Loqman Salamatian

ORCID: 0000-0001-7756-2376
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybersecurity and Cyber Warfare Studies
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Topological and Geometric Data Analysis
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Cross-Border Cooperation and Integration
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Neuroimaging Techniques and Applications
  • Wireless Networks and Protocols
  • Geometric Analysis and Curvature Flows
  • Peer-to-Peer Network Technologies
  • Cancer-related Molecular Pathways
  • Homotopy and Cohomology in Algebraic Topology
  • Image and Video Quality Assessment
  • Diverse multidisciplinary academic research
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Belt and Road Initiative
  • Network Traffic and Congestion Control
  • Intelligence, Security, War Strategy
  • Globalization and Cultural Identity
  • Quantum-Dot Cellular Automata
  • Advanced Data Storage Technologies
  • Cell Image Analysis Techniques

Columbia University
2019-2024

Abstract In November 2019, in the wake of political demonstrations against regime, Iran managed to selectively cut off most traffic from global Internet while fully operating its own domestic network. It seemingly confirmed main hypothesis our research had led us to, based on prior observation data routing: Iran’s architecture connectivity enables selective censorship international traffic. This paper examines, through case Iran, how states can leverage Border Gateway Protocol (BGP) as a...

10.1093/cybsec/tyab018 article EN cc-by Journal of Cybersecurity 2021-01-01

10.1109/infocom52122.2024.10621226 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2024-05-20

This paper presents the results of a year-long research project conducted by GEODE (geode.science), multidisciplinary team made up geographers, computer scientists and area specialists.We developed new methodology for mapping cyberspace in its lower layers (infrastructures routing protocols) order to measure represent level fragmentation Internet areas geopolitical tensions using Border Gateway Protocol (BGP). Our hypothesis was that BGP could be used reasons context large-scale crisis,...

10.23919/cycon49761.2020.9131726 preprint EN 2020-05-01

To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public to suffice for many devices assigned private space. Even though has greatly extended the shelf-life of IPv4, some networks need more space than what is officially allocated by IANA due their size and/or network management practices. Some these resort using squat , term operations community uses large blocks organizations but historically never announced Internet. While squatting IP addresses an...

10.1145/3594255.3594260 article EN ACM SIGCOMM Computer Communication Review 2023-01-01

In this paper, we argue that data routing is of geopolitical significance. We propose new methodologies to understand and represent the forms power rivalries imbalances occur within lower layers cyberspace, through analysis Eastern Ukraine. The Internet a network networks where each an Autonomous System (ASes). ASes are independent administrative entities controlled by variety actors such as governments, companies, universities. Their administrators have agree communicate on paths followed...

10.5210/fm.v26i5.11700 article EN First Monday 2021-04-19

Maps of physical and logical Internet connectivity that are informed by consistent with each other can expand scope improve accuracy in analysis performance, robustness security. In this paper, we describe a methodology for linking maps aims toward consistent, cross-layer representation. Our approach is constructive uses geographic location as the key feature layers. We begin building representation using online sources to identify locations house transport hardware (i.e., PoPs, colocation...

10.1145/3517745.3561443 article EN 2022-10-21

Google, Netflix, Meta, and Akamai serve content to users from offnet servers in thousands of ISPs. These offnets benefit both services ISPs, via better performance reduced interdomain WAN traffic. We argue that this widespread distribution leads a concentration traffic previously unacknowledged risk, as many ISPs colocate multiple providers. This trend contributes Internet likely accessing popular fetching the majority their single facility -- perhaps even rack creating shared resources...

10.1145/3626111.3628213 preprint EN 2023-11-13

Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...

10.1145/3652963.3655044 article EN 2024-06-01

Network verification (NWV), broadly defined as the of properties distributed protocols used in network systems, cannot be efficiently solved on classical hardware via brute force. Prior work has developed a variety methods that scale by observing structure search space and then evaluating classes within instead individual instances. However, even these classification mechanisms have their limitations. In this paper, we consider radically different approach: applying quantum computing to more...

