes pouvoir sur territoires en conflit. Le comportement ces...
The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" (i.e., simple, easily-interpretable, readily...
The monitoring of large dynamic networks is a major chal- lenge for wide range application. complexity stems from properties the underlying graphs, in which slight local changes can lead to sizable variations global prop- erties, e.g., under certain conditions, single link cut that may be overlooked during result splitting graph into two disconnected components. Moreover, it often difficult determine whether change will propagate globally or remain local. Traditional theory measure such as...
La Fédération de Russie développe depuis le début des années 2010 une stratégie d’influence informationnelle à destination l’étranger. Cette stratégie, axée sur présence massive les réseaux sociaux, est au cœur nouveaux rapports force entre Etats. En France, médias russes RT et Sputnik sont ainsi régulièrement pointés du doigt pour leur couverture l’actualité, jugée partielle ou trompeuse par nombreux acteurs politiques médiatiques. Le mouvement Gilets jaunes, dont membres ont été accusés...
The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" ( i.e., simple, easily-interpretable, readily...
The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" (i.e., simple, easily-interpretable, readily...