10.1145/3696348.3696891 preprint EN 2024-11-11

As hyperscalers such as Google, Microsoft, and Amazon play an increasingly important role in today's Internet, they are also capable of manipulating probe packets that traverse their privately owned operated backbones. a result, standard traceroute-based measurement techniques no longer reliable means for assessing network connectivity these global-scale cloud provider infrastructures. In response to developments, we present new empirical approach elucidating private backbone networks. Our...

10.1145/3604620 article EN Communications of the ACM 2023-07-25

Bloom Filters are a space-efficient data structure used for the testing of membership in set that errs only False Positive direction. However, standard analysis measures this rate provides form worst case bound is both overly conservative majority network applications utilize Filters, and reduces accuracy by not taking into account actual state (number bits set) Filter after each arrival. In paper, we more accurately characterize dynamics as they commonly networking applications. particular,...

10.48550/arxiv.2401.02647 preprint EN cc-by arXiv (Cornell University) 2024-01-01

Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...

10.1145/3656005 article EN mit Proceedings of the ACM on Measurement and Analysis of Computing Systems 2024-05-21

Bloom Filters are a desirable data structure for distinguishing new values in sequences of (i.e., messages), due to their space efficiency, low false positive rates (incorrectly classifying value as repeat), and never producing negatives (classifying repeat new). However, the Filter's bits filled, creep upward. To keep below reasonable threshold, applications periodically "recycle" Filter, clearing memory then resuming tracking data. After recycle point, subsequent arrivals recycled messages...

10.1145/3673660.3655044 article EN ACM SIGMETRICS Performance Evaluation Review 2024-06-11

The global expansion of the Internet has brought many challenges to geopolitics. Cyberspace is a space strategic priority for states. Understanding and representing its geography remains an ongoing challenge. Nevertheless, we need comprehend as organized by humans analyse strategies actors. This requires multidisciplinary dialogue associating geopolitics, computer science mathematics. represented three superposed interacting layers: physical, logical, informational layers. paper focuses on...

10.48550/arxiv.1911.07723 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Les systèmes autonomes (AS) sont les unités de base du routage des données : ils réseaux (fournisseurs d'accès Internet, fournisseurs contenu, entreprises etc.) qui, par leurs interconnexions, constituent l'Internet. En établissant entre eux accords connexion via le protocole BGP, AS permettent faire circuler d'un point à l'autre globe. Dans cet article, nous montrons comment réseau est la fois révélateur et partie prenante luttes pouvoir sur territoires en conflit. Le comportement ces...

10.4000/espacepolitique.8031 article FR cc-by-nc-nd L’Espace Politique 2020-10-21

The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" (i.e., simple, easily-interpretable, readily...

10.1145/3489048.3522645 article EN 2022-06-02

The monitoring of large dynamic networks is a major chal- lenge for wide range application. complexity stems from properties the underlying graphs, in which slight local changes can lead to sizable variations global prop- erties, e.g., under certain conditions, single link cut that may be overlooked during result splitting graph into two disconnected components. Moreover, it often difficult determine whether change will propagate globally or remain local. Traditional theory measure such as...

10.48550/arxiv.1806.00676 preprint EN other-oa arXiv (Cornell University) 2018-01-01

La Fédération de Russie développe depuis le début des années 2010 une stratégie d’influence informationnelle à destination l’étranger. Cette stratégie, axée sur présence massive les réseaux sociaux, est au cœur nouveaux rapports force entre Etats. En France, médias russes RT et Sputnik sont ainsi régulièrement pointés du doigt pour leur couverture l’actualité, jugée partielle ou trompeuse par nombreux acteurs politiques médiatiques. Le mouvement Gilets jaunes, dont membres ont été accusés...

10.4000/espacepolitique.8092 article FR cc-by-nc-nd L’Espace Politique 2020-10-21

The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" ( i.e., simple, easily-interpretable, readily...

10.1145/3508025 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2022-02-24

The main premise of this work is that since large cloud providers can and do manipulate probe packets traverse their privately owned operated backbones, standard traceroute-based measurement techniques are no longer a reliable means for assessing network connectivity in provider infrastructures. In response to these developments, we present new empirical approach elucidating private today's Internet. Our relies on using only "light-weight" (i.e., simple, easily-interpretable, readily...

10.1145/3547353.3522645 article EN ACM SIGMETRICS Performance Evaluation Review 2022-06-20
Coming Soon ...